Security and compliance

We recognize that your data is sensitive

Talenya’s solution is compliant with GDPR regulations

Security and compliance
Security and compliance
Security and compliance
Application Security

Talenya maintains rigid application security measures. Talenya’s procedures and controls have been third-party audited to ensure the security, availability, processing, integrity and confidentiality of our customers’ information, including periodical penetration tests and on-going risk mitigation.

Security and compliance
Cloud Security

Talenya uses Amazon Web Services (AWS) to host its services and is protected by AWS’s data centers and compliance programs in its infrastructure. AWS provides high availability, dependability, and scalability.

Security and compliance
Organizational Security

All Talenya employees and contractors have agreed to confidentiality terms and have passed background screenings, extensive security, and privacy protection training.

Privacy Commitment

Talenya is committed to protecting the privacy of all individuals and companies in respect of whom we collect, receive, hold and process any personal or business data. In general, Talenya does not store or process clients’ private information, other than job descriptions submitted by clients.

Our privacy policy is designed to be compliant with the laws and regulations of where we conduct our business, including without limit, the European Union’s General Data Protection Regulation 2016/679 (“GDPR”) and applicable U.S. privacy laws.

Our privacy notice describes how we collect and process personal data. We are committed to keeping all data confidential and use commercially confidential information of business entities in accordance with all confidentiality agreements that we enter into.

Security and compliance

Information Protection Protocols

Talenya uses industry best practices to guard customer data and ensure that all data transmission over public networks is done with strong encryption. We have adopted the following Information Protection Protocols:

Using Data Silos to eliminate the ability of one user to see other users’ data

Using Amazon Web Services security techniques, including multi-factor authentication for access, and Data Encryption at Rest

Using encryption when transmitting data to customers over public networks

Using TLS 1.2 protocols, AES256 encryption, and SHA2 signatures, where appropriate

Using WAF (Web Application Firewall) to protect Talenya servers and prevent intrusion


Don’t take our word for it, compare us with the rest

Upload any job description into our platform, and we’ll show you the purple squirrels and unicorns that your current tools cannot find.