{"id":36699,"date":"2023-06-15T09:40:00","date_gmt":"2023-06-15T13:40:00","guid":{"rendered":"https:\/\/www.pcrecruiter.net\/site\/?p=36699"},"modified":"2024-01-11T12:11:37","modified_gmt":"2024-01-11T17:11:37","slug":"data-security-for-remote-recruiting","status":"publish","type":"post","link":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/","title":{"rendered":"9 Data Security Considerations for Remote Recruiting"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Risks To Data In Remote Recruiting<\/h2>\n\n\n\n<p>More and more people are getting used to remote interactions as part of the recruitment process and efforts to attract the best talent with a view to hiring them. The risks to data privacy in recruitment are similar to many other professions.<\/p>\n\n\n\n<p>Remote lawyers, accountants \u2014 even mobile engineers \u2014 need systems for keeping data safe. Hardware risks arise when users bring their own device as opposed to a company-issued one. This isn\u2019t a major issue for large enterprises that supply employees with equipment, but it may be a concern for third-party recruiters and smaller recruiting firms.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-medium\"><img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/pcr-at-home-300x300.jpg\" alt=\"A home workstation (photo by Elle Hughes)\" class=\"wp-image-36702\" srcset=\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/pcr-at-home-300x300.jpg 300w, https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/pcr-at-home-150x150.jpg 150w, https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/pcr-at-home.jpg 640w\" sizes=\"(max-width: 300px) 85vw, 300px\" \/><figcaption>Working from home can be as secure as working from the office with the proper protocols in place.<\/figcaption><\/figure><\/div>\n\n\n<p>Another obvious risk to data is when remote third-party recruiters work for multiple clients and potentially use data from one client to benefit another. For employers, there\u2019s the inherent risk that an unscrupulous remote third-party recruiter, working on their behalf, might attempt to entice talent away to another client. This ethical (and possibly legal) problem is part of a more general challenge around the performance management of remote workers. This is especially relevant in recruitment niches where the key candidates and hiring authorities are well-known to major players.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Legal Implications<\/h2>\n\n\n\n<p>Remote recruiting often, but not always, aligns with recruiting across multiple jurisdictions with different employment and contracting laws. This too can create issues around compliance with different data privacy regulations \u2013 such as the <a href=\"https:\/\/oag.ca.gov\/privacy\/ccpa\">California Consumer Privacy Act (CCPA)<\/a>, and the <a href=\"https:\/\/gdpr-info.eu\/\">General Data Protection Regulation (GDPR)<\/a> from the European Union (EU).<\/p>\n\n\n\n<p>In the US, social security and financial account information are the only protected pieces of personal data. This is different in other parts of the world. At the same time, legal cases such as the commercial use of a subject\u2019s data are constantly challenging what can and can\u2019t be done with data. In short, recruiters need to be better informed about the candidates and companies they\u2019re working with, and what the legal relationships are.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>The good news is that Applicant Tracking Systems (ATS) and CRM like <a href=\"https:\/\/www.pcrecruiter.net\/site\">CLICK HERE TO LEARN MORE<\/a> have always been suitable for remote work. That\u2019s because users can be in different locations when they sign in, but the database is centrally and securely located in one place.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">9 Recruitment Data Security Considerations<\/h2>\n\n\n\n<p>If your team is going to be handling recruitment data remotely, here are nine key points you&#8217;ll want to bear in mind:<\/p>\n\n\n\n<ol class=\"ordered-fancy wp-block-list\"><li><strong>Technology: <\/strong>Getting your technology stack in order has to be the number one priority for all recruiters \u2014 not just those working remotely. This includes everything from communication platforms right through to trust and verification technology for managing performance metrics.<\/li><li><strong>Legality: <\/strong>Alongside your tech stack, recruitment firms and in-house HR teams need to ensure clarity over legal requirements at local, national, and international levels. Ownership of the data is also important to fully understand \u2014 who owns it, who\u2019s responsible for it, and which rules apply.<\/li><li><strong>Form management: <\/strong>Another key consideration arises when your recruitment processes involves the distribution, management, and processing of forms. You&#8217;ll need to be certain that the data is securely transmitted, securely held, and be aware of who\u2019s responsible for it.<\/li><li><strong>Contractual obligations:<\/strong> Recruitment firms can also ensure that compensation for contractors or employees is dependent on their data compliance and classification. By making it a job requirement for data to be entered cleanly into the system, the sources and the audit trail are made transparent and complete.<\/li><li><strong>Virtual Private Network (VPN): <\/strong>A core piece in remote security is the ability to lock down recruitment software within your company\u2019s VPN and to and not store data like social security numbers unencrypted on a local device.<\/li><li><strong>IP Restrictions: <\/strong>By imposing restrictions that only allow a specific range of IP addresses to access data, business owners can limit access. Using IP restrictions means that even a compromised password is cannot allow unauthorized users into the system.\u00a0<\/li><li><strong>Remote desktop: <\/strong>Running your work desktop remotely via another connected device is another option for controlling access to data and monitoring its use. This is less common today thanks to browser-based software, but tools like <a href=\"https:\/\/remotedesktop.google.com\/\">Chrome Remote Desktop<\/a> have also made it more convenient.<\/li><li><strong>Control measures: <\/strong>Establishing what the appropriate permissions are for each user of your recruitment software \u2014 and each kind of remote worker \u2014 ensures recruiters only see what they need to see, and can only access data that\u2019s relevant to their role.\u00a0<\/li><li><strong>Data disposal: <\/strong>Different regulations exist determining record retention and destruction. Recruitment firms, as well as in-house teams, need to know how to store and destroy data accordingly. One example is the I9 form in the US, which must be kept for 3 years.<\/li><\/ol>\n\n\n\n<p>Considerations such as these need to be addressed at the contact stage between the customer and the vendor. That\u2019s especially important when the data held is aggregated over an extended time period. A further consideration is the difference between data held online and data physically kept in disconnected cold storage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Security Features Recruiters Need<\/h2>\n\n\n\n<p>PCRecruiter\u2019s built-in security functionality makes it the safe choice for remote recruiting. Here\u2019s a list of some of the most popular security features:<\/p>\n\n\n\n<ul class=\"bullet wp-block-list\"><li>IP whitelisting, which means only trusted IP addresses can access your recruitment data.<\/li><li>Permissions and preferences that enable you to impose limitations on a recruiter\u2019s views and access to particular functions.<\/li><li>IP-tagged action logs so you can monitor where and when users are accessing the system, as well as what major actions are being taken.<\/li><li>Two-factor authentication (2FA) helps provide assurance that the loss of a password doesn\u2019t automatically compromise your recruiter\u2019s account.<\/li><li>Multi-database functionality allows you to keep datasets separate and secure from cross-contamination.<\/li><li>Field-level encryption means you can protect sensitive data in particular fields.<\/li><li>The ability to host PCRecruiter locally allows it to run on a private &#8216;air-gapped&#8217; network where required.\u00a0\u00a0<\/li><\/ul>\n\n\n\n<p>When it comes to keeping data safe, remote recruiting is not substantially different from other forms of remote sales. In fact, the nature of remote recruiting encourages companies to more carefully consider the security of their recruitment practices.\u00a0<\/p>\n\n\n\n<p>These practices include the processes used to build and validate trust in remote workers. Of course, it also helps to choose a <a href=\"https:\/\/www.pcrecruiter.net\/site\">CLICK HERE TO LEARN MORE<\/a> vendor with highly-configurable security and remote features.\u00a0\u00a0<\/p>\n\n\n\n<p><em>Managing remote recruiters? PCRecruiter can help keep data safe. Speak to our sales team. <\/em><a href=\"https:\/\/www.pcrecruiter.net\/site\/contact-us\/#book-demo\"><em>Contact us.<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether your recruiters are in the office or at home, the safety of candidate and company data is a priority. A breach can be costly for your recruitment efforts, your finances, and your reputation. As with any remote role, recruitment comes with its own risks. But with the correct knowledge, clear policies, and the right recruitment software, you and your remote recruitment team can keep data safe.<\/p>\n","protected":false},"author":13,"featured_media":36720,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-36699","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>9 Data Security Considerations for Remote Recruiting - PCRecruiter<\/title>\r\n<meta name=\"description\" content=\"When your recruiters work remotely, how do you keep your data safe? We look at 9 ways to keep data safe when remote recruiting.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"9 Data Security Considerations for Remote Recruiting - PCRecruiter\" \/>\r\n<meta property=\"og:description\" content=\"When your recruiters work remotely, how do you keep your data safe? We look at 9 ways to keep data safe when remote recruiting.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/\" \/>\r\n<meta property=\"og:site_name\" content=\"PCRecruiter\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/PCRecruiter\" \/>\r\n<meta property=\"article:published_time\" content=\"2023-06-15T13:40:00+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-01-11T17:11:37+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/blog-RemoteRecruitingSecurity.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\r\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"PCRecruiter\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@PCRecruiter\" \/>\r\n<meta name=\"twitter:site\" content=\"@PCRecruiter\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PCRecruiter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/\"},\"author\":\"PCRecruiter\",\"headline\":\"9 Data Security Considerations for Remote Recruiting\",\"datePublished\":\"2023-06-15T13:40:00+00:00\",\"dateModified\":\"2024-01-11T17:11:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/\"},\"wordCount\":1084,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/blog-RemoteRecruitingSecurity.png\",\"articleSection\":[\"Industry\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/\",\"url\":\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/\",\"name\":\"9 Data Security Considerations for Remote Recruiting - PCRecruiter\",\"isPartOf\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/blog-RemoteRecruitingSecurity.png\",\"datePublished\":\"2023-06-15T13:40:00+00:00\",\"dateModified\":\"2024-01-11T17:11:37+00:00\",\"description\":\"When your recruiters work remotely, how do you keep your data safe? We look at 9 ways to keep data safe when remote recruiting.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#primaryimage\",\"url\":\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/blog-RemoteRecruitingSecurity.png\",\"contentUrl\":\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/blog-RemoteRecruitingSecurity.png\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pcrecruiter.net\/site\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"9 Data Security Considerations for Remote Recruiting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#website\",\"url\":\"https:\/\/www.pcrecruiter.net\/site\/\",\"name\":\"PCRecruiter\",\"description\":\"PCRM &amp; PCR - Software for Recruiters\",\"publisher\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pcrecruiter.net\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#organization\",\"name\":\"PCRecruiter\",\"alternateName\":\"Main Sequence Technology, Inc.\",\"url\":\"https:\/\/www.pcrecruiter.net\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2020\/08\/PCRecruiter-1200px.png\",\"contentUrl\":\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2020\/08\/PCRecruiter-1200px.png\",\"width\":1200,\"height\":627,\"caption\":\"PCRecruiter\"},\"image\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/PCRecruiter\",\"https:\/\/x.com\/PCRecruiter\",\"https:\/\/linkedin.com\/company\/PCRecruiter\"]}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"9 Data Security Considerations for Remote Recruiting - PCRecruiter","description":"When your recruiters work remotely, how do you keep your data safe? We look at 9 ways to keep data safe when remote recruiting.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/","og_locale":"en_US","og_type":"article","og_title":"9 Data Security Considerations for Remote Recruiting - PCRecruiter","og_description":"When your recruiters work remotely, how do you keep your data safe? We look at 9 ways to keep data safe when remote recruiting.","og_url":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/","og_site_name":"PCRecruiter","article_publisher":"https:\/\/facebook.com\/PCRecruiter","article_published_time":"2023-06-15T13:40:00+00:00","article_modified_time":"2024-01-11T17:11:37+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/blog-RemoteRecruitingSecurity.png","type":"image\/png"}],"author":"PCRecruiter","twitter_card":"summary_large_image","twitter_creator":"@PCRecruiter","twitter_site":"@PCRecruiter","twitter_misc":{"Written by":"PCRecruiter","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#article","isPartOf":{"@id":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/"},"author":"PCRecruiter","headline":"9 Data Security Considerations for Remote Recruiting","datePublished":"2023-06-15T13:40:00+00:00","dateModified":"2024-01-11T17:11:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/"},"wordCount":1084,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcrecruiter.net\/site\/#organization"},"image":{"@id":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/blog-RemoteRecruitingSecurity.png","articleSection":["Industry"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/","url":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/","name":"9 Data Security Considerations for Remote Recruiting - PCRecruiter","isPartOf":{"@id":"https:\/\/www.pcrecruiter.net\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#primaryimage"},"image":{"@id":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/blog-RemoteRecruitingSecurity.png","datePublished":"2023-06-15T13:40:00+00:00","dateModified":"2024-01-11T17:11:37+00:00","description":"When your recruiters work remotely, how do you keep your data safe? We look at 9 ways to keep data safe when remote recruiting.","breadcrumb":{"@id":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#primaryimage","url":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/blog-RemoteRecruitingSecurity.png","contentUrl":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2023\/06\/blog-RemoteRecruitingSecurity.png","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcrecruiter.net\/site\/2023\/06\/15\/data-security-for-remote-recruiting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcrecruiter.net\/site\/"},{"@type":"ListItem","position":2,"name":"9 Data Security Considerations for Remote Recruiting"}]},{"@type":"WebSite","@id":"https:\/\/www.pcrecruiter.net\/site\/#website","url":"https:\/\/www.pcrecruiter.net\/site\/","name":"PCRecruiter","description":"PCRM &amp; PCR - Software for Recruiters","publisher":{"@id":"https:\/\/www.pcrecruiter.net\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcrecruiter.net\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcrecruiter.net\/site\/#organization","name":"PCRecruiter","alternateName":"Main Sequence Technology, Inc.","url":"https:\/\/www.pcrecruiter.net\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcrecruiter.net\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2020\/08\/PCRecruiter-1200px.png","contentUrl":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2020\/08\/PCRecruiter-1200px.png","width":1200,"height":627,"caption":"PCRecruiter"},"image":{"@id":"https:\/\/www.pcrecruiter.net\/site\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/PCRecruiter","https:\/\/x.com\/PCRecruiter","https:\/\/linkedin.com\/company\/PCRecruiter"]}]}},"_links":{"self":[{"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/posts\/36699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/comments?post=36699"}],"version-history":[{"count":21,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/posts\/36699\/revisions"}],"predecessor-version":[{"id":37840,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/posts\/36699\/revisions\/37840"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/media\/36720"}],"wp:attachment":[{"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/media?parent=36699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/categories?post=36699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/tags?post=36699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}