Applyflow International Pty Ltd (“Applyflow International”) the parent company of Applyflow Technologies Pty Ltd, Applyflow Technologies (UK) Limited, and Applyflow Technologies (US) Inc (together, “the Subsidiaries”), is dedicated to upholding the confidentiality, integrity and availability of all information and data that we collect, process, store or transmit on behalf of our customers. Protecting these assets is essential to both our operational resilience and the privacy expectations of the organisations who rely on us.
As a provider of mission-critical recruitment technology, we understand the importance of transparency in demonstrating our commitment to security. Our Trust Centre provides detailed insights into the security controls, standards, procedures and shared responsibilities that shape our approach to safeguarding customer data.
This Security Posture provides an overview of the governance, risk management and technical safeguards implemented across Applyflow. It outlines the mechanisms we use to detect, mitigate and respond to threats, align with recognised industry standards, and drive continuous improvement throughout our security programme.
Commitment Statement "Applyflow continually invests in security capabilities, internal training and modern infrastructure to ensure our platform remains resilient and aligned with evolving industry standards."
Transparency & Shared Responsibility "We clearly define shared responsibilities between Applyflow and our customers to ensure secure configurations, access controls and data management."
Continuous Improvement "Our security posture is regularly reviewed and enhanced through audits, testing, third-party assessments and the adoption of new tools and practices."
Risk Management "We use a proactive, risk-based approach to identify potential threats and implement preventative, detective and responsive controls."
Founded in 2020
Here are the important security policies and documents which are a part of Applyflow’s compliance program.
Acceptable Usage Policy
Policy
Operations Security Procedure
Policy
HR Security Procedure
Policy
Media Disposal Policy
Policy
Incident Management Procedure
Policy
Compliance Policy
Policy
Encryption Policy
Policy
Asset Management Policy
Policy
Vendor Management Procedure
Policy
Endpoint Security Policy
Policy
Data Retention Policy
Policy
Business Continuity & Disaster Recovery Policy
Policy
Vendor Management Policy
Policy
Compliance Procedure
Policy
Data Classification Policy
Policy
PHI Data breach Notification Procedure
Policy
SDLC Procedure
Policy
Privacy By Design Policy
Policy
Communications & Network Security Policy
Policy
Incident Management Policy
Policy
Code of Business Conduct Policy
Policy
Access Control Procedure
Policy
Personal Data Breach Notification Procedure
Policy
Physical & Environmental Security Policy
Policy
Physical and Environmental Security Procedure
Policy
Business Continuity Plan
Policy
Data Breach Notification Policy
Policy
Operation Security Policy
Policy
HR Security Policy
Policy
Data Protection Policy
Policy
Network Security Procedure
Policy
Asset Management Procedure
Policy
Organization of Information Security Policy
Policy
Access Control Policy
Policy
Risk Assessment & Management Policy
Policy
System Acquisition and Development Lifecycle Policy
Policy
Information Security Policy
Policy
ISMS Information Security Roles & Responsibilities
Document
System Description
Document
ISMS Manual
Document
ISMS Scope Document
Document