Start your security review
View & download sensitive information
Ask for information
Search items
Overview
As a diversity, equity, and inclusion company, our customers entrust us with highly sensitive data. Here at Included we take the security of customer data seriously, and have invested a significant amount of resources in building out our security program.
Use this page for an overview of our security capabilities.
Compliance
CCPA
GDPR
Privacy Shield
SOC 2
Start your security review
View & download sensitive information
Ask for information
Documents
Pentest Report
Data Processing Agreement
BC/DR
Acceptable Use Policy
Access Control Policy
Asset Management Policy
Data Security Policy
Encryption Policy
General Incident Response Policy
Information Security Policy
Other Policies
Physical Security
Risk Management Policy
Software Development Lifecycle
Product Security
Audit Logging
Integrations
Multi-Factor Authentication
View more
Reports
Network Diagram
Pentest Report
SOC 2 Report
View more
Data Security
Backups Enabled
Encryption-at-rest
Encryption-in-transit
View more
App Security
Credential Management
Software Development Lifecycle
Vulnerability & Patch Management
Legal
Access Control
Data Access
Logging
Password Security
Infrastructure
BC/DR
Heroku
Separate Production Environment
Endpoint Security
Endpoint Detection & Response
Mobile Device Management
Network Security
Firewall
Wireless Security
Corporate Security
Employee Training
Internal Assessments
Policies
Acceptable Use Policy
Access Control Policy
Asset Management Policy
View more
Security Grades
Qualys SSL Labs
included.ai
A
If you think you may have discovered a vulnerability, please send us a note.