Back
✨ New: The People Ops Community - a space to connect with peers

Security

Protecting your data is our #1 priority

FIND OUT HOW WE CAN HELP

We've built the ChartHop platform security-first

You're entrusting ChartHop with your most valuable data, and we take this responsibility very seriously.

Fine-Grained Controls: Manage data access with highly customizable, enterprise-grade controls.
Role-Based Access: Access controls are based on roles, not individuals.
Auto On/Offboarding: ChartHop invites employees on their first day and revokes access on their last day.
Full Encryption: All data is encrypted at rest and in transit.
Biometric Access Control: Data can only be accessed with biometric and/or U2F keys.
Mandatory SSO: ChartHop supports multiple SSO and authentication options.

Third-party SOC 2 Type 2 examined

ChartHop has successfully completed a SOC 2 Type 2 examination by Schellman & Company. The SOC 2 certification is widely recognized as the standard for data security. It requires that companies establish and follow rigorous data security policies and procedures. By engaging Schellman, we have gained an objective evaluation of the effectiveness of such controls, particularly as it relates to Security.

Robust access controls that serve your every need

Make data available to those who need it and not visible to those who don't. Tag every data point using a wide range of customizable sensitivity levels - from Org Public to Personal Data to Compensation. Leverage complex managerial and role-based data access. Now, you don't need to make multiple copies of the same spreadsheet for different team members (and no need to fear sending the wrong one, either!).

Third-party SOC 2 Type 2 examined

ChartHop has successfully completed a SOC 2 Type 2 examination by Schellman & Company. The SOC 2 certification is widely recognized as the standard for data security. It requires that companies establish and follow rigorous data security policies and procedures. By engaging Schellman, we have gained an objective evaluation of the effectiveness of such controls, particularly as it relates to Security.

Robust access controls that serve your every need

Make data available to those who need it and not visible to those who don't. Tag every data point using a wide range of customizable sensitivity levels - from Org Public to Personal Data to Compensation. Leverage complex managerial and role-based data access. Now, you don't need to make multiple copies of the same spreadsheet for different team members (and no need to fear sending the wrong one, either!).

OUR THINKING

Explore our latest blogs, eBooks, videos and more

3 Reasons Your Company Should Adopt a Bottom-Up Approach to Planning

A top-down planning approach may not be the best for your business. When you flip you model to bottom up, you'll increase engagement, retention, and innovation.

Uncovering Gender Inequalities: 7 Reports to Help You Identify Disparities Among Your Workforce

By accessing your people data, you’ll be better equipped to make the right decisions that benefit your employees and organization. Start with these 7 reports to help uncover gender inequalities.

How to Tackle Informed, Responsible Compensation Planning

It's not enough to just establish a compensation plan. You also need one that is informed and responsible. Learn how to create one here.

Make one good decision
that leads to a lot of others

Sign up for a free demo today.