The socionics test is now available. The Socionics test had a bug so you will see your scores recalculated when you open it again.

Security Policy

Last updated: January 2025

Your Company is committed to protecting the security and privacy of your data. This Security Policy outlines the measures we take to safeguard your information and maintain the integrity of our services.

Data Encryption

We use industry-standard encryption technologies to protect your data both in transit and at rest:

  • All data transmitted between your device and our servers is encrypted using TLS/SSL
  • Sensitive data stored in our databases is encrypted at rest
  • We use strong encryption algorithms and regularly update our security protocols

Authentication and Access Control

We implement robust authentication and access control measures:

  • Secure password requirements and hashing algorithms
  • Multi-factor authentication (MFA) where applicable
  • Role-based access control to limit data access
  • Regular security audits and access reviews

Infrastructure Security

Our infrastructure is designed with security in mind:

  • Regular security updates and patches
  • Network firewalls and intrusion detection systems
  • Secure hosting environments with physical security measures
  • Continuous monitoring and threat detection

Data Protection

We take comprehensive measures to protect your data:

  • Regular automated backups of all critical data
  • Secure backup storage with encryption
  • Data retention policies in compliance with applicable laws
  • Secure data deletion procedures

Vulnerability Management

We maintain a proactive approach to identifying and addressing security vulnerabilities:

  • Regular security assessments and penetration testing
  • Automated vulnerability scanning
  • Responsive patch management process
  • Security incident response procedures

Employee Training

Our team is trained in security best practices:

  • Regular security awareness training
  • Strict confidentiality agreements
  • Limited access to sensitive data on a need-to-know basis
  • Background checks for employees with data access

Compliance

We strive to comply with relevant security standards and regulations, including:

  • General Data Protection Regulation (GDPR)
  • Industry-specific security standards
  • Regular compliance audits and assessments

Incident Response

In the event of a security incident, we have procedures in place to:

  • Quickly identify and contain security threats
  • Assess the impact and scope of incidents
  • Notify affected users as required by law
  • Remediate vulnerabilities and prevent future occurrences

Reporting Security Issues

If you discover a security vulnerability, please report it to us responsibly. We appreciate your help in keeping our services secure. Please do not publicly disclose vulnerabilities until we have had a chance to address them.

Your Role in Security

You also play an important role in maintaining security:

  • Use strong, unique passwords for your account
  • Enable multi-factor authentication when available
  • Keep your devices and software updated
  • Be cautious of phishing attempts and suspicious links
  • Report any suspicious activity immediately

Contact Us

If you have security concerns or questions about this Security Policy, please contact us through the appropriate channels provided on our contact page.