🔐 Join the best in cybersecurity today!
Start today
close-icon

Security Center

Welcome to the Zalow Security Center

Our Security Center details the security and privacy best practices that support Zalow's commitment to a secure, reliable, and compliant marketplace. Please contact us at legal@zalow.com with any questions.

Information Security

Information security management system (ISMS)
​Our Information Security Management System (ISMS) defines the overall security functions at Zalow. Our ISMS outlines the roles and responsibilities of all our employees to help protect the confidentiality, integrity, and availability of the platform. Information Security & Privacy training is an essential element for all Zalow team members.

Architecture

We design controls and maintain our platform to optimize for security, availability, and performance. We utilize security by design principles to ensure controls are baked into our platform and that we utilize all appropriate infrastructure and programmatic controls.

Reporting a concern

Zalow’s Bug Bounty Program invites researchers to test Zalow’s platform to ensure our customers are using a secure platform that's tested by the security community.​

If you believe you’ve discovered a potential security vulnerability on Zalow, please email us at security@zalow.com while following the Guidelines for Responsible Disclosure.

Asset Protection

Data encryption
​To help protect from attacks, eavesdropping, and session hijacking, we encrypt all data in transit using Hypertext Transfer Protocol Secure (HTTPS) and enforce HTTP Strict Transport Security (HSTS).

Malware and spam protection

We use various internal and external systems and solutions to protect users against malicious behavior. Messages and attachments are scanned for viruses and other malware prior to you downloading them.

Confidentiality and IP rights

Enter into an agreement concerning confidentiality and intellectual property rights that works for you and your talent, or use our Optional Service Contract Terms, or tweak them to your needs, so the rights transfer at the time of payment.​

Regulatory Compliance

GDPR
​Our legal and information security teams have carefully analyzed the General Data Protection Regulation (GDPR) and have undertaken the necessary steps to ensure compliance.

CCPA
​We are compliant with the California Consumer Privacy Act (CCPA), the most stringent data privacy law in the United States.

Anti-money laundering (AML)

We have voluntarily implemented a robust Anti-Money Laundering Program and have a highly trained team dedicated to preventing illicit use. We also use Stripe, Inc. for all financial transactions and identity verification, and utilize their systems and solutions to enhance our AML capabilities.

Built on a foundation of trust, community, and innovation, we empower freelancers and organizations alike to thrive in a rapidly shifting threatscape where agility wins.

Get started today
Join Zalow by invitation or request access through our team. Create your account, verify your identity, and set up payments securely. Freelancers can upload a resume, complete their profile, and submit for approval to access high-value projects. Clients and Technology Service Providers can post projects and connect with vetted cybersecurity experts ready to deliver.