| Measures of pseudonymization and encryption of personal data | Endorsed has deployed secure methods and protocols for transmission of confidential or sensitive information over public networks. Databases housing sensitive customer data are encrypted at rest. Endorsed uses only recommended secure cipher suites and protocols to encrypt all traffic in transit and Customer Data is securely encrypted with strong ciphers and configurations when at rest. |
| Measures for ensuring ongoing confidentiality, integrity, availability and resilience of processing systems and services | Endorsed ensures ongoing confidentiality, integrity, and availability through data encryption both in transit and at rest, regular database backups, and cryptographic controls with key management processes. Additionally, the implementation of secure and privacy-by-design principles, commercially reasonable practices by third parties, and a strict review process for third-party vendors contribute to the resilience of processing systems and services. |
| Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident | Daily, weekly and monthly backups of production datastores are taken. Measures include conducting an annual disaster recovery test, including a test of backup restoration processes, as well as ensuring data is regularly backed up and encrypted both in transit and at rest. |
| Processes for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures in order to ensure the security of the processing | Endorsed measures and verifies compliance with its policies through ongoing monitoring, and both internal and external audits. All significant changes affecting information security are tested, reviewed, and approved prior to production deployment, and security functionality is tested at defined periods during the development life cycle. |
| Measures for user identification and authorization | Endorsed supports Single Sign-On (SSO) through Google Accounts, mandates Multi-Factor Authentication (MFA) for production system access, and requires all personnel to have unique user identifiers. Users must register with complete and truthful data, choose strong passwords, and keep their login credentials confidential. |
| Measures for the protection of data during transmission | Data transmitted to and from Endorsed is protected by encryption in transit, following industry best practices such as NIST SP 800-57 and using strong ciphers. Additionally, API connections with clients' Applicant Tracking Systems (ATS) are securely stored within our Supabase-hosted database in the United States. |
| Measures for the protection of data during storage | Data is encrypted both in transit and at rest, with regular database backups conducted to ensure data resilience and availability for recovery. Personal data is encrypted using robust cryptography when stored. |
| Measures for ensuring physical security of locations at which personal data are processed | Physical security measures for locations processing personal data include preventing unauthorized access, misuse, theft, environmental threats, and other security threats, in accordance with the Physical Security Policy and GDPR Compliance Policy requirements. |
| Measures for ensuring events logging | Our production company infrastructure is configured to produce detailed logs, including user log-in and log-out, CRUD operations, security settings changes, and administrator access to customer data. These logs are stored for at least 90 days, and logging and auditing functionality is ensured for system functions and information access. |
| Measures for ensuring system configuration, including default configuration | To ensure system configuration, unnecessary default accounts must be removed or disabled and vendor default passwords changed before making a system available on the network. Configuration and hardening standards for servers and VMs are implemented for production systems to enhance system security. |
| Measures for internal IT and IT security governance and management | Senior Management at Endorsed approves capital expenditures for ISP and ISMS, oversees the execution of information security and privacy risk management, and aligns security policies with strategic objectives. Endorsed measures and verifies compliance through ongoing monitoring, and both internal and external audits, with policies reviewed annually. |
| Measures for certification/assurance of processes and products | Endorsed is fully compliant with SOC2 Type II, GDPR and CCPA, while working towards compliance with ISO regulations. Endorsed can expedite certification processes as required. Endorsed measures and verifies compliance through ongoing monitoring and both internal and external audits, with policies being reviewed at a minimum annually. |
| Measures for ensuring data minimization | Endorsed's Customers unilaterally determine what data they route through the Services. As such, Endorsed operates on a shared responsibility model. |
| Measures for ensuring data quality | Endorsed has a multi-tiered approach for ensuring data quality. These measures include: (i) database schema validation rules which execute against data before it is saved to our database, (ii) a schema-first API design and strong typing to enforce a strict contract between official clients and API resolvers. Endorsed applies these measures across the board, both to ensure the quality of any Usage Data that Endorsed collects and to ensure that the Endorsed Platform is operating within expected parameters. Endorsed ensures that data quality is maintained from the time a Customer sends Customer Data into the Services and until that Customer Data is presented or exported. |
| Measures for ensuring limited data retention | Data shall be retained as long as necessary for use, regulatory, or contractual obligations, and disposed of or archived when no longer needed. The data retention requirements are reviewed annually, and legal counsel may stipulate retention for specific cases. |
| Measures for ensuring accountability | Endorsed measures and verifies compliance with its policies through ongoing monitoring, internal and external audits, with policies being reviewed annually. Furthermore, violations should be reported to the designated Security PM, and management monitors training completion to ensure compliance. |
| Measures for allowing data portability and ensuring erasure | Users can request data portability to receive or transfer their data in a structured, commonly-used, and machine-readable format. Data erasure is facilitated through contacting support@endorsed.com, and devices with damaged storage are subjected to certified data destruction via an E-Waste service. |
| Technical and organizational measures of sub-processors | Sub-processors must implement commercially reasonable practices and procedures for operations security, including technical testing, protection against malicious software, network protection and management, technical vulnerability management, logging and monitoring, incident response, and business continuity planning. Secure development programs and adherence to GDPR and CCPA regulatory requirements are also mandatory. |