Terminal Trust and Transparency Center

Clients trust Terminal to find the best remote talent across the world. Terminal’s commitment to privacy and data protection is integrated into our tech-enabled Talent and Remote Management Platforms (“Platforms”). Our Platforms consist of people, processes, and technology, backed by the security and infrastructure necessary to safeguard and support Clients as they grow their remote teams.

Clients trust Terminal to find the best remote talent across the world. Terminal’s commitment to privacy and data protection is integrated into our tech-enabled Talent and Remote Management Platforms (“Platforms”). Our Platforms consist of people, processes, and technology, backed by the security and infrastructure necessary to safeguard and support Clients as they grow their remote teams.

Learn more about how Terminal protects the personal data.

Overview

Security

Terminal takes clients’ security seriously. We have policies and procedures in place to segregate Terminal’s Talent and Remote Management Platforms from our clients’ critical systems and confidential data. Our tech-enabled Platforms are managed by Terminal’s corporate staff, who do not have access to our clients’ devices, critical systems, or confidential data.

All members (employees hired by Terminal on behalf of our clients) are required to follow our comprehensive information security principles to protect our clients’ confidential data, including intellectual property. This includes:

  • Using client-issued devices for creating and developing deliverables;
  • Following their assigned-client’s security policies to adhere to the client’s requirements; and
  • Respecting nondisclosure and guaranteeing control of intellectual property by the client.

Read more about our security practices.


Privacy

Terminal understands and respects privacy. We limit our collection of personal information to website visitors, job applicants and employees, and client business contacts.

Terminal does not access personal information collected by our clients.

Read more about Terminal’s privacy practices for job applicants.

Read more about Terminal’s privacy practice for website visitors and client business contacts.


Compliance

Terminal’s privacy and information governance programs complies with applicable jurisdictional laws, including:

  • The California Consumer Privacy Act;
  • Canada’s Personal Information Protection and Electronic Documents Act; and
  • Various Latin American data protection laws.

Please contact hello@terminal.io for more information about how Terminal meets sector-specific compliance requirements, such as the Payment Card Industry Data Security Standard (“PCI DSS”) and the Health Insurance Portability and Accountability Act (“HIPAA”).


Vetting Talent

Reduce the risk of remote hiring by trusting Terminal to match your talent needs with the best markets to hire. During the recruitment and hiring process, we vet members (employees hired by Terminal on behalf of our clients) by conducting screenings, skills assessments, and background or credit checks prior to employment.

Read more about how Terminal works.

Human Resources and Payroll Services

Our clients rely on Terminal to:

  • Take care of the logistics of hiring from payroll and benefits;
  • Deal with complexities of employee transfers and immigration; and
  • Handle member personal information. Member personal information is only shared with clients when requested by the client, and with informed consent of the members.

Read more about Terminal’s Remote Management Platform

Workspace Security

Whether members are working at one of Terminal’s offices or remotely, Terminal implements comprehensive security practices to protect our Clients’ Confidential Data, including intellectual property.

All of Terminal’s officers are protected by advanced security firewalls. Upon request from a client, we create a separate network with its own firewall rules for the client.

Terminal’s security team conducts periodic security assessments of members who work remotely to meet our security standards.


Our Security Practices

Terminal takes clients’ security seriously. We have policies and procedures in place to segregate Terminal’s Talent and Remote Management Platforms (“Platforms”) from our clients’ critical systems and confidential data. Our tech-enabled Platforms are managed by Terminal’s corporate staff, who do not have access to our clients’ devices, critical systems, or confidential data.

All members (employees hired by Terminal on behalf of our clients) are required to follow our comprehensive information security principles to protect our clients’ confidential data, including intellectual property. This includes:

  • Using client-issued devices for creating and developing deliverables;
  • Following their assigned-client’s security policies to adhere to the client’s requirements; and
  • Respecting nondisclosure and guaranteeing control of intellectual property by the client.

Client data is entirely owned, controlled, and maintained by our Clients in their own systems, networks, and devices. Each client controls and provides access to its own systems through their own processes and procedures, keeping in-line with their own information security policies.

Terminal’s corporate staff (employees facilitating talent recruitment and not involved with creating client deliverables) do not have access to our clients’ critical systems and confidential data. They manage Terminal’s internal services, where access to data is limited to recruitment and employment information, as well as minimal Client Information for communication and billing. Terminal has security controls, policies, and procedures in place for its internal systems and Platforms, including:

  • Auditing;
  • Role-based access controls;
  • Network protection and segmentation;
  • Use of encryption at rest and in transit;
  • Regular system patching and vulnerability management; and
  • Antivirus and malware protection.

Please contact hello@terminal.io for more information about how Terminal meets sector-specific compliance requirements, such as the Payment Card Industry Data Security Standard (“PCI DSS”) and the Health Insurance Portability and Accountability Act (“HIPAA”).