Compliance
Security posture, compliance practices, and program governance.
This draft security overview is provided as a starting point for internal review. It is not a certification statement. Update it to match Reliantcy’s actual controls, assessments, and compliance posture.
Compliance Overview
Reliantcy is designed for HR workflows where integrity, confidentiality, and auditability matter. We use layered safeguards intended to protect data across collection, processing, storage, and transmission.
1. Governance
- Policies & trainingSecurity policies, role-based training, and internal standards for handling sensitive information.
- Risk managementPeriodic risk review to prioritize controls based on threat and business impact.
2. Technical safeguards
- EncryptionEncryption in transit and at rest, where appropriate, to reduce exposure risk.
- Access controlsLeast-privilege permissions, strong authentication, and controlled administrative access.
- Monitoring & loggingLogging and monitoring intended to detect abuse, anomalies, and unauthorized access.
- Secure developmentChange control and review practices designed to reduce defects and security risks.
3. Operational safeguards
- Vendor managementDue diligence and contractual protections for key service providers.
- Data minimizationCollect and retain data aligned to service needs, contractual obligations, and legal requirements.
- Business continuityBackups and recovery planning designed to support availability and integrity.
4. Incident response
We maintain an incident response process intended to triage, contain, investigate, and remediate security events. When required by law or contract, we will provide notifications to affected parties.
5. Compliance (where applicable)
Reliantcy supports employment screening and compliance workflows that may be governed by laws and regulations such as the FCRA and relevant state requirements. Clients are responsible for their own compliance obligations, including required notices, authorizations, and adverse action procedures.
6. Vulnerability reporting
If you believe you have found a security vulnerability, please contact us with details so we can investigate.
Last updated: 2026-01-02