Security, privacy & compliance
The full picture of how we protect customer and candidate data — our certifications, our infrastructure, and the commitments we put in writing for every enterprise contract.
Certifications & frameworks
We operate under the frameworks our enterprise customers' security teams expect.
SOC 2 Type II
A framework we are working towards. Many of the underlying controls — access management, change management, encryption, logging — are already in place.
GDPR
EU Standard Contractual Clauses, DPA available, right-to-erasure and data-portability tooling built-in.
Swiss revFADP
Aligned with the revised Swiss Federal Act on Data Protection (in force since 1 Sept 2023). Swiss-based data processing options available on Enterprise; integrity signals handled with appropriate care.
CCPA / CPRA
California consumer rights honored for candidates. Data deletion and access requests serviced within statutory windows.
Privacy-Aware
ClarityHire does not process biometric identifiers. Webcam snapshots retained 30 days by default, keystroke events 90 days. Configurable per-org for compliance.
EEOC-informed
Job-relevant assessments, adverse-impact dashboards, and documented scoring procedures to support US hiring compliance.
ISO 27001
A framework we are working towards alongside SOC 2 Type II. Many overlapping controls are already in place.
Service Level Agreement
Standard on every plan. Custom SLAs — including higher uptime targets, faster response windows, and financial penalties — are available as part of every Enterprise contract.
- Support response
- Next-business-day
- Available on
- Free, Starter, Professional
- Support response
- 4-hour (P1) · 8-hour (P2)
- Available on
- All Enterprise plans
- Support response
- 1-hour (P1) · 4-hour (P2)
- Available on
- Custom — contact sales
Integrity Layer: assessment data
Our integrity signals (face-presence detection, keystroke event capture, A/V sync, code coherence) do not process biometric identifiers. ClarityHire collects webcam snapshots for human review and keystroke events for paste/burst detection. We process them on the explicit, narrow legal basis of fraud-prevention in pre-employment assessment, with transparency to the candidate at every step.
What we process — and how
Raw camera and microphone streams are analyzed in-memory, in real time. Webcam snapshots are captured for human review, and keystroke events are captured for paste/burst detection. We do NOT store continuous raw video or audio. What persists is snapshots, keystroke timing events, A/V drift scores, and coherence ratings — never facial biometric identifiers or voiceprints.
Candidate consent
Before any camera or microphone activates, candidates see a plain-language consent screen describing exactly which signals are collected, why, how long they are retained, and their right to refuse or withdraw. Refusal does not silently fail — the assessment offers a non-monitored fallback path where the hiring team has configured one. Consent is logged with timestamp and assessment ID.
Retention & automated deletion
Default retention windows for candidate-facing data: webcam snapshots 30 days; keystroke event logs 90 days; integrity scores & reports 12 months; interview recordings (if enabled) 6 months. Infrastructure-layer windows are separate and operate independently: database point-in-time recovery (PITR) 30 days on Enterprise, encrypted backups & system logs up to 90 days. Every primary window is configurable per organization — Enterprise customers commonly set automated deletion at 30, 60, or 90 days. A scheduled job purges expired records, cascades deletion to backups on next rotation, and writes a deletion audit entry. The full table lives in our Privacy Policy.
Candidate rights & data subject requests
Candidates can request access, rectification, export, or erasure of their data at [email protected]. Requests are serviced within GDPR / revFADP statutory windows (typically ≤ 30 days). Erasure removes snapshots, event logs, and all derived data immediately and cascades to all downstream stores including backups on the next rotation.
Data residency
EU and Swiss customers can elect EU-region (eu-central-1 / eu-west-1) processing on Enterprise plans, keeping all snapshots, event logs, and assessment artifacts inside the EU/EEA. Swiss-resident processing is available on request. Standard Contractual Clauses cover any incidental cross-border transfer.
DPIA & DPA support
Our full sub-processor register is published at /sub-processors (with a downloadable JSON for compliance automation). A pre-built Data Protection Impact Assessment template and signed Data Processing Agreement are available on request for security and privacy reviews. Our DPO can be engaged directly during your procurement review.
Infrastructure
Multi-tenant (default)
Fully-managed, multi-region Postgres and Redis. Per-tenant isolation at the application layer with row-level security on every query.
Dedicated infrastructure
Single-tenant database, cache, and object storage — deployed in the region of your choice (us-east-1, us-west-2, eu-west-1, eu-central-1, ap-southeast-2). Available on Enterprise plans.
Data encryption
TLS 1.2+ in transit. AES-256 at rest for database, object storage, and backups. Secrets (API keys, IdP certs) are stored encrypted and redacted in all logs.
Backups & recovery
Point-in-time recovery with a 30-day retention window on Enterprise. Quarterly restore drills. RTO ≤ 4 hours, RPO ≤ 5 minutes.
Enterprise support
Every Enterprise customer gets a named point of contact who knows your hiring workflows — not a queue, not a rotating pool.
Dedicated Customer Success Manager
A named CSM who leads onboarding, runs quarterly business reviews, surfaces product roadmap items relevant to you, and is your escalation path for anything that isn't a P1 incident.
Dedicated Solutions Engineer (on request)
For complex integrations — SAML edge cases, custom ATS field mapping, webhook pipelines — we pair you with an SE who owns the outcome end-to-end.
Vulnerability disclosure & responsible reporting
We welcome reports from the security research community. If you believe you have found a vulnerability in any ClarityHire product, please report it to us privately so we can fix it before it is disclosed publicly.
How to report
Email [email protected] with a clear description, reproduction steps, affected URL or endpoint, and any proof-of-concept. We acknowledge new reports within 2 business days and provide a triage update within 5 business days. Please do not file vulnerability reports through public support channels or social media.
Encrypt sensitive findings
For sensitive issues, encrypt your report with our PGP key (fingerprint and key file linked from /.well-known/security.txt). We also accept reports via Signal — request a number by emailing [email protected].
Safe-harbor commitment
Good-faith research conducted under this policy will not be pursued legally. Stay within scope, avoid privacy violations and service degradation, do not access data beyond what is necessary to demonstrate the issue, and delete any retrieved data promptly.
Scope & rewards
In scope: clarity-hire.com, *.clarity-hire.com, our public APIs, and our mobile clients. Out of scope: third-party SaaS we use, social-engineering, physical attacks, and DoS. We currently run a private bounty — qualifying reports receive monetary rewards based on severity (CVSS) and impact, plus credit in our security acknowledgements.
Need the docs for your security review?
We send security questionnaire responses, penetration-test summaries, and DPAs under mutual NDA within one business day.