See how Intrro works every Tuesday at 2pm ET

Product
Employee referralsReferral sourcingDiversityReferral AutomationEmployee ExperienceInsightsIntegration for Slack
Personas

Personas

LeadershipTalent OpsRecruiter
PricingCustomers
Resources
Help CenterPodcastBlogToolkite-Book
See Intrro in Action
Company
About usCareersCareers
Get a DemoLog InBook a demo

See how Intrro works every Tuesday at 2pm ET

Pricing
Resources
Help CenterPodcastBlogToolkite-Book
Product
Referral sourcingEmployee referralsDiversityReferral AutomationEmployee ExperienceInsightsIntegration for SlackSee Intrro in Action
Use cases

By Role

LeadershipTalent OpsRecruiter
CustomersSee Intrro in ActionBook a demo
Company
About usCareersCareers
Log InTRY FREE
By clicking “Accept All”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.
PreferencesDenyAccept All

Privacy Preference Center

When you visit websites, they may store or retrieve data in your browser. This storage is often necessary for the basic functionality of the website. The storage may be used for marketing, analytics, and personalization of the site, such as storing your preferences. Privacy is important to us, so you have the option of disabling certain types of storage that may not be necessary for the basic functioning of the website. Blocking categories may impact your experience on the website.
Reject all cookiesAllow all cookies

Manage Consent Preferences by Category

Essential
Always Active
Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
Marketing
These cookies are used to make advertising messages more relevant to you and your interests. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.
Personalization
These cookies may be set through our website by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other websites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Analytics
We use analytics cookies to help us measure how users interact with website content, which helps us customize our websites and application for you in order to enhance your experience.
Confirm my preferences and close
Back to Help Center

Security

Security

What and where does Intrro store the data it collects?

Do you fill out security assessments?

Who is the security contact?

Single Sign-On

User Roles

Passwords

Application Infrastructure

Vulnerability Management

Intrusion Detection and Prevention

Logical Separation

Incident Response

Vulnerability Disclosure

Software Development Life Cycle

Data Encryption

Data Subprocessors

New SCCs & the GDPR

California Consumer Privacy Act

High Availability

Business Continuity

Disaster Recovery

Backups

Physical Security

Security Training

Risk Management

Security Policies

Vendor Management

Confidentiality Agreements

Endpoint Security

SOC 2 Type II

1. Definitions

2. Customer Data subject to EU Data Protection Law

3. Purpose and Scope

4. Security

5. Data Subject Rights

6. Customer Personal Data Breach

7. Sub-Processors

8. Audit

9. Impact Assessment

10. Data Deletion

11. Transfer Mechanisms

12. Customer Data subject to CCPA

13. Customer Data subject to LGPD

14. Customer Responsibilities

15. Liability

16. Term and Termination

17. General

Annex 1A

Annex 1B

Annex 1C

Annex 2

Annex 3

Compliance Documentation

Data Subjects Rights

Consent

Data Breach

Endpoint Security

Intrro has an asset management policy in place to protect data that is stored and accessible via endpoints, such as company workstations and laptops.

Fleet management

All corporate endpoints are protected against internal threats and local vulnerabilities AWS Systems Manager and Vanta. All devices are continuously monitored for the following checks:

  • Full-disk encryption
  • Screen lock enabled
  • Latest security updates
  • Malware detection and anti-virus
  • Personal firewall enabled
  • Unencrypted SSH keys
  • Password management software

All corporate devices are also enrolled in mobile device management (MDM) enabling Intrro to remotely manage assets to ensure compliance with configuration standards and enabling remote lock and erase in the event of a lost or stolen device.

Network security

All corporate wireless networks, including both corporate and guest networks, encrypt data in transit using WPA2-AES encryption. Guest network traffic and access is separated from corporate network traffic and access.

Corporate networks are protected with Intrusion Detection Systems (IDS) and Intrusion Protection Systems (IPS) to block malicious traffic and actors attempting to access Dovetail's corporate network.

Removable media and offline backups

Intrro prohibits use of removable media and offline backups to mitigate both the risk of data loss as well as the risk of malware being introduced.

 


Employee referrals made easy

Intrro - The fastest way to get employee referrals | Product Hunt

Product

  • Referral Automation
  • Employee Experience
  • InsightsDiversity

Resources

  • Help center
  • PodcastBlogToolkite-Book

Company

  • Security
  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • CareersRefer and earn $1,000
© 2022 Intrro