- Product Security
- Multi-Factor Authentication
To protect sensitive data, Argyle utilizes encryption, multi-factor authentication, password protection, and limiting access to systems.
- Role-Based Access Control (RBAC)
Logical access to our platform is secured through authentication and role-based access controls.
2 more topics
- Data Security
- Data Encrypted At-Rest
Data at rest is required to be encrypted with AES 256 or stronger.
- Data Encrypted In-Transit
Data in transit is required to have TLS 1.2+ encryption at a minimum.
Kindly review our Privacy Notice to learn more about how Argyle empowers consumers by giving them tools to access and make their own income, employment, and other work-related data portable.
- Data Removal Requests
We have a standard workflow for data deletion requests, which can be requested via our platform / website.
- Incident Management & Response
- Incident Response Plan (IRP)
We have a documented Issue Managment process and Incident Response Plan (IRP) with clearly defined roles.
- Availability & Reliability
- Auto Scaling
Our GCP set up has auto scaling capacity to ensure that we have excess capacity when needed to operate.
- Quality Assurance Testing
We conduct rigorous and extensive QA testing on all Argyle products and services.
2 more topics
- Organizational Security
- Confidentiality Agreements
All new hires are required to sign an employment or contractor's agreement, including a confidentiality agreement.
- Employee Background Checks
Background checks are initiated for all new personnel as permitted by local laws prior to their start date.
4 more topics
- Business Continuity
- Business Continuity Plan
We have a doucmented BCP and perform annual BCP/DR tests to confirm procedures are operational.
- Data Backups
Our Infrastructure configured to automatically backup data and these backups are stored in GCP.
- Threat Management
- Penetration Testing
Our dedicated security team performs continuous penetration and stress testing of our systems. Additionally, we work with external partners for regular penetration testing.
- Vulnerability Scanning
We have internal vulnerability monitoring and external vulnerability scanning in place to keep up with new threats while validating security controls to maintain our secuirty posture.
Sign up to see the rest of Argyle's posture and unlock unlimited access.
Unlimited access to the directory allows you to review and compare thousands of security postures sourced from around the web.