To ensure our security protocol remains at the highest possible level, we cooperate with yearly on-site inspections, external audits, and reviews from our vendors. Our procedures include eliminating all traces of sensitive data from our applications, keeping both applicants and clients safe from the risk of data loss.
Learn more about our commitment to data safety
here.