Enterprise-grade security
for your hiring data
Hiring data is sensitive. Recrofy is built from the ground up with security controls that enterprise and compliance teams can trust.
Role-Based Access Control (RBAC)
Define who can see what, and who can do what. Admins, recruiters, hiring managers, and read-only stakeholders all get tailored access. No role bleeds into another.
- Granular permission sets per role
- Org-level and job-level access scoping
- Configurable approval authority per stage
Audit Logs
Every action in Recrofy is logged, who approved a candidate, who changed a job's status, who exported data, and when. Full traceability for compliance and internal review.
- Immutable, timestamped action log
- Filterable by user, action type, and date range
- Exportable for compliance audits
Data Isolation
Each organization's data is fully isolated at the database level. No shared tables, no data bleed between workspaces. Your candidates, jobs, and employees are yours alone.
- Per-organization data isolation
- No cross-tenant data access possible
- Dedicated storage per workspace
Document Protection
Resumes, contracts, and offer letters are stored encrypted at rest and in transit. Access is scoped to authorized users only. Documents are never indexed by third parties.
- AES-256 encryption at rest
- TLS 1.3 encryption in transit
- Access-controlled document storage
Security questions?
Our team is happy to provide security documentation, complete vendor questionnaires, or schedule a technical deep-dive for your IT and compliance teams.
Contact our security teamSecure hiring at scale
Enterprise controls. Startup speed. Built for both.
No credit card required · Free plan available · Setup in minutes