Security & Compliance2018-08-14T07:07:58+00:00

Security & Compliance

Security, Trust, and Confidentiality are core priorities for WorkJam.

WorkJam is very serious about your security. We recognize that our customers care deeply about privacy and data security and we focus on ensuring that these are safeguarded at all times. We follow industry standard best practices which include:

  • Encryption of data in-transit and at rest
  • Web application security protection
  • Real-time security monitoring
  • Industry standard security controls to protect customer data
  • Security Controls throughout Software Development Life-Cycle following OWASP
  • Strict Privacy and Information Security Policies
  • SAML Based SSO

Our Practices

Privacy

We are committed to protecting your privacy from unauthorized access. You own your data and we only collect the minimum required to have the greatest user experience.

Compliance

We continuously test our operations, environment, and controls and certify them using top-tier independent third-parties. We manage information security based on the SOC2 and ISO 27001 framework. WorkJam is also dedicated to working with our customers and users to help them with compliance for the General Data Protection Regulation (GDPR).

Availability

We are dedicated to ensuring your service operates at peak performance at all times. The service is built for optimal performance and high availability. Our Security and Operations Teams are on call 24/7 to respond to security alerts and events.

Product Security

We make it seamless for our customers to manage access policies with authentication and single-sign on (SSO) options. All communications with WorkJam servers are encrypted using industry standard HTTPS over public networks, meaning the traffic between you and WorkJam is secure. Integrity mechanisms are implemented throughout the platform, from continuous backup to data validation.

Application Security

We securely develop and test against security threats to ensure the safety of our customer data. In addition, WorkJam uses third-party security experts to perform detailed penetration testing.

Quality

Our quality assurance approach is designed to address common vulnerabilities, security flaws, usage of insecure protocols and techniques, as well as common coding mistakes.

Our priority is to provide you with best in class compliance

SOC2 Compliance

Security questions or issues?

If you have any questions or think you may have found a security vulnerability within WorkJam, please get in touch with our security team.