Security

How we protect your data and ensure platform security

Our Commitment to Security

At RecruitIQ, security is fundamental to everything we do. We understand that you trust us with sensitive recruiting data, candidate information, and business-critical information. We are committed to protecting that trust through industry-leading security practices, continuous monitoring, and transparent communication.

Data Encryption

Encryption in Transit

All data transmitted between your devices and our servers is encrypted using Transport Layer Security (TLS) 1.3, the industry standard for secure communications. This ensures that your data cannot be intercepted or read by unauthorized parties during transmission.

Encryption at Rest

All sensitive data stored in our databases is encrypted at rest using AES-256 encryption, one of the strongest encryption standards available. This means that even if someone were to gain unauthorized access to our storage systems, your data would remain protected.

Infrastructure Security

Cloud Infrastructure

RecruitIQ is built on secure, enterprise-grade cloud infrastructure with redundant systems and automatic failover capabilities. Our infrastructure providers maintain industry-leading security certifications including SOC 2, ISO 27001, and others.

Network Security

We employ multiple layers of network security including firewalls, intrusion detection systems, and DDoS protection to prevent unauthorized access and ensure service availability.

Access Controls

Access to our systems is strictly controlled and monitored. We follow the principle of least privilege, ensuring that employees only have access to the systems and data necessary for their roles. All access is logged and regularly audited.

Application Security

Secure Development Practices

Our development team follows secure coding practices and conducts regular security reviews. All code changes undergo security testing before deployment, and we use automated tools to scan for vulnerabilities.

Authentication and Authorization

We support multi-factor authentication (MFA) to add an extra layer of security to your account. We also implement role-based access controls to ensure users can only access data and features appropriate to their role.

Session Management

User sessions are securely managed with automatic timeout and secure session tokens. We monitor for suspicious activity and can automatically terminate sessions if security threats are detected.

Data Protection and Privacy

Data Minimization

We only collect and store data that is necessary to provide our Service. Unnecessary data is regularly purged according to our data retention policies.

Data Backup and Recovery

We maintain regular, encrypted backups of all data. Our backup systems are tested regularly to ensure we can quickly restore service in the event of data loss or system failure.

Compliance

We are committed to complying with applicable data protection regulations including GDPR, CCPA, and other regional privacy laws. For more information about how we handle your data, please see our Privacy Policy.

Security Monitoring and Incident Response

Continuous Monitoring

We employ 24/7 security monitoring to detect and respond to potential threats in real-time. Our security operations team uses advanced threat detection tools and techniques to identify suspicious activity.

Incident Response

We maintain a comprehensive incident response plan to quickly address any security incidents. In the event of a security breach that affects your data, we will notify affected users promptly and take immediate steps to mitigate the impact.

Vulnerability Management

We regularly conduct security assessments, penetration testing, and vulnerability scans. Identified vulnerabilities are prioritized and remediated according to their severity. We also participate in responsible disclosure programs and welcome security researchers to report vulnerabilities.

Third-Party Security

We carefully vet all third-party service providers and vendors to ensure they meet our security standards. All third-party integrations are reviewed for security risks, and we maintain contracts that require appropriate security measures.

Your Role in Security

Security is a shared responsibility. Here's how you can help keep your account secure:

  • Use a strong, unique password for your RecruitIQ account
  • Enable multi-factor authentication (MFA) when available
  • Never share your account credentials with others
  • Log out of shared or public computers
  • Be cautious of phishing attempts and suspicious emails
  • Keep your devices and browsers updated with the latest security patches
  • Report any suspicious activity to our security team immediately

Security Certifications and Audits

We regularly undergo independent security audits and assessments. We are committed to achieving and maintaining industry-recognized security certifications to demonstrate our commitment to security best practices.

Reporting Security Issues

If you discover a security vulnerability or have concerns about our security practices, please report it to us immediately. We take all security reports seriously and will respond promptly.

Security Email: security@recruitiq.com

For Security Researchers: Please include detailed information about the vulnerability, steps to reproduce, and potential impact.

Response Time: We aim to acknowledge security reports within 24 hours and provide updates on our progress.

Updates to This Page

We may update this Security page from time to time to reflect changes in our security practices or to provide additional information. We encourage you to review this page periodically to stay informed about how we protect your data.

Questions About Security?

If you have questions about our security practices or need assistance with a security-related issue, please don't hesitate to contact us:

Email: security@recruitiq.com

Address: RecruitIQ Security Team