Security & Compliance

Security at RecruiterBlocker

We take security seriously. Here's how we protect your data and maintain the highest standards of privacy and compliance.

Zero Email Access

We never read, access, or store email content. Our service only creates filter rules—Gmail does the filtering, not us.

End-to-End Encryption

All data encrypted in transit (TLS 1.3) and at rest (AES-256). Service account credentials stored in encrypted vaults.

Audit Logging

Every action is logged with timestamps and user attribution. Full audit trail available for compliance reviews.

Infrastructure Security

Cloud Infrastructure

Hosted on Google Cloud Platform with SOC 2 Type II certified data centers. Multi-region redundancy for high availability.

Network Security

Firewalls, DDoS protection, and intrusion detection systems. All traffic encrypted with TLS 1.3. No unencrypted connections allowed.

Database Security

Encrypted databases with automated backups. Access restricted to authorized personnel only. Regular security patches applied.

Access Controls

Role-based access control (RBAC) with principle of least privilege. Multi-factor authentication required for all admin accounts.

Application Security

Secure Authentication

OAuth 2.0 with JWT tokens. Session management with automatic timeout. Password hashing with bcrypt (if applicable).

Input Validation

All user input sanitized and validated. Protection against SQL injection, XSS, CSRF, and other common vulnerabilities.

Dependency Management

Automated vulnerability scanning for third-party libraries. Regular updates and security patches applied promptly.

Code Reviews

All code changes reviewed by senior engineers. Security-focused code reviews for authentication and data handling logic.

Compliance & Certifications

GDPR Compliant

Full compliance with EU General Data Protection Regulation. Data processing agreements available upon request.

CCPA Compliant

California Consumer Privacy Act compliance. Users can request data access, deletion, and portability.

Google Cloud Security

Leverages Google Cloud Platform's SOC 2 Type II, ISO 27001, and other certifications. Regular third-party audits.

Incident Response

We maintain a comprehensive incident response plan to quickly identify, contain, and resolve security incidents.

Detection & Monitoring

24/7 automated monitoring with real-time alerts for suspicious activity. Quarterly penetration testing by third-party security firms.

Response Procedures

Documented incident response playbooks. Dedicated security team on-call 24/7. Escalation protocols for critical incidents.

Customer Notification

Affected customers notified within 72 hours of confirmed breach (as required by GDPR). Transparent communication about scope and remediation.

Post-Incident Review

Root cause analysis for all incidents. Implementation of preventive measures. Regular security audits and improvements.

Employee Security Practices

Background Checks

All employees undergo background checks before accessing production systems.

Security Training

Mandatory security awareness training for all employees. Annual refresher courses and phishing simulations.

Access Revocation

Immediate access revocation upon employee departure. Regular access reviews to ensure least privilege.

Report a Security Vulnerability

If you discover a security vulnerability, please report it to us immediately. We take all reports seriously and will respond promptly.

Security Contact: [email protected]

Response Time: Within 24 hours for critical vulnerabilities

Bug Bounty: We offer rewards for responsibly disclosed vulnerabilities

Last Updated: December 31, 2024

Questions about our security practices? Contact us at [email protected]