Security controls for RecruiterDocs.

We treat every placement, contract and candidate record as sensitive data.

In short

What this page covers

This page summarizes the controls visible in the product and codebase today, plus the areas where customers should ask for deployment-specific detail.

Access controlsRole-based permissions, approval tokens, and restricted admin surfaces.
Integration securityAuthenticated API tokens, webhook verification, and fail-closed endpoints.
Need the full pack?Email security@recruiterdocs.com for DPA or deployment details.

RecruiterDocs is designed around role-based access, auditable contract actions, internal-only document preview, and fail-closed handling for the integration endpoints implemented today. This page describes the controls present in the repo today and the deployment checks that can block unsafe production settings.

Need something specific such as a DPA or sub-processor list? Email security@recruiterdocs.com.

Security highlights

1. Application access control

2. Data protection in the product

Personal data and GDPR

3. Authentication and integration security

4. Production hardening

5. Operational documents

Some operational controls depend on how RecruiterDocs is deployed. If you need deployment-specific details such as hosting location, logging, backups, restore procedures, or incident handling commitments, request the current security pack from the team.

6. Customer responsibilities

Security is a shared responsibility. To keep your data safe, we ask customers to:

7. Questions and security contact

If you have any security questions, need a copy of our DPA, or would like more details about our controls:

Security email: security@recruiterdocs.com
General support: support@recruiterdocs.com