Security

Enterprise-grade security
for your hiring data

Hiring data is sensitive. Recrofy is built from the ground up with security controls that enterprise and compliance teams can trust.

SOC 2 Ready
Architecture aligned with SOC 2 Type II controls
Encrypted at Rest
AES-256 encryption for all stored data
GDPR Aligned
Data handling practices built for GDPR compliance
Zero Data Sharing
Your data is never sold or shared with third parties

Role-Based Access Control (RBAC)

Define who can see what, and who can do what. Admins, recruiters, hiring managers, and read-only stakeholders all get tailored access. No role bleeds into another.

  • Granular permission sets per role
  • Org-level and job-level access scoping
  • Configurable approval authority per stage

Audit Logs

Every action in Recrofy is logged, who approved a candidate, who changed a job's status, who exported data, and when. Full traceability for compliance and internal review.

  • Immutable, timestamped action log
  • Filterable by user, action type, and date range
  • Exportable for compliance audits

Data Isolation

Each organization's data is fully isolated at the database level. No shared tables, no data bleed between workspaces. Your candidates, jobs, and employees are yours alone.

  • Per-organization data isolation
  • No cross-tenant data access possible
  • Dedicated storage per workspace

Document Protection

Resumes, contracts, and offer letters are stored encrypted at rest and in transit. Access is scoped to authorized users only. Documents are never indexed by third parties.

  • AES-256 encryption at rest
  • TLS 1.3 encryption in transit
  • Access-controlled document storage

Security questions?

Our team is happy to provide security documentation, complete vendor questionnaires, or schedule a technical deep-dive for your IT and compliance teams.

Contact our security team

Secure hiring at scale

Enterprise controls. Startup speed. Built for both.

No credit card required · Free plan available · Setup in minutes