Privacy Policy
Last updated: October 1, 2025
1. Our Commitment to Your Privacy
We process personal data with necessity and proportionality in mind. Collection is limited to what is needed to deliver, secure, and improve the service, and we review retention and access controls regularly to reduce risk and exposure.
We apply privacy-by-design and privacy-by-default principles when rolling out new features, including minimization of identifiers, secure defaults, vendor due diligence, and restricted access on a need-to-know basis enforced by technical controls.
Cross-border processing may occur to operate a global service; we use contractual safeguards, encryption, and access segmentation to maintain an adequate level of protection consistent with applicable law and industry practice.
We continually assess threat models, usability impacts, and compliance requirements to balance user experience with strong privacy protections and transparency.
2. Consent and Global Application
Your consent covers account creation, alerts, support, and essential security messages. Where local law requires explicit opt-in for marketing, cookies, or specific data uses, we request it via banners, granular toggles, or just-in-time notices.
If you are in jurisdictions with specific rules (e.g., GDPR, LGPD, CCPA/CPRA), we apply the corresponding legal bases, user rights, and recordkeeping described in this Policy, including handling of opt-outs, objections, and sensitive data limitations.
You may withdraw consent for non-essential processing at any time through settings or by contacting us; essential communications for security, fraud prevention, and account integrity may continue where permitted or required.
We localize consent flows to regional standards and log consent events, preferences, and proof of choice to demonstrate compliance when needed.
3. Information We Collect
We may collect usage telemetry (pages viewed, queries, clicks on listings, device/browser metadata, referrers, approximate location) to improve relevance, prevent fraud, and measure performance. Data is pseudonymized where feasible and retention is time-limited.
If you use social login, we receive identifiers needed to authenticate you and basic profile elements you permit; we do not receive your social password. You can revoke access in the provider’s settings at any time.
When you upload or paste a résumé/CV, you decide what to include. Avoid sensitive data unless strictly necessary. We do not require special-category data (e.g., health, union membership, biometric data) to provide the core service.
We use cookies or similar technologies to keep sessions active, remember preferences, attribute traffic, secure the service against abuse, and support analytics and fraud detection where permitted by law and your choices.
Support interactions may collect diagnostics, headers, or screenshots you provide to help troubleshoot issues; we ask that you redact unnecessary personal or sensitive data before sending.
4. How and Why We Use Your Information
Legal bases include performance of contract (operating your account and alerts), legitimate interest (fraud prevention, service improvement, ensuring platform integrity), consent (marketing and certain cookies), and legal obligation (records or compliance where required).
Personalization uses your queries, favorites, location signals, and interaction patterns to rank and recommend roles; you can clear history, adjust preferences, or change frequency of alerts to influence recommendations.
Security uses IP/device signals, rate limiting, anomaly detection, and abuse heuristics to protect accounts. We may temporarily restrict or challenge access to investigate suspected misuse or automated behavior.
Product analytics helps us understand feature adoption, detect errors, and improve speed and relevance; where analytics relies on cookies or IDs, it respects your consent choices and opt-out signals when applicable.
5. Information Sharing
We share only with vetted processors bound by data protection terms (hosting, email delivery, analytics, anti-fraud, customer support). They may not reuse data for their own purposes and are subject to confidentiality and security obligations.
If required by law, subpoena, or to protect rights, safety, or the integrity of the service, we may disclose limited data after legal review and in line with applicable disclosure standards.
Aggregated or de-identified analytics may be shared with partners to improve traffic quality, performance, and fraud defenses; these outputs are not used to identify you.
If we engage in a merger, acquisition, or asset transfer, we will require any successor to honor this Policy or provide comparable protection, and we will inform you where legally required.
6. Data Security and Retention
We use encryption in transit (TLS), hashed passwords, access controls, segregation of duties, logging, and monitoring. Access to personal data is role-based, time-bounded when possible, and reviewed periodically.
Retention aligns with purpose: account data while active, logs for security and fraud for limited windows, backups on short cycles, and longer retention only where legal obligations apply (e.g., accounting or dispute handling).
Upon deletion requests, data is removed from active systems; residual copies in backups expire on their normal rotation. Some records may be retained if necessary to comply with law, enforce agreements, or resolve disputes.
We test incident response plans and may apply protective measures such as throttling, IP blocks, or forced credential resets when risk is detected.
7. Your Rights and Control
Subject to local law, you may request access, correction, deletion, restriction, objection to certain processing, and data portability. We may need to verify identity before fulfilling requests to protect your account.
You can manage alerts, marketing preferences, and some cookie choices in settings. Opt-outs do not affect necessary service emails (security, account, legal notices), which we may still send where permitted.
If you believe your data was misused or is inaccurate, contact us; we will investigate and respond within applicable timeframes. You may also lodge a complaint with a supervisory authority where available.
Choices such as disabling certain cookies or clearing history may impact personalization and some site functionality.
8. Third-Party Services
When you click to apply, you leave our domain. Third-party sites set their own cookies, collect their own data, and follow their own policies. Review them before submitting personal information or documents.
Some integrations (analytics, anti-fraud, delivery) may place tags or pixels; where required, we request consent and honor your preferences, including applicable opt-out or “do not sell/share” signals.
We are not responsible for third-party handling once you leave our service; exercise caution, verify the destination, and report suspicious or abusive destinations to us.
9. Contact
Use our Contact Page for privacy requests or questions. Include sufficient details to locate your account (such as registered email) and describe the request type (access, delete, correct, opt-out) so we can act efficiently.
If you are in a region with a designated data protection authority, you may also lodge a complaint there. We encourage contacting us first so we can resolve concerns directly and promptly.
For security reports, provide steps to reproduce, scope, and potential impact; avoid including sensitive personal data in your report.
10. Cookies and Similar Technologies
We use cookies, local storage, device identifiers, and pixels to maintain sessions, remember preferences, measure effectiveness, and prevent fraud. Some are strictly necessary for the site to function; others are subject to your consent.
You can manage preferences via our cookie banner or browser settings. Disabling certain categories may affect personalization, analytics accuracy, or login persistence.
Where required by local law, we honor consent frameworks and respect revocation or opt-out signals. We periodically refresh consent choices and provide clear controls.
11. International Data Transfers
Data may be processed in countries different from your residence to operate a global platform. We implement contractual safeguards, access controls, and encryption to protect data during transfer and storage.
Standard contractual clauses or equivalent mechanisms are used where applicable. We limit access to personal data to personnel with a need to know and log access where feasible.
If a transfer mechanism is invalidated or replaced by regulators, we will adapt our approach to maintain compliance and protection.
12. Children and Minors
The service is not directed to children under the minimum age required by local law (typically 16 or 18). We do not knowingly collect data from children in those age groups.
If you believe a minor’s data was submitted, contact us and we will take reasonable steps to delete or restrict it as required by law.
13. Data Subject Requests Workflow
To exercise your rights, submit a request via the Contact Page, specifying the right you wish to exercise. We may ask for verification to confirm identity and protect your account.
We aim to respond within legally mandated timeframes and will inform you if more time is needed. Certain requests may be denied or limited if they conflict with legal obligations or the rights of others.
If we cannot fully comply, we will explain the reasons unless restricted by law or security considerations.
14. Changes to this Policy
We may update this Policy to reflect new features, legal requirements, or security practices. The “Last updated” date indicates the current version.
Material changes may be communicated via the site or email when appropriate. Continuing to use the service after updates constitutes acceptance of the revised Policy.
Historic versions or summaries may be provided for transparency, but the latest posted Policy governs your use.