Ploid

Ploid is an AI-native hiring platform that automates sourcing, interviewing, and evaluating candidates end-to-end—helping teams find the right people faster, globally, and at scale.

Controls

Unique production database authentication enforced Infrastructure security

Encryption key access restricted Infrastructure security

Unique account authentication enforced Infrastructure security

Production application access restricted Infrastructure security

Access control procedures established Infrastructure security

Production database access restricted Infrastructure security

Firewall access restricted Infrastructure security

Production OS access restricted Infrastructure security

Production network access restricted Infrastructure security

Unique network system authentication enforced Infrastructure security

Remote access MFA enforced Infrastructure security

Remote access encrypted enforced Infrastructure security

Log management utilized Infrastructure security

Infrastructure performance monitored Infrastructure security

Network segmentation implemented Infrastructure security

Network firewalls reviewed Infrastructure security

Network firewalls utilized Infrastructure security

Network and system hardening standards maintained Infrastructure security

Asset disposal procedures utilized Organizational security

Portable media encrypted Organizational security

Employee background checks performed Organizational security

Code of Conduct acknowledged by contractors Organizational security

Code of Conduct acknowledged by employees and enforced Organizational security

Confidentiality Agreement acknowledged by contractors Organizational security

Confidentiality Agreement acknowledged by employees Organizational security

Performance evaluations conducted Organizational security

Password policy enforced Organizational security

Visitor procedures enforced Organizational security

Data encryption utilized Product security

Control self-assessments conducted Product security

Penetration testing performed Product security

Data transmission encrypted Product security

Vulnerability and system monitoring procedures established Product security

Continuity and Disaster Recovery plans established Internal security procedures

Cybersecurity insurance maintained Internal security procedures

Configuration management system established Internal security procedures

Development lifecycle established Internal security procedures

SOC 2 - System Description Internal security procedures

Whistleblower policy established Internal security procedures

Board charter documented Internal security procedures

Board expertise developed Internal security procedures

Management roles and responsibilities defined Internal security procedures

Organization structure documented Internal security procedures

Roles and responsibilities specified Internal security procedures

Security policies established and reviewed Internal security procedures

Access requests required Internal security procedures

Incident response policies established Internal security procedures

Incident management procedures followed Internal security procedures

Physical access processes established Internal security procedures

Data center access reviewed Internal security procedures

Company commitments externally communicated Internal security procedures

Service description communicated Internal security procedures

Risk assessment objectives specified Internal security procedures

Risks assessments performed Internal security procedures

Risk management program established Internal security procedures

Data retention procedures established Data and privacy

Customer data deleted upon leaving Data and privacy

Data classification policy established Data and privacy

Data retention procedures established AI Security

Encryption key access restricted AI Security

Unique account authentication enforced AI Security

Customer data deleted upon leaving AI Security

Data classification policy established AI Security

Penetration testing performed AI Security

Data transmission encrypted AI Security