Trust & Security
Last updated: December 2024
Privacy-First Methodology
Our privacy-first approach means privacy isn't an afterthought—it's built into every aspect of our platform from the ground up. We believe that trust is earned through transparency, security, and giving you complete control over your data.
Security Architecture
🔒 Data Encryption
- • AES-256 encryption at rest
- • TLS 1.3 for data in transit
- • End-to-end encryption for sensitive data
- • Hardware security modules (HSMs)
🏢 Infrastructure
- • Google Cloud Platform (SOC 2 certified)
- • Multi-region data replication
- • 99.9% uptime SLA
- • Automated backup and recovery
👥 Access Control
- • Role-based access control (RBAC)
- • Multi-factor authentication (MFA)
- • Single sign-on (SSO) support
- • Principle of least privilege
📊 Monitoring
- • 24/7 security monitoring
- • Intrusion detection systems
- • Automated threat response
- • Comprehensive audit logs
Compliance & Certifications
GDPR Compliance
Full compliance with European data protection regulations, including data portability and right to deletion.
SOC 2 Type II (In Progress)
Currently undergoing SOC 2 Type II audit for security, availability, and confidentiality controls.
CCPA Compliance
California Consumer Privacy Act compliance with transparent data practices and consumer rights.
Data Isolation & Tenancy
Every organization operates in a completely isolated environment:
- Separate database instances per organization
- Isolated AI training environments
- No cross-tenant data sharing
- Independent backup and recovery systems
- Dedicated encryption keys per tenant
Incident Response
In the unlikely event of a security incident:
- Immediate containment and assessment
- Notification within 72 hours (GDPR requirement)
- Transparent communication about impact and remediation
- Post-incident review and security improvements
- Coordination with relevant authorities as required
Transparency Reports
We publish regular transparency reports covering:
- Security incident summaries (anonymized)
- Compliance audit results
- Data processing statistics
- Third-party security assessments
- Platform availability metrics
Contact Our Security Team
Questions about our security practices? Our security team is here to help:
Security inquiries: security@hrtraining.ai
Report a vulnerability: security@hrtraining.ai