Our security and compliance measures
tick all the boxes
We support your need for data security and unbiased assessments
We’ve used a security-first approach in our development process.Learn more
Only industry leading password and authentication policies meet our criteria.Learn more
We consistently monitor, control and record potential risks.Learn more
Data is protected cryptographically at rest, in transit, and in process.Learn more
Regular monitoring and recording of incidents with a dedicated e-mail ID for incident reporting.Learn more
AWS availability in three zones to ensure 99.99% uptime.Learn more
A combination of the screen application and perpetual diligence ensures industry-leading infrastructure securityLearn more
Diligent Organizational Security
Data Protection: FAQs
Will you process my personal data for yourself or on behalf of another party?
We will only process your personal data if we have a lawful basis for doing so, which includes but is not limited to, the following: consent, contractual necessity, and our legitimate interests or the legitimate interest of others.
Do you process data yourself or do you use third-party processing services such as rent servers?
We do not share, rent, or sell your personal data to third parties unless you have granted us explicit permission to do so.
Will you handle my data securely? What security measures do you take?
Yes, we handle your data securely using the following cryptographic measures:
- At rest: Encrypted with the AES 256 Algorithm
- In transit: Data transport is protected by TLS 1.2 with the RSA 2048-bit private key
- In processing: Controlled access to data with two-factor authentication
Who can access the personal data within your company? Are there different levels of access for different positions?
Other than monitoring activities, within HackerEarth, nobody has access to customer data. Yes, there are different levels of access based on roles.
Do you have a system of logs that records who and when enters personal data you process, modifies, erases, or accesses them?
Yes, we maintain user activity logs.
Who do you get the data from—a data subject or from a Controller?
Depending on the kind of service, we get data from both a data subject and from a Controller too.
What categories of personal data do you collect?
We collect the following Personal Data about you:
- Name (first name/last name/full name)
- Email ID (both personal and professional)
How long will my data be stored for? What criteria do you use to determine that period?
Your data is retained with HackerEarth for as long as you have a HackerEarth account. You can request that we delete some or all of your Personal Data from our systems. While this will be done immediately, residual data may be saved in certain logs and this will be purged within a year of deleting your data.
How can I request that you erase my personal data?
To request that we erase your personal data, send us an email at firstname.lastname@example.org