Trust & Security | Data Protection | BackgroundChecker.com

Trust & Security You Can Rely On

Background checks involve sensitive personal information. We protect it with enterprise-grade security, strict compliance, and transparent practices. Your data — and your candidates’ data — is safe with us.

🔐 SOC 2 Type II 📋 FCRA Compliant 🔒 End-to-End Encryption 🚫 Never Sell Data
SOC 2Type II Certified
99.99%Uptime SLA
0Data breaches
24/7Security monitoring

Our Commitment to Your Data

Security isn’t a feature — it’s the foundation of everything we build.

🛡️ We Protect Your Data

Background checks contain sensitive personal information — Social Security numbers, criminal records, financial data. We treat this data with the respect and protection it deserves.

  • Enterprise-grade encryption everywhere
  • Strict access controls
  • Regular security audits
  • 24/7 monitoring

🚫 We Never Sell Your Data

Your data is yours. We never sell, rent, or share personal information with third parties for marketing or any other purpose outside of completing your background checks.

  • No data sales — ever
  • No third-party marketing
  • Minimal data collection
  • Clear retention policies

Security Pillars

Multiple layers of protection at every level.

🔐

Data Encryption

All data protected with industry-leading encryption standards.

  • TLS 1.3 in transit
  • AES-256 at rest
  • AWS KMS key management
  • Encrypted backups
  • Secure key rotation
👤

Access Control

Strict controls ensure only authorized access to sensitive data.

  • Role-based access (RBAC)
  • Multi-factor authentication
  • SSO/SAML support
  • Session management
  • Principle of least privilege
🔍

Monitoring & Audit

Complete visibility into all system activity.

  • 24/7 security monitoring
  • Real-time threat detection
  • Complete audit logs
  • Anomaly detection
  • Incident response team
🏗️

Infrastructure Security

Cloud infrastructure built for security and reliability.

  • AWS cloud hosting
  • Multi-AZ redundancy
  • DDoS protection
  • WAF (Web Application Firewall)
  • Network segmentation
🧪

Security Testing

Proactive testing identifies vulnerabilities before attackers do.

  • Annual penetration testing
  • Continuous vulnerability scanning
  • Third-party security audits
  • Bug bounty program
  • Code security reviews
📋

Secure Development

Security built into our software development lifecycle.

  • Secure SDLC
  • Code review requirements
  • Dependency scanning
  • Container security
  • Security training

Security Certifications

Third-party validated security and compliance.

🔐

SOC 2 Type II

Annual audit by independent assessors verifying security controls are properly designed and operating effectively.

📋

FCRA Compliant

Registered Consumer Reporting Agency following all Fair Credit Reporting Act requirements.

🌍

GDPR Compliant

EU General Data Protection Regulation compliance for international candidates and operations.

🏢

PBSA Member

Professional Background Screening Association member adhering to industry best practices.

🏥

HIPAA Ready

Healthcare data protection compliance for covered entities and business associates.

💳

PCI DSS

Payment Card Industry Data Security Standard compliance for credit card handling.

🇺🇸

State Compliance

Compliance with state-specific privacy and background check laws across all 50 states.

⚖️

EEOC Guidance

Tools and workflows that support EEOC guidance on individualized assessment.

📄 Request Security Documentation

Enterprise customers can request our SOC 2 Type II report, penetration test summary, and security questionnaire responses under NDA.

Request Documentation →

Regulatory Compliance

Legal compliance built into every background check.

📋 FCRA Compliance

As a registered Consumer Reporting Agency, we follow all Fair Credit Reporting Act requirements:

  • Standalone disclosure documents
  • Written authorization requirements
  • Pre-adverse action process
  • Final adverse action notices
  • Dispute resolution process
  • Permissible purpose verification

🌍 GDPR Compliance

For EU candidates and operations, we comply with GDPR requirements:

  • Lawful basis for processing
  • Data subject rights (access, deletion)
  • Data minimization
  • Purpose limitation
  • Cross-border transfer safeguards
  • Data protection officer

How We Handle Your Data

Transparency about our data practices.

📥

Collection

We collect only the data necessary to complete your background check. No unnecessary information gathering.

🔒

Storage

Data stored in encrypted AWS infrastructure with strict access controls and geographic restrictions.

⏱️

Retention

Data retained only as required by law and your needs. Clear retention schedules with automatic deletion.

🔐

Access

Strict role-based access ensures only authorized personnel can view sensitive information.

🚫

Sharing

We never sell data. Sharing only with data sources necessary to complete checks, under strict agreements.

🗑️

Deletion

Secure deletion when retention period ends. Candidates can request deletion of their data.

Candidate Rights & Protections

We protect the rights of the people being screened.

📄 Right to Disclosure

Candidates have the right to know when a background check is being conducted and what information will be gathered.

  • Clear disclosure before screening
  • Written authorization required
  • Summary of rights provided

👁️ Right to Access

Candidates can request a copy of their background check report and see what information was found.

  • Free copy upon request
  • Report explanation available
  • Source information provided

⚠️ Right to Dispute

If information is inaccurate, candidates have the right to dispute it and have it investigated.

  • Online dispute submission
  • 30-day investigation timeline
  • Correction of verified errors

⏸️ Right to Fair Process

Before adverse action, candidates receive notice and time to respond to findings.

  • Pre-adverse action notice
  • Waiting period before decisions
  • Final adverse action notice

Transparency You Can Trust

We believe in being open about how we operate.

📜

Clear Privacy Policy

Plain-language privacy policy explains exactly how we collect, use, and protect your data.

Read Privacy Policy →

📊

Audit Trails

Complete logs of who accessed what data and when. Available for your compliance needs.

📡

Status Page

Real-time system status at status.backgroundchecker.com. Subscribe to incident notifications.

View Status →

Incident Response

Prepared for anything, transparent about everything.

🚨 Our Incident Response Process

In the unlikely event of a security incident, we have established processes to respond quickly and transparently:

  • Detection — 24/7 monitoring for anomalies
  • Response — Dedicated incident response team
  • Containment — Isolate and stop the threat
  • Notification — Prompt customer communication
  • Recovery — Restore normal operations
  • Review — Post-incident analysis and improvement

📢 Our Track Record

We’re proud of our security track record:

  • Zero data breaches since founding
  • 99.99% uptime maintained
  • Passed all audits without findings
  • No regulatory actions against us

If you have security concerns or want to report a vulnerability, contact security@backgroundchecker.com.

Our People & Processes

Security starts with the people who build and operate our platform.

🔍

Background Checked

All employees undergo thorough background checks before joining our team.

📚

Security Training

Annual security awareness training for all employees, with specialized training for developers.

📝

Confidentiality

All employees sign strict confidentiality agreements protecting customer data.

🔐

Need-to-Know

Access to production data limited to those who need it to do their jobs.

What Security Teams Say

Trusted by security-conscious organizations.

“The SOC 2 Type II report was comprehensive. They provided everything we needed for our vendor security review without any pushback.”

CISO, Healthcare Company

“Our security team did a thorough review of their architecture and practices. They passed with flying colors. Very impressed with their approach.”

Security Director, Financial Services

“GDPR compliance was essential for us. BackgroundChecker.com had clear data processing agreements and understood EU requirements.”

Data Protection Officer, Global Tech Company

Security FAQs

Common security and privacy questions.

What security certifications do you have?

We’re SOC 2 Type II certified, FCRA compliant, GDPR compliant, and HIPAA-ready. We’re also a member of PBSA (Professional Background Screening Association). Enterprise customers can request our SOC 2 report under NDA.

How is my data encrypted?

All data is encrypted with TLS 1.3 in transit and AES-256 at rest. Encryption keys are managed through AWS KMS with automatic rotation. Backups are also encrypted.

Do you sell or share my data?

No. We never sell personal data. We share data only with the sources necessary to complete background checks (courts, employers, schools), under strict data protection agreements.

How long do you retain data?

We retain data as required by FCRA (7 years for reports) and your specific needs. You can request shorter retention periods. Candidates can request deletion of their data subject to legal requirements.

What happens if there’s a data breach?

We have a comprehensive incident response plan. In the unlikely event of a breach, we would notify affected customers promptly as required by law, contain the issue, and provide transparent communication throughout.

Can I get your SOC 2 report?

Yes. Enterprise customers and prospects can request our SOC 2 Type II report, penetration test summary, and security questionnaire responses under NDA. Contact us to request.

Secure Screening Starts Here

Your data is protected by enterprise-grade security, strict compliance, and transparent practices. Start screening with confidence.

Get Started Free

SOC 2 Type II • FCRA Compliant • Zero data breaches

BackgroundChecker
Get Started
icon 3,112 users screened this month
A
Alex
just completed a background check