Data and cybersecurity

Data and cybersecurity

When customers provide their information, they trust SEEK to protect their privacy and to use their data responsibly to help them find the best job opportunities. SEEK invests heavily in cybersecurity, data governance, and responsible AI to maximise benefits of technology for all.

Data trust and AI 

Responsible use of data and artificial intelligence (AI) is central to SEEK’s approach and ensures that data and AI services are not only useful, but also meet community expectations in relation to privacy, ethical considerations and personal control over data.

Responsible AI 

SEEK understands that recruitment is a human-centred process that can be strengthened by the responsible use of AI. We use AI and Machine Learning to deliver more effective and personalised matching of candidates and hirers, fairer advertising prices for hirers, and improved marketplace transparency and efficiency through predictions and insights.

SEEK takes a responsible, risk-based approach to AI development, prioritising user trust through robust AI governance that ensures thorough assessments and regular reviews of all AI services. Our approach is guided by four principles aligned with international standards, including the Australian Government's AI Ethics Framework and OECD AI Principles.

For more information on SEEK’s Responsible AI framework and principles, visit our dedicated Responsible AI page.

SEEK Pass

SEEK Pass is an online verification platform that enables candidates to securely verify, manage and share work credentials in one digital passport.

For more information refer to the SEEK Pass page.

Data privacy 

SEEK is committed to being transparent about how candidate information is collected, used and managed and to complying with all relevant data protection and privacy laws and regulations.

SEEK’s platform has a Privacy Policy and Privacy Collection Notice explaining how personal information is collected and used. The Privacy Statement can be found on the Security & Privacy Hub page. The Hub also contains links to other pages that help candidates take steps to protect themselves online and to a plain language summary of SEEK’s approach to the protection of candidates’ personal information.

SEEK collects information about how candidates interact with its employment platform. When SEEK collects information on usage of its sites in order to improve platform performance or make business decisions, the data is aggregated and anonymised. SEEK does not share personal information with third parties, other than as disclosed in its Privacy Policy and Privacy Collection Notice, or as required by law.

SEEK proactively guards against data breaches through a layered security program addressing security across people, process and technology controls.

Cybersecurity 

SEEK invests significantly in cybersecurity through its people, processes and technology. SEEK has plans in place to respond to cyberattacks and prepares accordingly.

SEEK’s approach includes both offensive and defensive strategies and continues to be enhanced over time through ongoing improvement programs.

Bug bounty program: The security researcher community is encouraged to legally attack and report security vulnerabilities in SEEK’s systems and products through the public Bug Bounty program. This allows public researchers to test for security weaknesses that might lead to compromises of customer data and be rewarded based on the severity of issues found. For more information refer to the Bug Bounty program website.

Subscribe

Receive our latest newsroom and investor updates.
What would you like to subscribe to?
By providing your personal information, you agree to the Collection Notice and Privacy Policy. You can unsubscribe at any time.

Contact us

Connect with our media team or investor relations team.