Skip to main content
Security FAQ
Updated over a week ago

Q: Who can see the data of my employees?

As an Admin in Compete, you can invite colleagues to the platform and configure their data access permissions. You can decide which region (US/AU/IL) they can view employees in, what type of compensation (salaries/equity) they can view and if they can view HR roles and C-level employees. You can do it in the setting page > “user management and permissions” tab.”

In Compete, only our Onboarding Specialist is exposed to your data during onboarding to validate its correctness. We ask for your permission for any other access we may need to your data when helping with Customer Support requests.

Q: How can I know my data is safe and protected during the integration process?

We use a third-party partner called Merge, which specializes in HRIS integrations, to get your data safely into the Compete platform. Merge is a service that simplifies transferring data from your end to our systems while implementing top-notch security. With Merge's unparalleled reliability and integrity, numerous leading companies and their customers have utilized integration processes powered by Merge.

Once the information arrives on our side, it is processed, aggregated and anonymized. From here on, it is accessible only by you, following authentication. The system does allow creating filters, but these were masterfully designed to prevent pinpointing anyone specific while supplying all the information you need.

The data is encrypted during the whole process, in transit and at rest.

Compete is ISO 27001 (information security management) and ISO 27701 (privacy information management system) accredited. In order to promote security and privacy as we grow, effective security controls, practices and procedures were implemented at all levels across our infrastructure and products. We have rigid data encryption and anonymization policies in place regarding customer HR data, strict access control provisions for both Compete customers and employees, a zero-trust approach on all corporate applications, continuous monitoring of the platform in search for vulnerabilities, periodic penetration tests, awareness programs and other regular security initiatives.

Below is a more detailed link to our privacy and security policies and our security team can answer more questions regarding our data management practices as well.

Did this answer your question?