Security & Data Privacy
Last updated July 25, 2024
Checkr is committed to safeguarding the security and privacy of your data, ensuring that your information is handled responsibly and ethically. This guide outlines Checkr's commitment to security, data privacy practices, and the measures taken to protect your information.
Checkr's Security and Data Privacy Practices
- Data Encryption: Checkr uses industry-standard encryption technologies to protect data in transit and at rest.
- Secure Infrastructure: Checkr's systems are hosted in secure data centers with robust physical and network security measures.
- Access Controls: Access to your data is strictly controlled with multi-factor authentication and role-based access controls, limiting access based on individual permissions.
- Regular Security Audits: Checkr undergoes regular security audits and penetration testing to identify and address potential vulnerabilities.
- Compliance with Regulations: Checkr adheres to all applicable regulatory requirements for data security and privacy, including the Fair Credit Reporting Act (FCRA) and other relevant laws.
- Data Minimization: Checkr collects and stores only the data necessary for providing its background check services.
- Data Retention: Checkr follows data retention policies to securely manage and dispose of data in accordance with legal and regulatory requirements.
- Data Transparency: Checkr provides clear and accessible information about its data privacy practices in its Privacy Policy, available on its website.
- Data Subject Rights: Checkr provides individuals with the right to access, modify, or delete their personal data held by Checkr.
Security Best Practices for Users
- Strong Passwords: Use strong passwords and avoid using the same password for multiple accounts.
- Two-Factor Authentication (2FA): Enable 2FA for enhanced security, requiring a second authentication step when logging in.
- Secure Connections: Use secure connections (HTTPS) when accessing Checkr's platform.
- Phishing Awareness: Beware of phishing emails or suspicious links that may try to obtain your account credentials.
- Report Security Concerns: Report any suspected security breaches or data breaches immediately to Checkr's support team.
Checkr's commitment to security and data privacy ensures that your information is protected and handled responsibly.
Was this article helpful?