How we protect your data

How we protect your data

Your reviews

SEEK Recruiter Profile captures feedback from candidates you have placed and/or feedback from hiring managers who have engaged your services to showcase your reputation. Reviews are displayed publicly on your profile. 

Client and candidate data

We use candidate and employer names and email addresses to send review requests and build your proven online reputation. This contact information is only used for collecting reviews and is never displayed publicly, shared with third-parties or used for marketing purposes.

Placement data

Placement data refers to information you import (usually from your ATS), including candidate names and contact details, employer details and role information. We use this data to:  

  • send review requests to candidates and hiring managers who you have worked with;  

  • let you create optional ‘placed role’ listings for your profile (showcasing only job title, salary range, location and industry); and  

  • Reviews are published on your profile page to showcase your reputation. You choose whether to also display placed role listings.  Other than content you may choose to publish on your Profile Page, we do not share any imported placement data with third-parties, or use it for marketing or commercial purposes.

Data security

Your data is encrypted, both ‘in transit’ from your device to our servers (using TLS) and ‘at rest’ when stored on our secure servers. We carefully manage encryption keys as per best practice, keeping them entirely separate from the data.

Secure cloud infrastructure

We use Amazon Web Services (AWS) to securely store your data in Sydney, Australia. Our platform and applications also run within the AWS environment, with a system architecture that is designed for high security. We make extensive use of AWS security features.

Ongoing monitoring

Our applications, APIs and infrastructure are monitored with automated tools, including logging of data access and changes. We regularly review our architecture and systems with in-house data security experts and engage independent third parties for penetration testing.