Protecting your data is our top priority!
THAREJA follows cutting-edge security and privacy best practices designed to provide a secure, reliable, and compliant talent marketplace for businesses of all sizes.
We take protecting your data seriously. Our robust infrastructure provides streamlined authentication and asset protection you can trust.
Data encryption at rest
Detailed audit and system logs
THAREJA personnel policies and procedures
Access and authentication
Reduce the risk of unauthorized access with multi-factor verification.
Manage user credentials from one place with single sign-on for Enterprise customers.
Custom session timeouts
Secure Enterprise sessions with custom session timeouts.
To help protect from attacks, eavesdropping, and session hijacking, we encrypt all data in transit using Hypertext Transfer Protocol Secure (HTTPS) and enforce HTTP Strict Transport Security (HSTS).
Malware & spam protection
We use machine learning to protect users against malicious behavior. Messages and attachments are scanned for viruses and other malware prior to you downloading them.
Confidentiality and IP rights
Enter into an agreement concerning confidentiality and intellectual property rights that works for you and your talent, or use our Optional Service Contract Terms, or tweak them to your needs, so the rights transfer at the time of payment.
Backups & reliability
Our backups are continuous and incremental so we can restore to any point within the backup retention period.
We run redundant systems across multiple locations, with automatic failover to provide the maximum fault tolerance.
Frequently updating code libraries
We use an automated system to monitor known security vulnerabilities in the open source libraries we depend on and respond quickly by updating them.
In case of a data breach we have a procedure that dictates how and when to make a timely responsible disclosure to the affected parties with a first communication within 72 hours of us becoming aware of the incident.