It is our mission to ensure your company and candidate data is protected. We pride ourselves in how the Talent Cloud protects your information.
We use best-in-breed vendors to maintain the security of our products, leveraging strengths to provide a layered, comprehensive approach to security. iCIMS Security Program and Defense-in-Depth Security Model are applied across our entire organization, including our products, corporate environment, employees, vendors, and partners.
iCIMS’ Incident Response Process is based on the NIST 800-61 standard and is aligned to:
This allows for advance preparation, effective response, and minimization of impact, with clearly defined notification requirements.
iCIMS maintains a fully cloud-hosted environment that extends across the globe. Our cloud data center providers are required to meet stringent compliance and certification requirements.
This policy addresses the protection of customer data and protected information. It is designed to provide a consistent application of security policy and controls aligned to best practice for iCIMS and its customers.
Explains how we process, gather, use, store, share, secure, retain, and dispose of confidential Information and personal data on behalf of our customers’ and their users.
Data destruction and media sanitization align with NIST 800-88 standards and are addressed in our IT Security Policy and DSPS.
iCIMS follows industry best practice and encrypts data at rest using AES 256-bit encryption or better and in transit requiring at a minimum TLS 1.2.
iCIMS maintains a comprehensive business continuity and disaster recovery plan to ensure full availability of our customers’ critical data in the event of a disaster.
iCIMS cares deeply about the security of both our customers and partners, and our team of security experts strives to quickly address security issues involving our products and services.
Is data encrypted? How are passwords stored? Find answers to our top questions.