Legal — Security

Security, in detail.

HR Assist holds some of the most sensitive data in your company — salaries, bank details, IDs. Here's exactly how we protect it.

Architecture

HR Assist is multi-tenant, but every row of customer data is isolated by Postgres row-level security. There is no scenario under which workspace A can query workspace B's rows, even with a bug in application code — the database itself enforces the boundary.

Encryption

Authentication

Access control

Internal access to production follows least privilege. Engineers need a signed ticket and a peer approval to access any customer data, and every access is logged, reviewed weekly, and surfaced to Canopy customers in their audit log on request.

Backups & disaster recovery

Full backups daily, incremental backups hourly. Backups are encrypted and stored in a geographically separate region. RPO: 1 hour. RTO: 4 hours. We run DR drills quarterly.

Uptime & SLA

Compliance & audits

Responsible disclosure

If you find a vulnerability, please email info@hrassistconsulting.com with details. We acknowledge within 24 hours, fix critical issues within 72 hours, and recognize reporters publicly (with permission). We do not pursue good-faith researchers.

Last updated · March 2026