At your security is our top priority. has robust security measures in place to safeguard the transmission and storage of the information you share with us. This includes but is not limited to:

Data Protection in the Cloud

Param’s services run on Amazon Web Services (AWS), which is physically secure, employs modern software security techniques, and requires multifactor authentication for access. The AWS cloud infrastructure is constantly monitored, highly automated, and highly available. It meets many global security standards including ISO 27001, SOC, PCI, and FedRAMP. For more information, please visit:

Secure APIs & Data Encryption integrates seamlessly with your applicant tracking system (ATS) without compromising the security of your data. Communication through ATS partner APIs is HTTPS encrypted using TLS 1.2. The connection is encrypted and authenticated using AES-128 bit encryption. Data Encryption In addition to encrypting API traffic to your ATS, encrypts other sensitive company data you share with us. We use the Key Management Service (KMS) through AWS to control and separate encryption keys used to encrypt your data. KMS employs Hardware Security Modules (HSMs) to protect the security of keys. Keys can never be exported from the service.


Password Hashing never stores user passwords. We utilize a one-way, cryptographic hashing algorithm known as Bcrypt, an industry standard for password hashing.


The data that you share with is kept 100% confidential. We do not share your information with any customers or third-party organizations for any reason, unless requested by you.

Vulnerability Testing

Logical Separation of Customer Data Hardware and software configurations are designed to provide secure logical separations of customer data, permitting each customer to view only its related information. This separation of data is reinforced with rigorous access controls. Personally Identifiable Information (PII) from your applicants will never be available to others. Vulnerability scans are performed at both the network and application level.

Disaster recovery’s data is stored in an AWS multi-Availability Zone (AZ) database instance. Each AZ runs its own physically distinct, independent infrastructure and is designed to be highly reliable. In case of an infrastructure failure, it performs an automatic failover to a standby. Personnel employees with access to sensitive customer data can only access information on a need-to-know basis for troubleshooting purposes and are required to adhere to strict privacy guidelines. For access to our production systems, all engineers use multi-factor authentication and are restricted by IP location – a process we closely track and audit. Customer data is never copied locally onto employee computers. Additionally, all new hires are subject to a pre-employment background check in order to verify identity, references, criminal history, etc. Security Training for Your Team.