Security, privacy & compliance

The full picture of how we protect customer and candidate data — our certifications, our infrastructure, and the commitments we put in writing for every enterprise contract.

Certifications & frameworks

We operate under the frameworks our enterprise customers' security teams expect.

SOC 2 Type II

Working towards

A framework we are working towards. Many of the underlying controls — access management, change management, encryption, logging — are already in place.

GDPR

Compliant

EU Standard Contractual Clauses, DPA available, right-to-erasure and data-portability tooling built-in.

Swiss revFADP

Compliant

Aligned with the revised Swiss Federal Act on Data Protection (in force since 1 Sept 2023). Swiss-based data processing options available on Enterprise; integrity signals handled with appropriate care.

CCPA / CPRA

Compliant

California consumer rights honored for candidates. Data deletion and access requests serviced within statutory windows.

Privacy-Aware

Configurable

ClarityHire does not process biometric identifiers. Webcam snapshots retained 30 days by default, keystroke events 90 days. Configurable per-org for compliance.

EEOC-informed

Designed-in

Job-relevant assessments, adverse-impact dashboards, and documented scoring procedures to support US hiring compliance.

ISO 27001

Working towards

A framework we are working towards alongside SOC 2 Type II. Many overlapping controls are already in place.

Service Level Agreement

Standard on every plan. Custom SLAs — including higher uptime targets, faster response windows, and financial penalties — are available as part of every Enterprise contract.

Standard
99.9%
monthly uptime
Support response
Next-business-day
Available on
Free, Starter, Professional
Enterprise
99.95%
monthly uptime
Support response
4-hour (P1) · 8-hour (P2)
Available on
All Enterprise plans
Enterprise+
99.99%
monthly uptime
Support response
1-hour (P1) · 4-hour (P2)
Available on
Custom — contact sales

Integrity Layer: assessment data

Our integrity signals (face-presence detection, keystroke event capture, A/V sync, code coherence) do not process biometric identifiers. ClarityHire collects webcam snapshots for human review and keystroke events for paste/burst detection. We process them on the explicit, narrow legal basis of fraud-prevention in pre-employment assessment, with transparency to the candidate at every step.

What we process — and how

Raw camera and microphone streams are analyzed in-memory, in real time. Webcam snapshots are captured for human review, and keystroke events are captured for paste/burst detection. We do NOT store continuous raw video or audio. What persists is snapshots, keystroke timing events, A/V drift scores, and coherence ratings — never facial biometric identifiers or voiceprints.

Candidate consent

Before any camera or microphone activates, candidates see a plain-language consent screen describing exactly which signals are collected, why, how long they are retained, and their right to refuse or withdraw. Refusal does not silently fail — the assessment offers a non-monitored fallback path where the hiring team has configured one. Consent is logged with timestamp and assessment ID.

Retention & automated deletion

Default retention windows for candidate-facing data: webcam snapshots 30 days; keystroke event logs 90 days; integrity scores & reports 12 months; interview recordings (if enabled) 6 months. Infrastructure-layer windows are separate and operate independently: database point-in-time recovery (PITR) 30 days on Enterprise, encrypted backups & system logs up to 90 days. Every primary window is configurable per organization — Enterprise customers commonly set automated deletion at 30, 60, or 90 days. A scheduled job purges expired records, cascades deletion to backups on next rotation, and writes a deletion audit entry. The full table lives in our Privacy Policy.

Candidate rights & data subject requests

Candidates can request access, rectification, export, or erasure of their data at [email protected]. Requests are serviced within GDPR / revFADP statutory windows (typically ≤ 30 days). Erasure removes snapshots, event logs, and all derived data immediately and cascades to all downstream stores including backups on the next rotation.

Data residency

EU and Swiss customers can elect EU-region (eu-central-1 / eu-west-1) processing on Enterprise plans, keeping all snapshots, event logs, and assessment artifacts inside the EU/EEA. Swiss-resident processing is available on request. Standard Contractual Clauses cover any incidental cross-border transfer.

DPIA & DPA support

Our full sub-processor register is published at /sub-processors (with a downloadable JSON for compliance automation). A pre-built Data Protection Impact Assessment template and signed Data Processing Agreement are available on request for security and privacy reviews. Our DPO can be engaged directly during your procurement review.

Infrastructure

Multi-tenant (default)

Fully-managed, multi-region Postgres and Redis. Per-tenant isolation at the application layer with row-level security on every query.

Dedicated infrastructure

Single-tenant database, cache, and object storage — deployed in the region of your choice (us-east-1, us-west-2, eu-west-1, eu-central-1, ap-southeast-2). Available on Enterprise plans.

Data encryption

TLS 1.2+ in transit. AES-256 at rest for database, object storage, and backups. Secrets (API keys, IdP certs) are stored encrypted and redacted in all logs.

Backups & recovery

Point-in-time recovery with a 30-day retention window on Enterprise. Quarterly restore drills. RTO ≤ 4 hours, RPO ≤ 5 minutes.

Enterprise support

Every Enterprise customer gets a named point of contact who knows your hiring workflows — not a queue, not a rotating pool.

Dedicated Customer Success Manager

A named CSM who leads onboarding, runs quarterly business reviews, surfaces product roadmap items relevant to you, and is your escalation path for anything that isn't a P1 incident.

Dedicated Solutions Engineer (on request)

For complex integrations — SAML edge cases, custom ATS field mapping, webhook pipelines — we pair you with an SE who owns the outcome end-to-end.

Vulnerability disclosure & responsible reporting

We welcome reports from the security research community. If you believe you have found a vulnerability in any ClarityHire product, please report it to us privately so we can fix it before it is disclosed publicly.

How to report

Email [email protected] with a clear description, reproduction steps, affected URL or endpoint, and any proof-of-concept. We acknowledge new reports within 2 business days and provide a triage update within 5 business days. Please do not file vulnerability reports through public support channels or social media.

Encrypt sensitive findings

For sensitive issues, encrypt your report with our PGP key (fingerprint and key file linked from /.well-known/security.txt). We also accept reports via Signal — request a number by emailing [email protected].

Safe-harbor commitment

Good-faith research conducted under this policy will not be pursued legally. Stay within scope, avoid privacy violations and service degradation, do not access data beyond what is necessary to demonstrate the issue, and delete any retrieved data promptly.

Scope & rewards

In scope: clarity-hire.com, *.clarity-hire.com, our public APIs, and our mobile clients. Out of scope: third-party SaaS we use, social-engineering, physical attacks, and DoS. We currently run a private bounty — qualifying reports receive monetary rewards based on severity (CVSS) and impact, plus credit in our security acknowledgements.

Need the docs for your security review?

We send security questionnaire responses, penetration-test summaries, and DPAs under mutual NDA within one business day.