Search test library by skills or roles
⌘ K

Trust Guide

Trust Adaface with your security and privacy


We are committed to the security and privacy of your data.

Trust is the foundation of our relationship with millions of candidates and businesses around the world. We value the confidence you’ve put in us and take the responsibility of protecting your information seriously. To be worthy of your trust, we built and will continue to grow Adaface with an emphasis on security, compliance, and privacy.

Our Trust Guide connects you to our privacy, security and compliance programmes, so you have all of the information that you need to manage your data.

Privacy

You own your data, and whether it’s your personal or work information, we’re committed to keeping it private. Our policies, tools and procedures are built to protect your data and help you to meet your privacy obligations.

Learn more

Security

Adaface is designed with a secure, distributed infrastructure with multiple layers of protection. We work behind the scenes to imbibe enterprise-grade security into every aspect of how recruiters collaborate for screening.

Learn more

Compliance

Our robust programme complies with regulations like GDPR and CCPA and can help you navigate your compliance. Our internal auditors test our controls to ensure all compliance layers are secure and consistent with our policies.

Learn more

Data Management

Our data management infrastructure is designed with operational, technical, and procedural security controls. We are committed to providing transparency into the policies and tools that affect how you manage your data.

Learn more

Data Requests

We’re committed to being as transparent as possible about how we manage your information, while making sure we keep it secure and private. Our data request policy provides insight into third-party/ law enforcement requests for data.

Learn more

Industry-accepted best practices and frameworks

Our security approach focuses on security governance, risk management and compliance. This includes encryption at rest and in transit, network security and server hardening, administrative access control, system monitoring, logging and alerting, and more.

logo
40 min tests.
No trick questions.
Accurate shortlisting.