Career Hackers Talent Solution - Security Portal
Welcome to Career Hackers's Security Portal. Our commitment to data privacy and security is embedded in every part of our business. Use this portal to learn about our security measures. For any security related questions that haven't been addressed on this page, please email us at info@careerhackers.io.
Organizational Security
| Control | Status |
|---|---|
| Segregation of Duties for Security and Privacy Roles We enforce segregation of duties for critical security and privacy functions. This means individuals responsible for identifying threats, implementing countermeasures, ensuring privacy compliance, and managing daily infrastructure security have distinct, non-overlapping roles, reducing the risk of unauthorized actions and protecting applicant and employer interests. | ![]() |
| Secure Asset Disposal Procedures Electronic media containing confidential applicant or employer information is securely purged or destroyed according to industry best practices upon disposal, with certificates of destruction obtained where applicable to ensure data is irrecoverable. | ![]() |
| Production System Asset Inventory A formal inventory of all production system assets is maintained, enabling effective management, monitoring, and security of the infrastructure handling applicant assessments and employer data. | ![]() |
| Portable Media Encryption and Control Any portable or removable media devices used for company business are encrypted and their use strictly controlled to protect sensitive applicant or employer data in case of loss or theft. | ![]() |
| Endpoint Security and Anti-Malware Protection We deploy and routinely update advanced endpoint security and anti-malware technology across relevant systems to protect against malicious attacks, safeguarding the integrity of applicant data and employer accounts. | ![]() |
| Employee Background Verification Background verification is performed on new employees, particularly those with access to sensitive systems or data, reducing insider threats and enhancing trust for both applicants and employers. | ![]() |
| Code of Conduct and Confidentiality Agreements All employees and contractors acknowledge our Code of Conduct and sign Confidentiality Agreements. These documents outline ethical and security responsibilities crucial for protecting applicant data and maintaining employer trust, with violations subject to disciplinary action or contract termination. | ![]() |
| Security in Performance Evaluations Annual performance evaluations for employees include assessment of adherence to security policies and practices, promoting accountability in protecting applicant and employer data. | ![]() |
| Strong Password and Credential Management Policy A strong password and credential management policy, including requirements for complexity, rotation, and multi-factor authentication where appropriate, is enforced for all in-scope systems, enhancing the security of access controls protecting applicant assessments and employer accounts. | ![]() |
| Comprehensive Security Awareness Training Employees undergo comprehensive security awareness training upon hiring and annually thereafter, covering topics like phishing recognition, social engineering tactics, secure data handling practices, and incident reporting procedures, ensuring they are equipped to protect applicant data and employer information from evolving threats. | ![]() |
