Trust & Security

Your Data Security Is Our Top Priority

We handle the most sensitive personal information in the hiring process. That's why we've built enterprise-grade security into every layer of our platform.

Certifications & Compliance

SOC 2 Type II

Certified

Independently audited security controls for data handling, availability, and confidentiality.

ISO 27001

Certified

International standard for information security management systems (ISMS).

FCRA Compliant

Compliant

Full compliance with the Fair Credit Reporting Act for consumer reporting.

PBSA Accredited

Accredited

Professional Background Screening Association accreditation for industry best practices.

GDPR Ready

Compliant

Data processing compliant with EU General Data Protection Regulation requirements.

CCPA Compliant

Compliant

California Consumer Privacy Act compliance for California resident data.

Security Architecture

Multi-layered security controls protect your data at every stage — from collection to storage to destruction.

Encryption at Rest & In Transit

All data is encrypted using AES-256 at rest and TLS 1.3 in transit. Database fields containing PII use additional application-level encryption.

Access Controls

Role-based access control (RBAC) with multi-factor authentication required for all employees. Principle of least privilege enforced across all systems.

Data Retention & Destruction

Configurable data retention policies per client. Automated secure data destruction using NIST 800-88 guidelines when retention periods expire.

Audit Logging

Complete audit trail of all data access, modifications, and system events. Logs are immutable and retained for 7 years for compliance purposes.

Infrastructure Security

Hosted on AWS with SOC 2 certified data centers. Multi-AZ deployment with automatic failover. 99.99% uptime SLA.

Disaster Recovery

Real-time database replication across multiple regions. RPO < 1 minute, RTO < 15 minutes. Annual DR testing with documented results.

Network Security

Web Application Firewall (WAF), DDoS protection, intrusion detection/prevention systems, and 24/7 security monitoring.

Vulnerability Management

Continuous vulnerability scanning, annual penetration testing by third-party firms, and a responsible disclosure program.

How We Handle Your Data

1

Data Collection

We collect only the minimum data required to perform background screenings. All data collection is consent-based and FCRA-compliant. Candidates are notified and must authorize before any screening begins.

2

Data Processing

All processing occurs within our SOC 2 certified infrastructure. PII is tokenized during processing and never stored in logs. AI analysis runs in isolated environments with no data persistence.

3

Data Storage

Data is stored in encrypted databases with field-level encryption for SSNs, dates of birth, and other sensitive identifiers. Access is restricted to authorized personnel with MFA and logged for audit purposes.

4

Data Sharing

Background check results are shared only with the authorized requesting party. We never sell, share, or use candidate data for any purpose other than the authorized screening.

5

Data Destruction

When retention periods expire or clients request deletion, data is securely destroyed using cryptographic erasure. Destruction is verified and documented for compliance records.

Platform Reliability

99.99%

Uptime SLA

<200ms

Average API Response

24/7

Security Monitoring

Security FAQ

Where is my data stored?

All data is stored in AWS data centers located in the United States (us-east-1 and us-west-2 regions). Data never leaves US borders unless specifically requested for international screenings.

Who has access to candidate data?

Only authorized personnel with a business need can access candidate data. All access requires MFA, is logged, and is reviewed quarterly. Your account data is isolated from other clients.

How long do you retain data?

Default retention is 7 years per FCRA requirements, but this is configurable per client. You can request immediate deletion at any time, and we'll provide a certificate of destruction.

Do you have a bug bounty program?

Yes. We maintain a responsible disclosure program and work with security researchers to identify and fix vulnerabilities. Contact [email protected] for details.

Can I get a copy of your SOC 2 report?

Yes. We provide our SOC 2 Type II report to prospective and current customers under NDA. Contact our sales team to request a copy.

Need More Details?

Our security team is happy to answer questions, provide compliance documentation, or walk through our security architecture with your IT team.