Data Security
Last updated: August 28, 2025

Company Information

Company: ShoreAgents Inc.
Registration: SEC CS201918140 | TIN 010-425-223-00000
Phone: +63 917 702 0676
Email: careers@shoreagents.com
Website: https://shoreagents.com
Careers Website: https://careers.shoreagents.com
Platform: https://bpoc.io
Address:
Business Center 26, Philexcel Business Park, Ma Roxas Highway, Clark Freeport, 2023 Pampanga

About Our Platform

Our recruitment platform at bpoc.io is ShoreAgents Inc.'s internal hiring tool designed to streamline our recruitment process and connect with qualified BPO professionals seeking employment with our company.

By using this platform, you are applying for potential employment with ShoreAgents Inc.

Our Commitment to Security

At ShoreAgents Inc., we take data security seriously. We implement industry-standard security measures to protect your personal information and ensure the confidentiality, integrity, and availability of all data stored on our platform.

This document outlines our comprehensive security practices and measures designed to safeguard your information.

Technical Safeguards

Encryption

  • SSL/HTTPS Encryption: All data transmission between your device and our servers is encrypted using industry-standard SSL/TLS protocols
  • Data at Rest: All stored personal information is encrypted using advanced encryption algorithms
  • Database Encryption: Sensitive data fields are encrypted at the database level
  • Password Security: Passwords are hashed using secure, one-way cryptographic functions

Access Controls

  • Multi-Factor Authentication: Required for all administrative and staff access to the platform
  • Role-Based Access: Staff can only access data necessary for their job functions
  • User Authentication: Secure login systems with session management and timeout features
  • Access Logging: All access to sensitive data is logged and monitored

Network Security

  • Firewalls: Network firewalls protect our infrastructure from unauthorized access
  • Intrusion Detection: Automated systems monitor for suspicious activity and potential threats
  • DDoS Protection: Protection against distributed denial-of-service attacks
  • Regular Security Updates: All systems are kept up-to-date with the latest security patches

Infrastructure Security

  • Secure Cloud Hosting: Data is stored on reputable cloud infrastructure providers with high security standards
  • Backup Systems: Regular automated backups with encrypted storage and disaster recovery procedures
  • Physical Security: Server facilities are protected by physical security measures
  • Monitoring: 24/7 monitoring of system performance and security events

Organizational Safeguards

Staff Training

  • All staff receive comprehensive training on data protection and security practices
  • Regular security awareness updates and best practices training
  • Training on recognizing and responding to security threats
  • Confidentiality agreements for all employees with access to personal data

Access Policies

  • Strict data access policies limiting access to authorized personnel only
  • Principle of least privilege - staff only have access to data necessary for their role
  • Regular access reviews and audits
  • Immediate revocation of access upon employee termination or role change

Incident Response

  • Comprehensive incident response plan for security breaches
  • Designated security team responsible for incident management
  • Procedures for containment, investigation, and recovery
  • Notification procedures in case of data breaches (as required by law)

Data Retention & Disposal

Retention Policies

  • Personal data is retained only as long as necessary for recruitment purposes
  • Data from unsuccessful applications may be retained for up to 2 years for potential future opportunities
  • Data from successful hires is retained according to employment record requirements
  • You may request deletion of your data at any time (subject to legal requirements)

Secure Disposal

  • When data is no longer needed, it is securely deleted using industry-standard methods
  • Physical records are securely shredded
  • Digital data is permanently erased using secure deletion methods
  • Backup systems are updated to remove deleted data

Third-Party Security

We work with trusted third-party service providers for platform hosting, authentication, and other services. All third-party providers are required to:

  • Maintain industry-standard security certifications
  • Comply with data protection regulations
  • Implement appropriate security measures
  • Sign confidentiality and data processing agreements
  • Undergo regular security assessments

Your Role in Security

While we implement comprehensive security measures, you also play an important role in protecting your information:

  • Strong Passwords: Use a unique, strong password for your account
  • Account Security: Never share your login credentials with anyone
  • Secure Devices: Ensure your device has up-to-date security software
  • Logout: Always log out when using shared or public devices
  • Report Issues: Immediately report any suspicious activity or security concerns

Security Updates & Monitoring

  • Regular security audits and vulnerability assessments
  • Continuous monitoring of security systems and logs
  • Regular updates to security policies and procedures
  • Compliance reviews to ensure adherence to security standards
  • Penetration testing to identify and address potential vulnerabilities

Contact Us

IT Support & Data Protection

Email: it@shoreagents.com
Attention: Data Protection Officer (Stephen Philip Atcheler)
Response Time: Within 5 business days

Recruitment Team

Email: recruitment@shoreagents.com
Phone: +63 917 702 0676
Hours: Monday-Friday, 6am to 3pm (Philippine Time)

Legal Compliance

Our security practices comply with:

  • Republic Act 10173 (Data Privacy Act of 2012)
  • National Privacy Commission (NPC) guidelines
  • Industry best practices and security standards
  • International data protection frameworks
SecureCompliantProtected

Document Version: 1.0 | Next Review Date: February 28, 2026

Approved By: Stephen Philip Atcheler, Data Protection Officer

© 2025 ShoreAgents Inc. All rights reserved.