Search test library by skills or roles
⌘ K

Guide de confiance

Trust Adaface with your security and privacy

We are committed to the security and privacy of your data.

Trust is the foundation of our relationship with millions of candidates and businesses around the world. We value the confidence you’ve put in us and take the responsibility of protecting your information seriously. To be worthy of your trust, we built and will continue to grow Adaface with an emphasis on security, compliance, and privacy.

Our Trust Guide connects you to our privacy, security and compliance programmes, so you have all of the information that you need to manage your data.


You own your data, and whether it’s your personal or work information, we’re committed to keeping it private. Our policies, tools and procedures are built to protect your data and help you to meet your privacy obligations.

Apprendre encore plus


Adaface is designed with a secure, distributed infrastructure with multiple layers of protection. We work behind the scenes to imbibe enterprise-grade security into every aspect of how recruiters collaborate for screening.

Apprendre encore plus


Our robust programme complies with regulations like GDPR and CCPA and can help you navigate your compliance. Our internal auditors test our controls to ensure all compliance layers are secure and consistent with our policies.

Apprendre encore plus

Data Management

Our data management infrastructure is designed with operational, technical, and procedural security controls. We are committed to providing transparency into the policies and tools that affect how you manage your data.

Apprendre encore plus

Data Requests

We’re committed to being as transparent as possible about how we manage your information, while making sure we keep it secure and private. Our data request policy provides insight into third-party/ law enforcement requests for data.

Apprendre encore plus

Meilleures pratiques et cadres acceptés par l'industrie

Notre approche de sécurité se concentre sur la gouvernance de la sécurité, la gestion des risques et la conformité. Cela comprend le cryptage au repos et en transit, la sécurité du réseau et le durcissement du serveur, le contrôle d'accès administratif, la surveillance du système, la journalisation et l'alerte, etc.

40 min tests.
No trick questions.
Accurate shortlisting.