Your employee information is secure and available always

From storing, transferring, accessing, backing up, monitoring, to testing & reviewing our security procedures, every aspect is covered to meet industry best practice standards.

 

Data Privacy and Data Access

Our success hinges on providing a safe and trustworthy environment for your subscription data. Protecting your data is our obsession, which involves a cross-functional approach with initiatives big and small. Here’s an overview of the major themes of our privacy and security protocols.

Restricted access to Databases and data storages

Access to Databases and data storages is restricted to three senior executives in the organization. Developers do not have direct data access. The only way this data can be accessed in any human readable form by our developers is through independently designed authentication gateways. The gateway comprises a homegrown querying engine which masks private and personally identifiable information, throttles and audits all data query operations.

No local or on-premise storage of data

MangoHR leverages Microsoft Azure and Amazon AWS cloud infrastructure each with it’s own private network. We do not use any other local or on-premise infrastructure to store any customer information on our development or test environments.

Application security

Software development lifecycle (SDLC) Security

MangoHR implements static code analysis tools and human review processes in order to ensure consistent quality in our software development practices.Our Secure Coding practices are in accordance with OWASP guidance

Software development lifecycle (SDLC) Security

MangoHR implements static code analysis tools and human review processes in order to ensure consistent quality in our software development practices.Our Secure Coding practices are in accordance with OWASP guidance

Software development lifecycle (SDLC) Security

MangoHR implements static code analysis tools and human review processes in order to ensure consistent quality in our software development practices.Our Secure Coding practices are in accordance with OWASP guidance

Data Privacy and Data Access

Our success hinges on providing a safe and trustworthy environment for your subscription data. Protecting your data is our obsession, which involves a cross-functional approach with initiatives big and small. Here’s an overview of the major themes of our privacy and security protocols.

Restricted access to Databases and data storages

Access to Databases and data storages is restricted to three senior executives in the organization. Developers do not have direct data access. The only way this data can be accessed in any human readable form by our developers is through independently designed authentication gateways. The gateway comprises a homegrown querying engine which masks private and personally identifiable information, throttles and audits all data query operations.

No local or on-premise storage of data

MangoHR leverages Microsoft Azure and Amazon AWS cloud infrastructure each with it’s own private network. We do not use any other local or on-premise infrastructure to store any customer information on our development or test environments.