Infrastructure & Data Security
- Encryption: All data is encrypted at rest (AES-256) and in transit (TLS 1.2+).
- Secure Hosting: Hosted on AWS/GCP with strict access controls and firewall protection.
- Role-Based Access: Granular permissions for authorized personnel only.
Privacy & Data Protection
- Consent-First: Data collected only with explicit consent.
- Data Ownership: You own your data; no resale to third parties.
- Retention Policy: Automated deletion workflows for compliance.
Compliance Readiness
- DPDP Act Ready: Aligned with India's DPDP Act principles.
- GDPR Alignment: Data processing agreements (DPA) available for EU-based hiring.
- Audit Trails: Comprehensive system logs for security audits.
Responsible AI & Ethics
- Human-in-the-Loop: AI assists scoring; final verification involves humans.
- Explainability: Every score comes with a breakdown.
- Anti-Bias: Algorithms tested to minimize bias.
Have specific compliance requirements?
We work with enterprise security teams to complete vendor risk assessments (VRAs) and security questionnaires.
Contact Security Team