This page summarises the technical and organisational measures we use to protect customer data. It is intended to give security reviewers and prospective customers a clear picture of our current posture without over-promising. We are continuously improving these controls and welcome questions at security@ppulse.com.
This document covers the production environment of the pPULSE platform, our marketing website, our internal systems used to operate the Services, and our staff who have access to any of these. It does not cover individual customers' own networks, devices, or third-party integrations they choose to enable.
pPULSE is a multi-tenant software-as-a-service platform. Each customer organisation is provisioned into a logically isolated tenancy. Application code routes every request to the correct tenancy based on the authenticated user's organisation membership; cross-tenancy reads and writes are denied at the data-access layer.
Tenancies are not commingled in shared records. Indexes, foreign keys, and queries are constructed so that one customer cannot, through any normal use of the application, see or modify data belonging to another.
Internal access to production systems is granted on a least-privilege basis to a limited number of named individuals. Access requires multi-factor authentication and is reviewed at least quarterly. Privileged actions are logged and reviewed.
Customers manage their own users through an admin console. The platform supports role-based access control with a default set of system roles (SuperAdmin, Org Admin, Org Viewer) and an unlimited number of custom roles per organisation. Each role is bound to a granular permission matrix that controls every permissioned action in the application.
Customers can connect Google Workspace and Microsoft 365 OAuth single sign-on for their authorised users. Additional identity-provider integrations are on the roadmap.
Authorised users authenticate with email and password protected by a modern password-hashing algorithm, or through single sign-on. Multi-factor authentication using time-based one-time passwords is supported and can be enforced by administrators per role or organisation. Session tokens are short-lived; refresh tokens are bound to the device.
Candidates and other external participants do not create accounts. They access screening invitations, document-upload portals, offer-letter signing, and referral submissions through one-time signed tokens that expire after a configurable period or on first use, depending on the workflow.
In transit. All connections between end users and the Services use TLS 1.2 or higher with modern cipher suites and certificate pinning where supported. HTTP traffic is redirected to HTTPS, and HSTS is enforced for the production domain.
At rest. Backing storage and backups are protected using the encryption-at-rest features of the underlying cloud infrastructure provider. Field-level encryption for sensitive identifiers is on our security roadmap and is not represented as currently in place.
The Services maintain an append-only audit log of administrative and security-sensitive events, organised into nine event categories. Each entry records the actor, action, target, timestamp, and a categorisation of severity. Customers can review and export their organisation's audit log for compliance and forensic purposes. Logs are retained for at least twelve (12) months.
We monitor first-party and third-party dependencies for known vulnerabilities and apply patches according to severity:
We perform internal security testing on every significant release and engage independent third-party penetration testers periodically. Summary letters are available to customers under non-disclosure once available.
Customer data is backed up on a continuous basis to durable storage in the same regional infrastructure. Backups are tested for restorability on a regular cadence. Recovery objectives are documented internally and we are willing to share specifics under mutual non-disclosure with prospective enterprise customers.
We maintain a written incident-response plan that defines severity levels, on-call rotations, internal communications, customer notification, and post-incident review. In the event of a confirmed personal-data breach, we notify affected customers without undue delay in accordance with our DPA and applicable law.
Reporting in line with law. We will notify affected customers of confirmed breaches in line with the timelines required by the DPDP Act, the GDPR (where applicable), and any other binding regulation. We do not commit to publication on a public dashboard until we have confirmed the facts and consulted affected parties.
We use a small number of carefully selected sub-processors for hosting, email delivery, error monitoring, calendar/video integrations (only when customers connect them), large-language-model resume parsing, and customer-support tooling. Each sub-processor is bound by data-protection terms at least as protective as our own. The current list and a description of each sub-processor's role is available on request from security@ppulse.com.
We are working toward formal third-party attestations and certifications. As of the "Last updated" date at the top of this page, our public commitments are:
We do not claim certifications we have not yet received. If a procurement questionnaire requires evidence of a control or certification not described here, please reach out and we will tell you exactly where we stand.
We appreciate responsible disclosure. If you believe you have found a vulnerability or other security issue in the Services, please email security@ppulse.com with a description of the issue, steps to reproduce, and any other relevant context. We commit to acknowledging your report within five (5) business days and will not pursue legal action against good-faith researchers who follow this process and avoid privacy violations, service disruption, or destruction of data during testing.
Kaaspo Enterprises Private Limited
Attn: Security
Chennai, Tamil Nadu, India
Email: security@ppulse.com
Start a free 14 day trial in minutes, or chat with us about a custom rollout for your team.