Certifications & Compliance
We maintain rigorous compliance standards to meet the needs of global enterprises and protect candidate rights.
SOC 2 Type II
Security, availability, and confidentiality controls independently audited
ISO 27001
International standard for information security management
GDPR
Full compliance with European data protection regulations
CCPA/CPRA
California consumer privacy rights compliance
EEOC
Equal employment opportunity compliance in AI-assisted hiring
OFCCP
Federal contractor compliance for fair hiring practices
Security Architecture
Enterprise-grade security built into every layer of our platform
Data Encryption
AES-256 encryption at rest, TLS 1.3 in transit. Zero-knowledge architecture for sensitive candidate data.
Access Controls
Role-based permissions, SSO/SAML integration, mandatory MFA, and complete audit trails.
Infrastructure
Cloudflare edge network, isolated VPCs, WAF protection, and automated threat detection.
Data Residency
Choose your data location: US, EU, UK, or Australia. Full data sovereignty support.
Security Operations
Vulnerability Response
Critical: 1hr | High: 4hr | Medium: 24hr
Penetration Testing
Annual third-party assessments
Bug Bounty
Active program for security researchers
Privacy Commitments
In recruitment, privacy isn't just compliance—it's about respecting every candidate and employer who trusts us with their information.
Responsible AI
Our AI is designed to augment human decision-making while ensuring fairness, transparency, and accountability.
Bias Monitoring
Continuous algorithmic auditing to detect and eliminate bias in candidate scoring and recommendations.
Explainable AI
Every AI-powered recommendation comes with clear reasoning that hiring managers can review.
Human Oversight
AI assists but never autonomously makes hiring decisions. Humans remain in control.
Adverse Impact Testing
Regular statistical analysis to ensure fair outcomes across protected classes.
Reliability & Performance
Your hiring never stops, and neither do we
99.99%
Uptime SLA
<100ms
API Response Time
24/7
Monitoring & Support
4
Global Data Regions
Documentation & Resources
Access our security documentation, policies, and compliance reports
Security Whitepaper
Technical deep-dive into our security architecture
Privacy Policy
How we collect, use, and protect your data
Data Processing Agreement
Standard DPA for enterprise customers
Subprocessor List
Third-party services that process data
AI Ethics Guidelines
Our principles for responsible AI in hiring
Penetration Test Summary
Latest third-party security assessment results