🔐 OAuth-Only Authentication

We never see or store your LinkedIn password. Authentication happens directly with LinkedIn via OAuth 2.0. We only receive a secure, revocable access token.

🛡️ SOC 2 Aligned Practices

Our infrastructure and processes follow SOC 2 Type II control frameworks. We implement industry-standard security controls for data protection, access management, and monitoring.

🔒 Encryption

All data is encrypted in transit (TLS 1.3) and at rest (AES-256). API tokens are stored using industry-standard encryption with secure key management.

🏢 Infrastructure

We use enterprise-grade cloud infrastructure with automatic failover, regular backups, and geographic redundancy. Our providers maintain SOC 2, ISO 27001, and other certifications.

👁️ Access Control

Internal access to customer data is strictly limited, logged, and audited. We follow the principle of least privilege for all system access.

📋 Data Retention

We retain only the data necessary to provide the service. When you cancel, your data is deleted within 30 days. You can request immediate deletion at any time.

Questions about security?

We're happy to discuss our security practices in detail.

Contact Us