Security
How we protect your data and ensure platform security
Our Commitment to Security
At RecruitIQ, security is fundamental to everything we do. We understand that you trust us with sensitive recruiting data, candidate information, and business-critical information. We are committed to protecting that trust through industry-leading security practices, continuous monitoring, and transparent communication.
Data Encryption
Encryption in Transit
All data transmitted between your devices and our servers is encrypted using Transport Layer Security (TLS) 1.3, the industry standard for secure communications. This ensures that your data cannot be intercepted or read by unauthorized parties during transmission.
Encryption at Rest
All sensitive data stored in our databases is encrypted at rest using AES-256 encryption, one of the strongest encryption standards available. This means that even if someone were to gain unauthorized access to our storage systems, your data would remain protected.
Infrastructure Security
Cloud Infrastructure
RecruitIQ is built on secure, enterprise-grade cloud infrastructure with redundant systems and automatic failover capabilities. Our infrastructure providers maintain industry-leading security certifications including SOC 2, ISO 27001, and others.
Network Security
We employ multiple layers of network security including firewalls, intrusion detection systems, and DDoS protection to prevent unauthorized access and ensure service availability.
Access Controls
Access to our systems is strictly controlled and monitored. We follow the principle of least privilege, ensuring that employees only have access to the systems and data necessary for their roles. All access is logged and regularly audited.
Application Security
Secure Development Practices
Our development team follows secure coding practices and conducts regular security reviews. All code changes undergo security testing before deployment, and we use automated tools to scan for vulnerabilities.
Authentication and Authorization
We support multi-factor authentication (MFA) to add an extra layer of security to your account. We also implement role-based access controls to ensure users can only access data and features appropriate to their role.
Session Management
User sessions are securely managed with automatic timeout and secure session tokens. We monitor for suspicious activity and can automatically terminate sessions if security threats are detected.
Data Protection and Privacy
Data Minimization
We only collect and store data that is necessary to provide our Service. Unnecessary data is regularly purged according to our data retention policies.
Data Backup and Recovery
We maintain regular, encrypted backups of all data. Our backup systems are tested regularly to ensure we can quickly restore service in the event of data loss or system failure.
Compliance
We are committed to complying with applicable data protection regulations including GDPR, CCPA, and other regional privacy laws. For more information about how we handle your data, please see our Privacy Policy.
Security Monitoring and Incident Response
Continuous Monitoring
We employ 24/7 security monitoring to detect and respond to potential threats in real-time. Our security operations team uses advanced threat detection tools and techniques to identify suspicious activity.
Incident Response
We maintain a comprehensive incident response plan to quickly address any security incidents. In the event of a security breach that affects your data, we will notify affected users promptly and take immediate steps to mitigate the impact.
Vulnerability Management
We regularly conduct security assessments, penetration testing, and vulnerability scans. Identified vulnerabilities are prioritized and remediated according to their severity. We also participate in responsible disclosure programs and welcome security researchers to report vulnerabilities.
Third-Party Security
We carefully vet all third-party service providers and vendors to ensure they meet our security standards. All third-party integrations are reviewed for security risks, and we maintain contracts that require appropriate security measures.
Your Role in Security
Security is a shared responsibility. Here's how you can help keep your account secure:
- Use a strong, unique password for your RecruitIQ account
- Enable multi-factor authentication (MFA) when available
- Never share your account credentials with others
- Log out of shared or public computers
- Be cautious of phishing attempts and suspicious emails
- Keep your devices and browsers updated with the latest security patches
- Report any suspicious activity to our security team immediately
Security Certifications and Audits
We regularly undergo independent security audits and assessments. We are committed to achieving and maintaining industry-recognized security certifications to demonstrate our commitment to security best practices.
Reporting Security Issues
If you discover a security vulnerability or have concerns about our security practices, please report it to us immediately. We take all security reports seriously and will respond promptly.
Security Email: security@recruitiq.com
For Security Researchers: Please include detailed information about the vulnerability, steps to reproduce, and potential impact.
Response Time: We aim to acknowledge security reports within 24 hours and provide updates on our progress.
Updates to This Page
We may update this Security page from time to time to reflect changes in our security practices or to provide additional information. We encourage you to review this page periodically to stay informed about how we protect your data.
Questions About Security?
If you have questions about our security practices or need assistance with a security-related issue, please don't hesitate to contact us:
Email: security@recruitiq.com
Address: RecruitIQ Security Team