Protecting your data is our top priority!

THAREJA follows cutting-edge security and privacy best practices designed to provide a secure, reliable, and compliant talent marketplace for businesses of all sizes.

We take protecting your data seriously. Our robust infrastructure provides streamlined authentication and asset protection you can trust.

Data encryption in transit (https)

Data encryption at rest

Email confirmation

Strong passwords

Access controls

Detailed audit and system logs

Network security

Physical security

THAREJA personnel policies and procedures

Access and authentication

Multi-factor authentication

Reduce the risk of unauthorized access with multi-factor verification.

Single sign-on

Manage user credentials from one place with single sign-on for Enterprise customers.

Custom session timeouts

Secure Enterprise sessions with custom session timeouts.

Asset protection

Data encryption

To help protect from attacks, eavesdropping, and session hijacking, we encrypt all data in transit using Hypertext Transfer Protocol Secure (HTTPS) and enforce HTTP Strict Transport Security (HSTS).

Malware & spam protection

We use machine learning to protect users against malicious behavior. Messages and attachments are scanned for viruses and other malware prior to you downloading them.

Confidentiality and IP rights

Enter into an agreement concerning confidentiality and intellectual property rights that works for you and your talent, or use our Optional Service Contract Terms, or tweak them to your needs, so the rights transfer at the time of payment.

Backups & reliability

Our backups are continuous and incremental so we can restore to any point within the backup retention period.

We run redundant systems across multiple locations, with automatic failover to provide the maximum fault tolerance.

Frequently updating code libraries

We use an automated system to monitor known security vulnerabilities in the open source libraries we depend on and respond quickly by updating them.

Incident response

In case of a data breach we have a procedure that dictates how and when to make a timely responsible disclosure to the affected parties with a first communication within 72 hours of us becoming aware of the incident.