Security Portal

Career Hackers Talent Solution - Security Portal

Welcome to Career Hackers's Security Portal. Our commitment to data privacy and security is embedded in every part of our business. Use this portal to learn about our security measures. For any security related questions that haven't been addressed on this page, please email us at info@careerhackers.io.

Organizational Security

ControlStatus
Segregation of Duties for Security and Privacy Roles

We enforce segregation of duties for critical security and privacy functions. This means individuals responsible for identifying threats, implementing countermeasures, ensuring privacy compliance, and managing daily infrastructure security have distinct, non-overlapping roles, reducing the risk of unauthorized actions and protecting applicant and employer interests.

Secure Asset Disposal Procedures

Electronic media containing confidential applicant or employer information is securely purged or destroyed according to industry best practices upon disposal, with certificates of destruction obtained where applicable to ensure data is irrecoverable.

Production System Asset Inventory

A formal inventory of all production system assets is maintained, enabling effective management, monitoring, and security of the infrastructure handling applicant assessments and employer data.

Portable Media Encryption and Control

Any portable or removable media devices used for company business are encrypted and their use strictly controlled to protect sensitive applicant or employer data in case of loss or theft.

Endpoint Security and Anti-Malware Protection

We deploy and routinely update advanced endpoint security and anti-malware technology across relevant systems to protect against malicious attacks, safeguarding the integrity of applicant data and employer accounts.

Employee Background Verification

Background verification is performed on new employees, particularly those with access to sensitive systems or data, reducing insider threats and enhancing trust for both applicants and employers.

Code of Conduct and Confidentiality Agreements

All employees and contractors acknowledge our Code of Conduct and sign Confidentiality Agreements. These documents outline ethical and security responsibilities crucial for protecting applicant data and maintaining employer trust, with violations subject to disciplinary action or contract termination.

Security in Performance Evaluations

Annual performance evaluations for employees include assessment of adherence to security policies and practices, promoting accountability in protecting applicant and employer data.

Strong Password and Credential Management Policy

A strong password and credential management policy, including requirements for complexity, rotation, and multi-factor authentication where appropriate, is enforced for all in-scope systems, enhancing the security of access controls protecting applicant assessments and employer accounts.

Comprehensive Security Awareness Training

Employees undergo comprehensive security awareness training upon hiring and annually thereafter, covering topics like phishing recognition, social engineering tactics, secure data handling practices, and incident reporting procedures, ensuring they are equipped to protect applicant data and employer information from evolving threats.