The Turn Approach to Data Security

The screening and hiring process requires access and dispersal of sensitive information such as your candidates’ personal information and specific data about your company. Here’s how we make sure you’re safe with us:

<h4>SOC 2 Compliance</h4>

SOC 2 Compliance

Turn utilizes enterprise-grade best practices to protect our customers’ data and works with independent experts to verify its security, privacy and compliance controls, and has achieved SOC 2 report against stringent standards.
<h4>End-to-End Data Encryption</h4>

End-to-End Data Encryption

We use state-of-the-art technology to ensure all data we access, send or store is encrypted on every level, and through every transmission. This encryption ensures that even if we do experience a breach, sensitive information remains protected.
<h4>Limited Data Access</h4>

Limited Data Access

We don’t sell, share, or make available any consumer, partner, or candidate data to any third party organization, vendor, or software outside of Turn. Within our organization, data is kept under lock and key, protected by the teams who use it.
<h4>Responsible Communication</h4>

Responsible Communication

Turn is committed to 100% compliance with all regulations and best practices regarding disclosures if and when data is breached or made vulnerable.

Turn’s Technical Security Specs

<h3>Encrypted PII with AES 256 Bit Encryption</h3>

Encrypted PII with AES 256 Bit Encryption

<h3>Extend Validation Certification and HTTPS</h3>

Extend Validation Certification and HTTPS

<h3>Strong Cryptography with Consistent Key Rotation </h3>

Strong Cryptography with Consistent Key Rotation

Turn Technologies 2022©, All rights reserved.