Information Security Center
Learn how Perfect keeps you data safe
Purpose of the Security Center
Key Points
Certifications
Third-Party Audits
Documentation Access
Supplier and Third-Party Management Policy
Data Collection Practices
Encryption Standards
Access Control
GoPerfect Human Resources Policy
Access Management Policy
Platform Features
User Education
Breach Response Plan
Common Concerns Addressed
API Security Documentation
Dashboard Access
Dedicated Security Team