At Recright, we prioritize your and your candidates data security and data privacy. Our platform is designed with GDPR compliance at its core, ensuring that all data is handled with utmost care and respect for your privacy. We host and process all data in EU data centres. Recright is ISO27001 certified, ensuring that all of your data is safe with us.
format_quoteRecright is fully committed to GDPR compliance, ensuring the protection and privacy of all personal data that we handle.
Recright is fully committed to GDPR compliance, ensuring the protection and privacy of all personal data that we handle.
Recright is fully committed to GDPR compliance, ensuring the protection and privacy of all personal data that we handle. Our platform is designed with GDPR principles at its core, including Privacy by Design and Privacy by Default. We conduct regular Data Protection Impact Assessments (DPIAs) and train our staff on data protection principles. We also review our data collection mechanisms to ensure that unnecessary data is neither collected nor retained. Furthermore, we handle all data subject requests in accordance with GDPR requirements, ensuring that individuals’ rights are respected and facilitated. All personal data is hosted in EU based data centres in Dublin, Ireland and Frankfurt, Germany.
Recright takes pride in its ISO 27001 certification, a globally recognized standard for Information Security Management Systems (ISMS). This certification demonstrates our commitment to implementing robust security controls and risk management processes. Our ISMS is audited annually by authorized information security auditors, ensuring that our security measures are up-to-date and effective. We also conduct annual incident simulations (Red Team exercises) and regular risk assessments, with any identified risks analyzed and treated according to ISO 27001 standards. This risk treatment plan is documented, implemented, and its effectiveness is evaluated regularly.
Technical audits are an integral part of Recright’s commitment to maintaining solid information security. These audits, including penetration testing, are conducted annually by a changing third-party as part of our Information Security Management System cycle. The audit methods include interviews of key individuals who have knowledge about the ISMS and review of documentation. Any identified risks are analyzed and treated according to ISO 27001 standards.
Reach out to us for further information, we are happy to share following topics to give you further understanding on our Data Privacy and Information Security: