Overview
As a diversity, equity, and inclusion company, our customers entrust us with highly sensitive data. Here at Included we take the security of customer data seriously, and have invested a significant amount of resources in building out our security program.
Use this page for an overview of our security capabilities.
Compliance


Documents
Pentest Report
Data Processing Agreement
Acceptable Use Policy
Access Control Policy
Asset Management Policy
Data Security Policy
Encryption Policy
General Incident Response Policy
Information Security Policy
Other Policies
Physical Security
Risk Management Policy
Software Development Lifecycle
BC/DR
Product Security
Audit Logging
Integrations
Multi-Factor Authentication
See more
Reports
Network Diagram
Pentest Report
SOC 2 Report
See more
Data Security
Backups Enabled
Encryption-at-rest
Encryption-in-transit
See more
App Security
Credential Management
Software Development Lifecycle
Vulnerability & Patch Management
Legal
Access Control
Data Access
Logging
Password Security
Infrastructure
BC/DR
Heroku
Separate Production Environment
Endpoint Security
Endpoint Detection & Response
Mobile Device Management
Network Security
Firewall
Wireless Security
Corporate Security
Employee Training
Internal Assessments
Policies
Acceptable Use Policy
Access Control Policy
Asset Management Policy
See more
Security Grades
Qualys SSL Labs
included.ai
A
If you think you may have discovered a vulnerability, please send us a note.