security

Protecting You.
Protecting Candidates.

We’re committed to protecting your data and your people. If you have questions about your account, please contact our support team.

Turn’s Technical Security Specs

PREFERRED INTEGRATIONS

The Turn approach to data security​

The screening and hiring process requires access and dispersal of sensitive information such as your candidates’ personal information and specific data about your company. Here’s how we make sure you’re safe with us:

SOC 2 Compliance

Turn utilizes enterprise-grade best practices to protect our customers’ data and works with independent experts to verify its security, privacy and compliance controls, and has achieved SOC 2 report against stringent standards.

End-to-End Encryption

We use state-of-the-art technology to ensure all data we access, send or store is encrypted on every level, and through every transmission. This encryption ensures that even if we do experience a breach, sensitive information remains protected.

Limited Data Access

We don’t sell, share, or make available any consumer, partner, or candidate data to any third party organization, vendor, or software outside of Turn. Within our organization, data is kept under lock and key, protected by the teams.

Contact us

Any questions or concerns?

Let us know. We will get in touch with you to clarify.

Ready to get started?

Turn makes screening faster, easier, and more compliant, all while lowering costs. Talk to our experts and see how companies across 30+ industry verticals have upgraded their screening process.