Product

The employee referral platform

Take the friction out of employee referrals with a process that focuses on employee engagement.

Employee referral engagement

Create a sense of friendly competition with employee referral campaigns, leaderboards and point redemption.

Employee referral automation

Match your employees networks against open jobs, giving your recruiters referrals they actually want to hire.

Employee referral management

Easily track submissions, approvals, rewards, and payouts from one centralized dashboard and never miss a referral bonus payout again.

See the whole platform

How can we help?

Employee engagement
Gamification
Referral bonus payouts

Integration

All integrations
Slack
Resources
Overview

Improve your referral experience with expert resources for talent acquisition leaders.

View all resources
Read

Resources for people and talent leaders across the globe building high-performing teams.

Blog
Referral program examples
e-Book
Listen

Brilliant people and talent leaders discuss how they built their companies through effective hiring, with us.

Podcast
Connect

Listen to our story, how we came about and why we’re building the next generation referral plaform

About us
Careers
Pricing
Log in
Book a demo
Back to Help Center

Security

Security

What and where does Intrro store the data it collects?

Do you fill out security assessments?

Who is the security contact?

Single Sign-On

User Roles

Passwords

Application Infrastructure

Vulnerability Management

Intrusion Detection and Prevention

Logical Separation

Incident Response

Vulnerability Disclosure

Software Development Life Cycle

Data Encryption

Data Subprocessors

New SCCs & the GDPR

California Consumer Privacy Act

High Availability

Business Continuity

Disaster Recovery

Backups

Security Training

Risk Management

Security Policies

Vendor Management

Confidentiality Agreements

Endpoint Security

SOC 2 Type II

1. Definitions

2. Customer Data subject to EU Data Protection Law

3. Purpose and Scope

4. Security

5. Data Subject Rights

6. Customer Personal Data Breach

7. Sub-Processors

8. Audit

9. Impact Assessment

10. Data Deletion

11. Transfer Mechanisms

12. Customer Data subject to CCPA

13. Customer Data subject to LGPD

14. Customer Responsibilities

15. Liability

16. Term and Termination

17. General

Annex 1A

Annex 1B

Annex 1C

Annex 2

Annex 3

Compliance Documentation

Data Subjects Rights

Consent

Data Breach

SOC 2 Type II

Software Development Life Cycle

Intrro maintains documented Software Development Life Cycle (SDLC) policies and procedures to guide developers in implementing and documenting application and infrastructure changes.

Development environments

All code is deploy and tested in a staging (development) environment that is functionality equivalent to production environments. Intrro performs testing and quality assurance procedures in this staging environment before releasing to the production environment that is used by customers. No customer data is ever used or accessible from staging or local development environments.

Version control

Intrro employs Git version control to maintain source code versions and manage the migration of source code through the development process through to release. Using a decentralized version control allows multiple developers to work simultaneously on features, bug fixes, and new releases; it also allows each developer to work on their own local code branches in a local environment. Git maintains a history of code changes, supports rollback capabilities and tracks changes to individually identifiable developers.

All code is written, tested, and saved in a local repository before being synced to the origin repository. Writing code locally decouples the developer from the production version of the Intrro code base and insulates Intrro from accidental code changes that could affect users. Any changes involving the persistence layer (database) are performed locally when developing new code, where errors or bugs can be spotted before the change is deployed to users.

Code review

Code changes are managed and reviewed through Git pull requests. Every pull request is manually reviewed and approved by two developers before it can be merged. Automatic and integrated testing is also performed with each pull request, and all tests must pass before a code change can be merged.

Developers are trained in evaluating code for security defects as part of code review, and automatic testing is employed to test against common security defects.

Security bugs

Security bugs represent key issues and should be resolved quickly to maintain the security, confidentiality, privacy, processing integrity, and availability of the Intrro service. Intrro has SLAs in place to enforce compliance with resolving security bugs within reasonable timelines.

Employee referrals made easy

Product

  • Employee referral
  • Referral automation
  • Referral management

Resources

  • Help center
  • PodcastBlogReferral resourcese-Book

Company

  • About us
  • CareersSecurity

Subscriber to our newsletter

Get event invites plus product and referral insights

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
© 2023 Intrro
Terms of ServicePrivacy PolicyCookie Notice
We use cookies to enhance your browsing experience and analyze website traffic. By continuing to use our website, you consent to the use of cookies. You can manage and customize your cookie preferences here.
PreferencesDenyAccept All

Privacy preferences

Required
Essential cookies
Essential cookies are necessary for the proper functioning of this website. They enable basic features such as page navigation, secure access to certain areas, and user authentication. These cookies do not gather any personally identifiable information and are essential for you to browse the website and use its features
Marketing
Marketing cookies are used to track visitors across websites. The intention is to display content that are relevant and engaging for you. These cookies help us analyze and understand your preferences, interests, and browsing behavior, allowing us to deliver targeted advertising and promotional content.
Personalization
Personalization cookies are used to enhance your browsing experience by tailoring the website content and features to your preferences. These cookies enable us to remember your choices (such as language selection, region, or font size) and provide you with a more personalized and relevant experience.
Analytics
Analytics cookies are used to collect information about how visitors use our website. These cookies help us understand user behavior, measure website performance, and generate statistical data for analysis. The data collected through these cookies is aggregated and anonymized, meaning it does not personally identify you.
Reject all cookiesAllow all cookiesSave preferences