Security at Agendrix

Trusted by thousands of organizations.

We take security very seriously. The measures we have implemented—and continually improve—are our way of ensuring the safety of our users, our team, and our services day after day.


Our security standards.

ISO/IEC 27001:2013

Compliance with the ISO/IEC 27001 standard means that we have implemented a system to manage the security risks associated with our data and the data we process in accordance with the practices and principles established therein.

ISO/IEC 27701:2019

Compliance with the ISO/IEC 27701 standard means that we have implemented and continue to maintain a privacy information management system (PIMS) in accordance with the practices and principles established therein.


Compliance with the General Data Protection Regulation means that we have implemented measures to protect personal data in accordance with the principles set out therein.

Law 25

Compliance with the Act to modernize legislative provisions respecting the protection of personal information (Law 25) means that we comply with the protection measures set out in therein.

Product security

Delivering secure, reliable products.

Enhanced data encryption

All our SSL certificates support 256-bit SSL encryption to guarantee the security of data transmitted with Agendrix.

Resilience and continuity of service

We make redundant, continuous backups of our user databases, which can be recovered rapidly should problems arise.

Limited data retention

We keep the data of our users for as little time as possible, and only when necessary in order to provide our services.

State-of-the-art infrastructure and hosted services

We take advantage of the AWS cloud infrastructure in the ca-central-1 region backed by a 99.99% uptime service level agreement.

Process security

Always thinking ahead.

Regulation of data usage

Our employees are required to use data only to the extent necessary for the performance of their duties, subject to sanctions.

Incident management

Our Information Security Incident Management Policy sets out the process to follow in the event of a security incident.

Subprocessor and third-party provider management

We work exclusively with providers who have implemented information security standards that meet our requirements.

Employee background checks

We perform routine background and criminal record checks before approving each hire.

Security features in Agendrix

Features built to protect.

Organizational access control

Administrators can assign a role to each user and set the permissions associated with each role.

Activity logs

Immutable activity logs enable administrators to monitor the actions of every user within their organization.

Double encryption of sensitive data

Administrators have the option of double-encrypting HR data fields they deem sensitive.

Password rules

Administrators can define security requirements for the passwords of their users, including minimum length and the use of special characters.


Our security agreements.

Terms of service

Privacy policy

Acceptable use policy

Vulnerability disclosure program

To try Agendrix
is to adopt it.

Get up to 21 days of free trial. No credit card required.