{"id":714,"date":"2018-11-13T17:28:55","date_gmt":"2018-11-13T17:28:55","guid":{"rendered":"\/?page_id=714"},"modified":"2022-11-04T11:26:37","modified_gmt":"2022-11-04T00:26:37","slug":"security","status":"publish","type":"page","link":"https:\/\/www.livehire.com\/security\/","title":{"rendered":"Security and Compliance"},"content":{"rendered":"\n
Information security is a key company priority at LiveHire and we manage robust security controls to enhance the confidentiality, integrity and availability of our information assets and systems.<\/p>\n\n\n\n
Our key objective is to safeguard customer data and our security controls are driven by a comprehensive risk management framework that governs many aspects of LiveHire\u2019s business operations.<\/p>\n\n\n\n
Being a cloud native company, LiveHire takes necessary precautions to ensure all client and user data never leave the secure cloud environment and are always protected under the highest standards.<\/p>\n","protected":false},"excerpt":{"rendered":"
Information security is a key company priority at LiveHire and we manage robust security controls to enhance the confidentiality, integrity and availability of our information assets and systems. Our key objective is to safeguard customer data and our security controls are driven by a comprehensive risk management framework that governs many aspects of LiveHire\u2019s business … Continued<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"views\/template-our-purpose.blade.php","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"acf":[],"yoast_head":"\n