Security

Security Overview

Enterprise-grade security controls to protect your hiring data. We take the trust you place in us seriously.

Last updated: March 1, 2025

1Our Security Commitment

Security is foundational to ZeaHire. We design our infrastructure, processes, and policies with a security-first mindset to protect the sensitive candidate and organisational data that enterprises entrust to us. We align with SOC 2 Type II, ISO 27001, and GDPR standards.

2Data Encryption

  • Data at rest: AES-256 encryption for all stored data including candidate records, interview recordings, and assessments.
  • Data in transit: TLS 1.3 enforced for all communications between clients and our servers.
  • Database encryption: Column-level encryption for PII fields including names, emails, and contact details.
  • BYOK Support: Bring Your Own Key encryption available for enterprise customers requiring key ownership.

3Infrastructure Security

  • Hosted on ISO 27001-certified cloud infrastructure with regional data residency options.
  • Network segmentation with private VPCs, WAF, and DDoS protection.
  • Automated vulnerability scanning and penetration testing conducted quarterly.
  • Immutable audit logs for all data access and administrative actions.
  • Zero-trust network architecture with least-privilege access controls.

4Access Controls

  • Role-based access control (RBAC) with granular permission management.
  • Multi-factor authentication (MFA) enforced for all platform accounts.
  • Single Sign-On (SSO) integration via SAML 2.0 and OpenID Connect.
  • Session management with automatic timeout after inactivity.
  • IP allowlisting available for enterprise deployments.

5Application Security

  • Secure software development lifecycle (SSDLC) with security reviews at every stage.
  • OWASP Top 10 vulnerability assessments for all code releases.
  • Dependency scanning and automated patch management.
  • Input validation and parameterised queries to prevent injection attacks.
  • Content Security Policy (CSP) headers and XSS protections.

6AI Model Security

  • AI models are trained on curated, consent-cleared datasets.
  • Regular bias audits to ensure fair and equitable scoring across demographic groups.
  • Model outputs are explainable — every score comes with a human-readable rationale.
  • Candidate data is never used to train models without explicit consent.
  • Adversarial input testing to prevent prompt injection and model manipulation.

7Compliance Frameworks

  • GDPR: EU/UK General Data Protection Regulation compliant with DPA agreements available.
  • PDPA: Malaysia Personal Data Protection Act compliant.
  • SOC 2 Type II: Annual audit against AICPA Trust Service Criteria.
  • ISO 27001: Information security management system alignment.
  • CCPA: California Consumer Privacy Act compliance for US customers.

8Incident Response

We maintain a 24/7 security operations capability. In the event of a data breach, we commit to notifying affected customers within 72 hours in line with GDPR requirements. We conduct post-incident reviews and publish remediation reports to impacted customers.

9Deployment Options

  • Cloud SaaS: Multi-tenant hosted on our managed infrastructure with full security controls.
  • Private Cloud: Dedicated single-tenant environment in your preferred cloud region.
  • On-Premise: Full installation within your own data centre or private cloud environment.
  • Hybrid: Flexible model combining cloud-hosted services with on-premise data storage.

10Security Reviews and Audits

Enterprise customers may request security documentation including our SOC 2 report, penetration test executive summaries, and Data Processing Agreements under NDA. Contact our security team at security@zealogics.com to initiate a security review.

11Responsible Disclosure

We welcome responsible disclosure of security vulnerabilities. If you discover a potential security issue, please report it to security@zealogics.com with details of the vulnerability. We commit to acknowledging reports within 48 hours and working with you to resolve confirmed issues.

Questions? Contact us at legal@zealogics.com