Businesses
Engineers
Get Started
Businesses
  • Why Terminal
    • Overview
    • The Terminal Difference
  • Products
  • Hiring Markets
  • Success Stories
  • Resources
Engineers
Get Started

Terminal Trust and Transparency Center

Clients trust Terminal to find the best remote talent across the world. Terminal’s commitment to privacy and data protection is integrated into our tech-enabled Talent and Remote Management Platforms (“Platforms”). Our Platforms consist of people, processes, and technology, backed by the security and infrastructure necessary to safeguard and support Clients as they grow their remote teams.

Learn more about how Terminal protects the personal data.

Overview

Security

Terminal takes clients’ security seriously. We have policies and procedures in place to segregate Terminal’s Talent and Remote Management Platforms from our clients’ critical systems and confidential data. Our tech-enabled Platforms are managed by Terminal’s corporate staff, who do not have access to our clients’ devices, critical systems, or confidential data.

All members (employees hired by Terminal on behalf of our clients) are required to follow our comprehensive information security principles to protect our clients’ confidential data, including intellectual property. This includes:

  • Using client-issued devices for creating and developing deliverables;
  • Following their assigned-client’s security policies to adhere to the client’s requirements; and
  • Respecting nondisclosure and guaranteeing control of intellectual property by the client.

Read more about our security practices.


Privacy

Terminal understands and respects privacy. We limit our collection of personal information to website visitors, job applicants and employees, and client business contacts.

Terminal does not access personal information collected by our clients.

Read more about Terminal’s privacy practices for job applicants.

Read more about Terminal’s privacy practice for website visitors and client business contacts.


Compliance

Terminal’s privacy and information governance programs complies with applicable jurisdictional laws, including:

  • The California Consumer Privacy Act;
  • Canada’s Personal Information Protection and Electronic Documents Act; and
  • Various Latin American data protection laws.

Please contact hello@terminal.io for more information about how Terminal meets sector-specific compliance requirements, such as the Payment Card Industry Data Security Standard (“PCI DSS”) and the Health Insurance Portability and Accountability Act (“HIPAA”).


Accessibility

Terminal is dedicated to providing accessible services and work environments for all current and prospective employees and customers. Terminal provides services and employment practices that follow the principles of dignity, independence, integration, and equal opportunity. If you require accommodation in order to conduct your work or access any of Terminal’s services, please reach out to hr@terminal.io for assistance.

Notice of Disruptions in Service

Service disruptions may occur for reasons that may or may not be within the control or knowledge of Terminal. In the event of any temporary disruptions to facilities or services that customers with disabilities rely on to access or use goods or services, reasonable efforts will be made to provide advance notice. In some circumstances, such as in the situation of unplanned temporary disruptions, advance notice may not be possible.

If a notification needs to be posted, the following information will be included unless it is not readily available or known: Goods or services that are disrupted or unavailable, reason for the disruption, anticipated duration and a description of alternative services or options.

Notification Options

When disruptions occur, Terminal  will provide notice by:

  • Posting notices in conspicuous places, including at the point of disruption, at the main entrance, and the nearest accessible entrance to the service disruption, or on the company website;
  • Contacting customers with appointments;
  • Verbally notifying customers when they make a appointment; or
  • By any other method that may be reasonable under the circumstances

Feedback Process

If a customer has feedback on any aspect of this policy or on the service provided to customers with disabilities, they can reach out to hr@terminal.io for assistance.


Vetting Talent

Reduce the risk of remote hiring by trusting Terminal to match your talent needs with the best markets to hire. During the recruitment and hiring process, we vet members (employees hired by Terminal on behalf of our clients) by conducting screenings, skills assessments, and background or credit checks prior to employment.

Read more about how Terminal works.

Human Resources and Payroll Services

Our clients rely on Terminal to:

  • Take care of the logistics of hiring from payroll and benefits;
  • Deal with complexities of employee transfers and immigration; and
  • Handle member personal information. Member personal information is only shared with clients when requested by the client, and with informed consent of the members.

Read more about Terminal’s Remote Management Platform

Workspace Security

Whether members are working at one of Terminal’s offices or remotely, Terminal implements comprehensive security practices to protect our Clients’ Confidential Data, including intellectual property.

All of Terminal’s officers are protected by advanced security firewalls. Upon request from a client, we create a separate network with its own firewall rules for the client.

Terminal’s security team conducts periodic security assessments of members who work remotely to meet our security standards.


Our Security Practices

Terminal takes clients’ security seriously. We have policies and procedures in place to segregate Terminal’s Talent and Remote Management Platforms (“Platforms”) from our clients’ critical systems and confidential data. Our tech-enabled Platforms are managed by Terminal’s corporate staff, who do not have access to our clients’ devices, critical systems, or confidential data.

All members (employees hired by Terminal on behalf of our clients) are required to follow our comprehensive information security principles to protect our clients’ confidential data, including intellectual property. This includes:

  • Using client-issued devices for creating and developing deliverables;
  • Following their assigned-client’s security policies to adhere to the client’s requirements; and
  • Respecting nondisclosure and guaranteeing control of intellectual property by the client.

Client data is entirely owned, controlled, and maintained by our Clients in their own systems, networks, and devices. Each client controls and provides access to its own systems through their own processes and procedures, keeping in-line with their own information security policies.

Terminal’s corporate staff (employees facilitating talent recruitment and not involved with creating client deliverables) do not have access to our clients’ critical systems and confidential data. They manage Terminal’s internal services, where access to data is limited to recruitment and employment information, as well as minimal Client Information for communication and billing. Terminal has security controls, policies, and procedures in place for its internal systems and Platforms, including:

  • Auditing;
  • Role-based access controls;
  • Network protection and segmentation;
  • Use of encryption at rest and in transit;
  • Regular system patching and vulnerability management; and
  • Antivirus and malware protection.

Please contact hello@terminal.io for more information about how Terminal meets sector-specific compliance requirements, such as the Payment Card Industry Data Security Standard (“PCI DSS”) and the Health Insurance Portability and Accountability Act (“HIPAA”).

Find the scale you need. Build your team today.
Get Started
Business
Terms of Use
© 2022 Terminal Inc.