Security

Security & Compliance

Built for trusted hiring workflows with strong security baselines, auditability, and fraud defense.

Encryption in transit (TLS 1.2+) and at rest
Isolated VPCs with network segmentation
Role-based access control with MFA
Comprehensive audit logging for all verification events
Least-privilege access with regular reviews
Vendor due diligence and data processing safeguards

Incident response

24/7 monitoring with defined triage, customer notification, and post-incident review.

Data retention

Retention is configurable per contract; deletion and export supported on request.