Security
Security & Compliance
Your data security is our priority. Here's how we protect your information.
🔐 OAuth-Only Authentication
We never see or store your LinkedIn password. Authentication happens directly with LinkedIn via OAuth 2.0. We only receive a secure, revocable access token.
🛡️ SOC 2 Aligned Practices
Our infrastructure and processes follow SOC 2 Type II control frameworks. We implement industry-standard security controls for data protection, access management, and monitoring.
🔒 Encryption
All data is encrypted in transit (TLS 1.3) and at rest (AES-256). API tokens are stored using industry-standard encryption with secure key management.
🏢 Infrastructure
We use enterprise-grade cloud infrastructure with automatic failover, regular backups, and geographic redundancy. Our providers maintain SOC 2, ISO 27001, and other certifications.
👁️ Access Control
Internal access to customer data is strictly limited, logged, and audited. We follow the principle of least privilege for all system access.
📋 Data Retention
We retain only the data necessary to provide the service. When you cancel, your data is deleted within 30 days. You can request immediate deletion at any time.