Toro Insights logoToro Insights

Toro Insights Trust Center

At Toro Insights, we take security seriously. We leverage enterprise-grade cloud infrastructure, enforce encryption at rest and in transit, and implement strict access controls. Sensitive data is filtered before entering our systems, and we maintain documented security policies reviewed annually. We treat the data entrusted to us—whether from our customers or their candidates—with care and responsibility, balancing robust protection with the agility to deliver innovative solutions.

Compliance

Resources

Risk and Governance Executive Committee Charter
International Data Transfer Policy
Sensitive Data Processing and Impact Assessment Policy
Criminal Data Processing Policy
Data Protection, Accountability, and Privacy by Design Policy

Controls

Access control procedures
Access review of infrastructure
VPN access
Multifactor authentication
Tracking access changes
Encryption of data
Data protection policy
Data transfer policy
Data transfer agreement
Cooperation agreements/data sharing frameworks
Source code tool
Business continuity and disaster recovery testing
Web application firewall
Outsourced Development Management
Sample code changes
Intrusion detection tool
Infrastructure baseline hardening policy
Network diagram
Infrastructure firewall
Monitoring tool
Incident response and breach notification policy
Breach notification communication
Security incident list
Alerts and remediation
Internal GDPR compliance assessments
Binding corporate rules policy
Whistleblower policy
Rectification request policy
Objection handling policy
Log management tool
Vendor management program
Vendor onboarding
Vendor list
Vendor termination
Consent records
Age verification and parental/guardian consent process
New employee and contractor agreements
Existing employee and contractor agreements
Customer onboarding
Security awareness training implemented
Employee handbook
Multi-availability zones
Asset register maintaining
Risk management program
Risk and Governance Executive Committee meeting minutes
Lawful basis assessment
Legitimate interest assessment
Patch management
Antivirus and malware configurations
Board charter
Asset register list
Termination checklist

Subprocessors

Google Cloud Platform
Google Cloud PlatformCloud Infrastructure & Platform Services
Cloudflare
CloudflareNetwork & Edge Security
PostHog
PostHogBusiness Apps & Productivity
Postmark
PostmarkBusiness Apps & Productivity