Security &
Zero-Trust.
Your data security is our top priority. Here's how we protect your career information: the technology, the safeguards, and the principles behind it.
1. The Logic of Absolute Trust
At Leap, security isn't a feature we bolt on later. It's built into every part of how we handle your data.
Whether you're navigating a career change or managing a workforce, you need to know your data is safe. We've built Leap from the ground up with the strongest protections available, keeping your information secure and entirely yours.
2. ISO 27001 (Aligned by Design) and Governance
Serious data needs serious standards. We've built Leap to align with ISO 27001 frameworks from the very first line of code.
We're working toward formal ISO 27001 certification, but we don't wait for a certificate to operate securely. We already run a comprehensive Information Security Management System (ISMS) that continuously identifies and manages data risks. For enterprise partners, this means documented proof of the governance you need.
3. Cryptographic Anchoring and Data Integrity
Your verified skills are valuable. Once validated on our platform, they can't be tampered with or corrupted.
We use cryptographic anchoring to lock your verified skills into a tamper-proof format. Every challenge you complete and credential you earn is permanently tied to your profile. This means recruiters and employers can trust that the skills they're looking at are genuine.
4. Zero-Trust Architecture and Infrastructure
We follow a Zero-Trust approach, meaning nothing is trusted by default. Every interaction has to be authenticated and verified.
Each portal (Talent, Recruiter, and Enterprise) is completely separated. A recruiter can never access an individual's private workspace, and enterprise data stays fully isolated. All data is stored on secure UK servers, ensuring your information never leaves the country.
5. Identity and Access Management
Securing the perimeter of your data begins at the point of entry. We enforce strict authentication protocols for all users across the Leap ecosystem to prevent unauthorised access.
For our enterprise partners, we support seamless integration with your existing Single Sign-On (SSO) infrastructure. This capability ensures your internal corporate password policies and multi-factor authentication requirements are automatically extended to the Leap platform, providing frictionless access without compromising your internal security perimeter.
6. Proactive Threat Mitigation
Our security posture is governed by continuous vigilance. We do not simply build walls and hope they hold. We actively search for vulnerabilities before they can be exploited.
Continuous Auditing
We conduct automated weekly vulnerability scans across our entire codebase and infrastructure to identify emerging risks.
Penetration Testing
We regularly commission independent white-hat penetration testing to simulate sophisticated cyber-attacks against our zero-trust boundaries.
Encryption Standards
All data is protected using military-grade AES-256 encryption at rest and TLS 1.3 encryption in transit.
Automated Data Minimisation
Our ingestion engine immediately strips and purges non-essential personal identifiers from uploaded documents, ensuring we only store the data absolutely necessary for skill validation.
7. Incident Response and Transparency
True technical reliability means having a tested, logical plan for the worst-case scenario. We maintain a comprehensive Business Continuity Plan grounded in the reality of rapid recovery.
In the highly unlikely event of a significant service outage, we maintain off-site, immutable backups of our core capability ledgers, allowing us to restore data integrity without risk of corruption. Furthermore, if a security incident ever poses a risk to your personal or professional data, our transparency mandate dictates that we will notify you and the Information Commissioner's Office within 72 hours, providing clear guidance and immediate support.
8. Internal Access and Personnel Security
A secure architecture is only as reliable as the team operating it. We enforce the principle of least privilege across our entire organisation.
Leap’s engineers and support specialists do not have default access to your personal capability ledgers. All internal access to production environments requires strict multi-factor authentication and is continuously logged for audit purposes. Our team undergoes regular security training to ensure that the human layer of our ecosystem remains as resilient as our code.
9. Supply Chain and Physical Infrastructure
While we engineer the software, we recognise that our security posture also relies on the physical infrastructure hosting our ecosystem. We partner exclusively with tier-one cloud providers located within the United Kingdom.
These infrastructure partners are subjected to rigorous vendor risk assessments. We demand that they maintain independent ISO 27001 (Aligned by Design) and SOC 2 Type II certifications, guaranteeing that the physical servers processing your data are protected by biometric access controls, permanent security personnel, and redundant power supplies.
10. The Master Switch
Security also means having the power to leave. You should never feel locked in.
Every user has a Master Switch in their dashboard. Activate it, and all your personal data is permanently destroyed through cryptographic shredding, making it unrecoverable within 30 days. You have complete control over your digital footprint.
11. Responsible Disclosure
We believe that maintaining industrial-grade security is a collaborative effort. We welcome responsible disclosure from security researchers and industry professionals.
If you believe you have discovered a vulnerability within the Leap platform, we ask that you report it to our Data Integrity Team immediately at security@dendro-logic.com. We commit to investigating all legitimate reports promptly and transparently.