Compliance

Security posture, compliance practices, and program governance.

This draft security overview is provided as a starting point for internal review. It is not a certification statement. Update it to match Reliantcy’s actual controls, assessments, and compliance posture.

Compliance Overview

Reliantcy is designed for HR workflows where integrity, confidentiality, and auditability matter. We use layered safeguards intended to protect data across collection, processing, storage, and transmission.

1. Governance

  • Policies & training
    Security policies, role-based training, and internal standards for handling sensitive information.
  • Risk management
    Periodic risk review to prioritize controls based on threat and business impact.

2. Technical safeguards

  • Encryption
    Encryption in transit and at rest, where appropriate, to reduce exposure risk.
  • Access controls
    Least-privilege permissions, strong authentication, and controlled administrative access.
  • Monitoring & logging
    Logging and monitoring intended to detect abuse, anomalies, and unauthorized access.
  • Secure development
    Change control and review practices designed to reduce defects and security risks.

3. Operational safeguards

  • Vendor management
    Due diligence and contractual protections for key service providers.
  • Data minimization
    Collect and retain data aligned to service needs, contractual obligations, and legal requirements.
  • Business continuity
    Backups and recovery planning designed to support availability and integrity.

4. Incident response

We maintain an incident response process intended to triage, contain, investigate, and remediate security events. When required by law or contract, we will provide notifications to affected parties.

5. Compliance (where applicable)

Reliantcy supports employment screening and compliance workflows that may be governed by laws and regulations such as the FCRA and relevant state requirements. Clients are responsible for their own compliance obligations, including required notices, authorizations, and adverse action procedures.

6. Vulnerability reporting

If you believe you have found a security vulnerability, please contact us with details so we can investigate.

Last updated: 2026-01-02