Back to Help Center
Security & Compliance
🔒

Data & Security

Enterprise-grade data security, privacy protection, and compliance practices for Pier's AI recruiting platform.

Executive Summary

Pier is committed to enterprise-grade data security and privacy protection. While we are an early-stage product currently in pilot phase, we adhere to American enterprise compliance standards with SOC 2-aligned controls and maintain flexibility to meet client-specific security requirements.

This document provides a high-level overview of our current data governance practices and our commitment to evolving alongside our clients’ security needs.


Data Security & Protection

Encryption

Data in Transit:

  • All data transmitted to and from Pier is encrypted using industry-standard HTTPS/TLS protocols
  • Real-time voice communications utilize encrypted WebRTC connections
  • All API endpoints enforce encrypted connections

Data at Rest:

  • All stored data is encrypted at rest using enterprise-grade encryption
  • We utilize well-known, certified infrastructure providers that maintain their own security certifications
  • Database encryption is managed through certified cloud database providers
  • Voice recordings and candidate artifacts are stored in encrypted object storage

Infrastructure Security

  • Cloud Infrastructure: Hosted on enterprise-certified cloud providers with 99.9%+ uptime SLAs
  • Database: Managed PostgreSQL with automated backups, point-in-time recovery, and encryption at rest
  • Application Hosting: Serverless architecture with automatic scaling and built-in DDoS protection
  • Voice Storage: Enterprise object storage with encryption, versioning, and lifecycle management

Access Control & Authentication

Authentication

  • Secure authentication using industry-standard OAuth 2.0 protocols
  • Database-backed session management with secure session tokens
  • Multi-factor authentication support available upon request

Authorization & Access Control

  • Role-based access control (RBAC) architecture
  • Granular permissions for different user types (administrators, hiring managers, interviewers, candidates)
  • Access controls customizable to meet client-specific requirements
  • Session-based authorization enforced at both UI and API layers

Secrets Management

  • Production secrets managed via secure cloud environment variable systems
  • No credentials stored in code or version control
  • Automated secret rotation capabilities

Audit & Compliance

Audit Logging

  • Application-level audit logging of key user actions and system events
  • Logging capabilities expandable to meet client-specific requirements
  • We work collaboratively with clients to implement additional logging for compliance needs

Compliance Posture

  • SOC 2 Alignment: Following SOC 2-aligned security controls and best practices
  • GDPR Considerations: While not EU-based, we implement GDPR-inspired data protection principles
  • Data Processing Agreement: Standard DPA available for all pilot and production clients
  • Privacy by Design: Security and privacy considerations integrated into product development

Data Governance Framework

Data Retention:

  • Configurable retention periods based on client requirements
  • Automated data lifecycle management capabilities
  • Secure deletion protocols for data removal requests

Data Deletion:

  • Secure data deletion processes following industry best practices
  • Support for right-to-erasure requests
  • Complete removal from active systems and backups within defined timeframes

Data Access Requests:

  • Processes in place to support data subject access requests
  • Ability to export candidate and interview data in standard formats
  • Transparent data handling practices

API Security

Input Validation

  • All API inputs validated using strict schema validation
  • Protection against injection attacks and malformed data
  • Type-safe APIs preventing common security vulnerabilities

API Authentication

  • API key-based authentication for system integrations
  • Secure webhook implementations for ATS integrations
  • Rate limiting and abuse prevention mechanisms

Integration Security

ATS & Third-Party Integrations

  • Secure webhook-based integrations with industry-standard authentication
  • Configurable data payloads to share only necessary information
  • Support for custom integration security requirements
  • Engineering support available during pilot to configure integrations securely

Incident Response & Support

Security Incident Response

  • Defined incident response procedures
  • Rapid notification to affected clients in case of security incidents
  • Transparent communication about security events

Ongoing Security Support

  • Dedicated engineering support during pilot phase
  • Flexible adaptation to client-specific security requirements
  • Regular security reviews and updates
  • Proactive communication about security enhancements

Language & Localization

Current Language Support

  • Production system operates in English
  • Brazilian Portuguese and Spanish support planned for Q1 2026
  • Pilot partners will help shape multilingual releases
  • Security and compliance practices consistent across all language implementations

Client-Specific Customization

As an early-stage product working closely with pilot partners, we maintain flexibility to:

  • Implement additional audit logging as required
  • Customize access control models for specific organizational needs
  • Adapt data retention policies to meet regulatory requirements
  • Provide additional security documentation and evidence as needed
  • Configure integrations to meet client security standards
  • Support client security audits and assessments

Data Governance Roadmap

We are actively developing and enhancing our security and compliance posture:

  • In Progress: SOC 2 Type II certification process
  • Planned: Enhanced audit logging and reporting capabilities
  • Planned: Advanced role-based access control features
  • Planned: Automated compliance reporting
  • Ongoing: Regular security assessments and penetration testing
  • Ongoing: Infrastructure security hardening

Contact & Questions

For specific security questions, custom requirements, or to request our Data Processing Agreement (DPA), please contact:

Brandon John-Freso, CTO Brandon@pier.so

We’re committed to transparency and working collaboratively with our clients to meet their security and compliance needs.

Ready to transform your recruiting process?

See how Malia can help you save 15+ hours per week and only interview pre-qualified candidates.