Terms of Service

Last updated: May 26, 2025
Please read these terms and conditions carefully before using Our Service.

  • Emprofy.com Terms of Use 

    Emprofy.com Data Security and Privacy Statement 
    Published by: PureVi Tech Solutions Inc. (“PureVi”)
    Effective date: 01 January 2026
    Last updated: 01 January 2026
    Version: 1.2
     

    Purpose 

    This Data Security and Privacy Statement explains the security and privacy principles PureVi applies to emprofy.com (“Emprofy”) and how we protect personal information processed through our HR-Tech SaaS platform. It is intended to provide transparency to candidates/students, referees, organization customers, and website visitors. 

    Our role depends on how Emprofy is used 

    PureVi can act in different roles depending on the processing: 

    • Controller/Business: We act as a controller/business when we determine how and why personal information is processed for candidate accounts, referee submission experiences, website visitors, and platform security and operations. 
    • Processor/Service Provider/Contractor: We act as a processor/service provider/contractor when an organization customer uses Emprofy for its hiring, reference checking, screening, or verification workflows and we process personal information on that customer’s instructions under a Data Processing Agreement (DPA). 

    If you are participating in an organization’s hiring or verification process, the organization may be responsible for certain notices and decisions about your information. 

    Privacy governance and accountability 

    We maintain a privacy and security governance program designed to support compliance with applicable privacy and data protection laws (including GDPR, CCPA/CPRA, PIPEDA, and the Australian Privacy Principles). 

    Our governance program includes: – Defined privacy and security responsibilities and escalation paths. – Privacy-by-design considerations throughout product and feature development. – Risk-based reviews for new or materially changed processing that may increase privacy or security risk. – Documented policies and procedures, including vendor governance, incident response, and access management. – Training and awareness for personnel with access to production systems or sensitive data. 

    Privacy contact: privacy@emprofy.com
    Postal address: 1900 City Park Dr, Suite 300
    Ottawa, ON, Canada
     

    Data minimization and lawful processing 

    We aim to collect and process only the information reasonably necessary to operate Emprofy, provide requested services, maintain security, and meet legal obligations. We align processing to defined purposes and restrict access and use based on role, necessity, and authorization. 

    Where Emprofy is used by organization customers, we process personal information on documented instructions, subject to contractual restrictions in our DPA. 

    Security safeguards 

    We use layered technical and organizational safeguards designed to protect confidentiality, integrity, and availability of personal information. 

    Our safeguards typically include: 

    Infrastructure and environment isolation – Emprofy is hosted on enterprise-grade cloud Microsoft Azure infrastructure. – Logical separation of environments (e.g., production, testing, development) and controlled change processes. 

    Encryption – Encryption in transit using modern TLS (e.g., TLS 1.2+). – Encryption at rest for stored data and backups (e.g., AES-256 where supported by underlying services). – Additional protections for sensitive data where appropriate (such as field-level encryption and stricter access controls). 

    Access control and identity management – Role-based access control (RBAC) and least-privilege access. – Multi-factor authentication for privileged access. – Segregation of duties for engineering/operations/support functions where feasible. – Logging of privileged administrative access and critical actions. 

    Monitoring, logging, and vulnerability management – Centralized security logging to support detection and investigation. – Monitoring and alerting for suspicious activity (for example, repeated failed login attempts, abnormal access patterns, or privilege changes). – Vulnerability management practices including patching and remediation tracking. 

    Secure development – Secure development lifecycle controls such as code review, dependency management, and security testing aligned to risk and system criticality. 

    Backup and disaster recovery – Regular backups of critical systems and data stores. – Tested restoration procedures for critical services. – Business continuity practices proportionate to platform risk. 

    Physical security – Physical security is provided by our cloud and data center providers and includes facility access and environmental protections. 

    No method of transmission or storage is completely secure; however, we work to maintain safeguards proportionate to the sensitivity of the information and the risk context. 

    Vendor and sub-processor management 

    We use vetted third-party service providers (vendors/sub-processors) to operate and support the Service (for example, cloud hosting, communications, analytics, payment processing, monitoring, and customer support tools). We assess vendors based on risk and require contractual protections appropriate to the nature of the processing, including confidentiality, security obligations, and restrictions on use and disclosure. 

    We maintain a current list of key sub-processors at: [Sub-Processor List URL]. 

    Cross-border processing and transfers 

    PureVi is based in Canada. Emprofy may process personal information in Canada and other countries where our vendors or we operate. We apply safeguards designed to protect cross-border processing, including contractual safeguards with vendors and, where required, internationally recognized transfer mechanisms and supplementary safeguards. 

    Data retention and deletion 

    We retain personal information only as long as necessary for the purposes for which it was collected and processed, including providing the Service, meeting legal obligations, resolving disputes, enforcing agreements, and maintaining security. 

    We maintain a retention schedule by data category and implement deletion or de-identification processes. If we are required to preserve data due to legal or security reasons, we apply a documented legal hold process. 

    Cookies and tracking controls 

    Emprofy websites and web application interfaces may use cookies and similar technologies for essential operations, security, and (where enabled) analytics and preference management. 

    Where required by law, we provide appropriate cookie choices and honor applicable privacy signals and preferences. For details, see: [Cookie Policy URL] and [Cookie Preferences Center URL]. 

    AI and profiling transparency 

    Emprofy may offer AI-assisted features (e.g., generating summaries or organizing submitted information) to support platform workflows. Emprofy does not make hiring decisions; organization customers are responsible for decisions about applicants and must use the Service in compliance with applicable law. 

    We aim to provide transparency about AI-assisted features, including what data is used for the feature, what the feature produces, and available choices or controls, where applicable. 

    Rights requests and privacy inquiries 

    Individuals may submit privacy requests or inquiries by contacting: privacy@emprofy.com.
    We verify identity as appropriate and respond according to applicable law. When PureVi acts as a processor/service provider on behalf of an organization customer, we support the customer in fulfilling applicable rights requests under the DPA and applicable law. 

    Incident response and breach notification readiness 

    We maintain an incident response program to detect, respond to, and remediate security incidents. When an incident involves personal information, we assess notification obligations and coordinate notifications to customers, regulators, and affected individuals when required by applicable law and contract. 

    Updates to this statement 

    We may update this statement as our practices evolve. The “Last updated” date reflects the most recent revision. If we make material changes, we will provide appropriate notice. 

    Cross-regulation mapping table for the statement 

    The table below shows how each section of the statement aligns to key obligations across jurisdictions. It is designed as an operational crosswalk for your compliance/security team. 

    Statement section GDPR alignment CCPA/CPRA alignment PIPEDA alignment APPs alignment 
    Role clarity (controller vs processor) EDPB role guidance + GDPR processor contracting and accountability expectations (Art. 28) [13] Contract constraints for disclosures to service providers/contractors and purpose limitations [14] Accountability for outsourced processing; cross-border processing remains accountable [15] APP 8 cross-border disclosure accountability (s 16C discussed in OAIC guidance) [16] 
    Governance and accountability program Data protection by design/default (Art. 25), records of processing (Art. 30), DPIA duty for high-risk processing (Art. 35) [17] CPPA regulations set expectations for comprehensive privacy practices disclosures; risk assessments/cyber requirements may apply depending on thresholds/uses [4] Openness and meaningful consent expectations require accessible explanation of practices [18] APP 1 requires open and transparent management [19] 
    Data minimization and purpose limitation GDPR principles (Art. 5) and lawful processing structure [20] “Reasonably necessary and proportionate” minimization requirement (1798.100(c)) [21] Limiting collection (Principle 4) and limiting use/disclosure/retention (Principle 5) [22] APP 3 requires collection reasonably necessary for functions/activities [23] 
    Security safeguards Art. 32 requires risk-appropriate measures incl. encryption, resilience, and regular testing [24] “Reasonable security procedures and practices” (1798.100(e)) [25] Safeguards appropriate to sensitivity (Principle 7) [26] APP 11 security obligations [27] 
    Vendor/sub-processor management Processor contracting requirements and sub-processor controls through Art. 28 program design [28] Service provider/contractor contract restrictions; and privacy policy disclosure expectations in CPPA regs [29] Accountability for outsourced processing; comparable protections [15] APP 8 cross-border disclosure “reasonable steps” often implemented via enforceable contracts [30] 
    Cross-border safeguards Transfers only under Chapter V conditions (Arts. 44, 46), SCC framework, and supplementary measures guidance [31] No GDPR-like transfer regime, but notices and vendor contractual controls remain critical [32] Cross-border processing is permitted but accountability remains with the transferring organization [33] APP 8 cross-border disclosure governance [16] 
    Retention and deletion Storage limitation is a core principle (Art. 5) and transparency expectations require retention disclosure (Arts. 13/14) [34] Notice-at-collection and CPPA regs require retention period/criteria; minimization applies to retention [35] Principle 5 limits retention; OPC also provides retention/disposal guidance [36] APP 11.2 requires destruction/de-identification when no longer needed (exceptions apply) [37] 
    Cookies and tracking controls ePrivacy Article 5(3) + EDPB consent guidance; EDPB technical scope guidelines for modern tracking [38] CPPA regulations address notice, opt-outs, and preference signals (where applicable) [39] Meaningful consent expectations reinforce clarity and choice [40] APP transparency duties support clear disclosures and controls [41] 
    AI and profiling transparency GDPR Art. 22 and WP29/EDPB profiling guidance; transparency under Arts. 13/14 and WP260 guidelines [42] CPPA ADMT rules define ADMT and establish pre-use notice/opt-out requirements in the regs when applicable [43] Meaningful consent and openness expectations support clear explanations of AI uses and consequences [18] APP 1/5 transparency expectations support clear disclosure of features impacting individuals [44] 
    Incident response and breach readiness GDPR breach notification rules + EDPB breach notification guidance [45] CPRA reasonable security duty; CA breach law 30-day deadline under amendments [46] Mandatory reporting/notification when real risk of significant harm and breach recordkeeping [47] NDB scheme for eligible data breaches likely to result in serious harm [48] 

     

Automated Reference Checks, Verified Work History & Career Passport | Emprofy