Protecting Your Informtation

Security & Compliance

At SeekOut, the security of your data and your compliance with legal requirements is our top priority. SeekOut’s platform has robust security measures in place to safeguard the transmission and storage of the information you share with us.

TOP SECURITY & PRIVACY FEATURES

DATA PROTECTION IN THE CLOUD


We rely on the most secure service providers to ensure that your information is safe. SeekOut’s services run Microsoft Azure, which is physically secure, employs modern software security techniques, and requires multi-factor authentication for access. The Azure cloud infrastructure has more certifications than any other cloud provider including ISO/IEC, CSA/CCM, ITAR, CJIS, HIPAA and IRS 1075.

SECURE APIS


We protect your information as its transmitted between systems. SeekOut integrates seamlessly with your applicant tracking system (ATS) without compromising the security of your data. Communication through ATS partner APIs is HTTPS encrypted using TLS 1.2. The connection is encrypted and authenticated using AES-128 bit encryption. The Advanced Encryption Standard (AES) is used by the U.S. government to protect classified information and also used commercially to protect sensitive data in software.

DATA ENCRYPTION


We make your data unreadable to those who shouldn’t be reading it. In addition to encrypting API traffic to your ATS, SeekOut encrypts other sensitive company data you share with us. We use a database that uses encryption at rest, and the keys are managed and rotated by Microsoft.

PASSWORD HASHING


We don’t hold on to your passwords – we never even see them. SeekOut never stores user passwords. We utilize a one-way, cryptographic hashing algorithm known as Bcrypt, an industry standard for password hashing.

STRONG ACCESS PROTECTION


We protect customer data from other customers. Choosing a recruiting platform without strong access protections in place can pose serious security risks. SeekOut does not share your data with our other customers. Rigorous access controls restrict customers to their data only.

VULNERABILITY TESTING


Don’t just take our word that our systems are secure. We don’t. SeekOut works with third party vendors to conduct security scans of our site, and we have fixed the issues that have come up.

DISASTER RECOVERY


We prepare for the worst, just in case. To become fully operational in the case of a disaster, SeekOut’s data is stored in a geo-redundant database instance. The data is replicated in multiple regions.

SEEKOUT PERSONNEL


Our staff is trained to handle your data correctly. SeekOut employees with access to sensitive customer data can only access information on a need-to-know basis for troubleshooting purposes and are required to adhere to strict privacy guidelines.