What and where does Intrro store the data it collects?
Intrro accesses only the name, current company, and job title of your 1st degree LinkedIn contacts, only if you explicitly opt-in. This information is provided for the sole purpose of matching your contacts to open positions and enabling you to make an Intrro if you agree.
Intrro will never contact anyone or do anything without your permission. Intrro does not collect sensitive information such as private mails and there are no automatic opt-ins that spam your connections. Intrro uses only the name, company name, and job title of your connections to make smart recommendations for the purposes of hiring only.
Find below a more thorough breakdown of the particulars of the data processing.
The web application is hosted in the Amazon Web Services eu-west-2 region located in London, United Kingdom.
Do you fill out security assessments?
We understand that many organizations have vendor risk management processes in place, and we want to be transparent in how we operate, secure, and manage our services at Intrro.
This is why we have published detailed information on topics such as product security features, infrastructure and network security, data security and privacy, business continuity and disaster recovery, corporate security, compliance, and more.
We have provided this information to assist organizations in conducting their own due diligence on the security and operation of the Intrro service, without delay or the need for your teams to work through our lengthy questionnaire responses.
If your organization has non-standard, bespoke requirements or custom questionnaires that you want us to complete, please note that we only offer this service for those purchasing an enterprise workspace. Customers with an enterprise workspace should contact their account manager for more information.
The senior engineering team, lead by the CTO, is responsible for carrying out all security policies and procedures at Intrro. This team has a direct communication line to the CEO and can communicate with the CEO at any time.
The CTO assumes the role of Security Officer and is responsible for creating and enforcing security policies and procedures; leading the monitoring, vulnerability management, and incident detection and response initiatives; and tracking and reducing risk organization-wide.
Can my organization request to modify the DPA?
We are unable to accept modifications to our DPA.
Have you adopted the new Standard Contractual Clauses?
Yes. In light of the new Standard Contractual Clauses adopted and approved by the European Commission, we have updated out DPA to incorporate the SCCs. You can learn more at New SCCs & the GDPR.