Privacy
You own your data, and whether it’s your personal or work information, we’re committed to keeping it private. Our policies, tools and procedures are built to protect your data and help you to meet your privacy obligations.
Trust Guide
Trust is the foundation of our relationship with millions of candidates and businesses around the world. We value the confidence you’ve put in us and take the responsibility of protecting your information seriously. To be worthy of your trust, we built and will continue to grow Adaface with an emphasis on security, compliance, and privacy.
Our Trust Guide connects you to our privacy, security and compliance programmes, so you have all of the information that you need to manage your data.
You own your data, and whether it’s your personal or work information, we’re committed to keeping it private. Our policies, tools and procedures are built to protect your data and help you to meet your privacy obligations.
Adaface is designed with a secure, distributed infrastructure with multiple layers of protection. We work behind the scenes to imbibe enterprise-grade security into every aspect of how recruiters collaborate for screening.
Our robust programme complies with regulations like GDPR and CCPA and can help you navigate your compliance. Our internal auditors test our controls to ensure all compliance layers are secure and consistent with our policies.
Our data management infrastructure is designed with operational, technical, and procedural security controls. We are committed to providing transparency into the policies and tools that affect how you manage your data.
We’re committed to being as transparent as possible about how we manage your data while making sure we keep it secure and private. Our data request policy provides insight into third-party/ law enforcement requests for data.
Our security approach focuses on security governance, risk management and compliance. This includes encryption at rest and in transit, network security and server hardening, administrative access control, system monitoring, logging and alerting, and more.