Privacy
Polygraph tests
We regularly run polygraph tests on all talent with access to sensitive information. The tests focus entirely on identifying whether an talent has disclosed confidential information to a third party. Personal questions are never asked.
Employee time tracking software
We use a time tracking system that periodically takes screenshots of laptop screens while talent are working. Only managers have access to these screenshots in case an incident happens. Employees have control over the software, which means that no ...
OTR messaging
We use a messaging system with OTR and E2EE for communication within the organization. Additionally, all chat histories are reset every day as an extra measure to avoid leaks. Requirements 181. Transmit data using secure protocols 183. Delete ...
Retention
As a company, ensuring the integrity of the services we provide to our users is vitally important. Therefore, when we delete a group on our platform, we retain specific data that contains valuable information about the history of that group, always ...
Data policies
The following policies apply to all information provided by a client in the context of a project. Data use policy We are committed to using our clients' data exclusively for vulnerability scanning in the context of the service we provide. No other ...
Transparent use of cookies
Both our platform and our website use a GDPR module that informs users about every cookie the site creates and lets them specify which ones to allow. It gives them total control over the information we are creating and manipulating within their ...
Unsubscribe email
To be respectful to users regarding the information they want to receive, they have the option to stop receiving all of our commercial and informative emails by clicking on the Unsubscribe from this list link. By doing so, their emails are placed on ...
Secure delivery of sensitive data
Here is what we do to reduce information leakage when delivering data to our clients. Secure information-sharing system We use an information-sharing system with DLP (data loss prevention) when sending sensitive information to our clients. This ...
Email obfuscation
We prevent email leakage through our websites by using email obfuscation. By doing so, malicious web crawlers cannot collect emails related to our company. Requirements 15. Filter malicious emails 123. Restrict the reading of emails 237. Ascertain ...
Project pseudonymization
Every project has a pseudonym within our systems, which brings advantages such as the following: Employees without direct access to the project do not know the client's name or any other information that can help them connect the project with the ...
Manual for the National Database Registry (NDR)
La información mínima que debe contener el Registro Nacional de Bases de Datos es la siguiente. 1. RESPONSABLE Y ENCARGADO DEL TRATAMIENTO DE DATOS PERSONALES NOMBRE: FLUIDSIGNAL GROUP S.A.S. DOMICILIO MEDELLÍN DIRECCIÓN: Carrera. 43 No. 9 Sur - 195 ...
Data privacy policy
Goal Law 1581 of 2012, “By which general provisions are issued for the protection of personal data”, aims to develop the constitutional right that all people have to know, update and rectify the information that has been collected about them on ...