We recognize the importance of protecting sensitive information entrusted to us by our clients, candidates, and partners. We maintain robust administrative, technical, and physical safeguards designed to protect personal and confidential data from unauthorized access, use, or disclosure.
Data Collection & Use
We collect and process personal information solely for legitimate business purposes, including recruitment, staffing, employment administration, and compliance obligations.
Data may include:
Contact and identification information
Employment and professional history
Background verification details (where applicable and with consent)
Data Privacy & Confidentiality
We handle personal data in accordance with applicable data protection and privacy laws, including:
US federal and state privacy regulations
Fair Credit Reporting Act (FCRA)
Client contractual data protection requirements
Access to personal data is restricted to authorized personnel with a legitimate business need.
Information Security Controls
Our security framework includes:
Secure systems and controlled access
Data encryption and secure transmission protocols
Regular system monitoring and risk assessments
Vendor and third-party security oversight
Background Checks & Third-Party Providers
Where background checks are required, they are conducted in compliance with the Fair Credit Reporting Act (FCRA) and applicable state laws, with prior candidate consent. Third-party providers are vetted to ensure compliance with security and privacy standards.
Data Retention & Disposal
Personal data is retained only for as long as necessary to fulfill business and legal obligations. Secure disposal practices are followed to prevent unauthorized access or misuse.
Incident Response & Reporting
We maintain incident response procedures to identify, respond to, and mitigate potential data security incidents. Any confirmed data breach is addressed promptly in accordance with contractual and legal obligations.
Continuous Improvement
We regularly review and update our security and privacy practices to align with evolving regulatory requirements, industry standards, and enterprise client expectations.