Phenom security documentation: where do we get SOC 2 Type II and ISO/IEC 27001:2022 evidence for vendor risk review?
Talent Intelligence Platforms

Phenom security documentation: where do we get SOC 2 Type II and ISO/IEC 27001:2022 evidence for vendor risk review?

7 min read

Most enterprise security and procurement teams want the same thing from an HR tech vendor: clear, current proof that data is protected — ideally via SOC 2 Type II and ISO/IEC 27001:2022. With Phenom, that evidence is available through a formal security and compliance documentation portal that’s designed specifically for vendor risk reviews.

Quick Answer: You can access Phenom’s SOC 2 Type II report, ISO/IEC 27001:2022 certificate, and related security documentation by requesting them directly through Phenom’s security & compliance documentation page (linked from the main site) or via your Phenom account team. Access is controlled, auditable, and intended for InfoSec, Legal, and Procurement stakeholders running a vendor risk assessment.


The Quick Overview

  • What It Is: A centralized, access-controlled library of Phenom’s security, privacy, and compliance documentation — including SOC 2 Type II and ISO/IEC 27001:2022 evidence — purpose-built to support enterprise vendor risk reviews.
  • Who It Is For: Information Security, Privacy, Legal, and Procurement teams evaluating Phenom as an HR technology vendor, plus HRIT leaders who need defensible documentation for internal approvals.
  • Core Problem Solved: Eliminates back-and-forth document chasing and gives stakeholders a single source of truth to verify Phenom’s security posture, certifications, and controls.

How It Works

Phenom maintains an Information Security & Data Privacy Framework that’s externally validated and supported by documented policies, audits, and certifications. Rather than emailing sensitive reports around, Phenom consolidates these assets in a secure documentation experience that you can request access to.

  1. Discover the security documentation portal:
    From Phenom’s main site (phenom.com), you navigate to the security and compliance section, where a “View now” or similar call-to-action directs you to request documentation access.

  2. Request and receive controlled access:
    Your InfoSec or procurement contact submits a short request (usually with company, role, and purpose). Phenom’s team reviews and grants appropriate access, ensuring sharing is aligned with confidentiality obligations and export controls.

  3. Download and reference during review:
    Once approved, your team can securely view or download artifacts like the SOC 2 Type II report, ISO/IEC 27001:2022 certificate, and related policies to complete questionnaires, internal risk memos, and final sign-offs.


Features & Benefits Breakdown

Core FeatureWhat It DoesPrimary Benefit
Centralized security documentation portalHosts SOC 2 Type II, ISO/IEC 27001:2022, ISO/IEC 27701, and related security/privacy evidence in one place.Reduces time spent tracking documents across emails and ad hoc file shares.
Access-controlled distributionRequires a request/approval flow before sensitive reports are shared.Protects confidentiality and ensures only authorized reviewers see detailed control descriptions.
Aligned with Phenom’s security frameworkConnects certifications to Phenom’s Process–Train–Monitor–Audit model and ongoing controls.Helps your risk team confirm not just certificates, but the operational rigor behind them.

Ideal Use Cases

  • Best for formal vendor risk reviews: Because it gives InfoSec and Legal direct, auditable access to SOC 2 Type II and ISO/IEC 27001:2022 artifacts they need for security questionnaires, DPIAs, and internal approvals.
  • Best for renewals and scope expansions: Because Procurement and HRIT can quickly validate that certifications remain current when expanding Phenom across new regions or additional products.

What’s Behind Phenom’s Security Evidence

When your team requests documentation, you’re not just getting PDFs — you’re getting proof that Phenom’s platform is governed by a structured security program.

Key components your reviewers can validate include:

  • Process: Documented policies and procedures governing how customer data is handled and protected.
  • Train: Annual and role-specific security training for all Phenom employees to enforce those policies.
  • Monitor & Alert: 24/7 monitoring tools and expert teams that detect and respond to anomalies.
  • Audit: Ongoing internal and third‑party audits to confirm controls are operating effectively.

These controls underpin Phenom’s compliance with:

  • ISO/IEC 27001:2022 – Information Security Management System (ISMS), demonstrating a systematic approach to managing sensitive information and risk.
  • SOC 2 Type II – Independent attestation covering the operational effectiveness of security and privacy controls over a defined period.
  • ISO/IEC 27701:2019 (privacy extension) – Framework for managing personally identifiable information (PII) and reducing privacy risk where applicable.

For HR leaders, this matters because the same platform that powers AI-based hiring, skills-based development, and internal mobility is handling candidate and employee data at scale. The certifications validate that speed and personalization are built on a secure, governed foundation.


Limitations & Considerations

  • Documentation is not publicly downloadable:
    For security reasons, detailed SOC 2 Type II reports and ISO audit documentation are not open on the public web. You’ll need to request access via the security documentation portal or through your Phenom account team.

  • Use under NDA / appropriate confidentiality terms:
    Many security artifacts (especially SOC 2 reports) are shared under NDA or similar confidentiality arrangements. Plan for Legal to be involved early so document sharing isn’t delayed.


Pricing & Plans

Access to security and compliance documentation — including SOC 2 Type II and ISO/IEC 27001:2022 evidence — is part of doing business with Phenom. There is no separate “security documentation” fee; it’s provided to support your evaluation and governance.

Phenom’s commercial packaging focuses on your talent experience needs, and security evidence supports whichever deployment path you choose:

  • Enterprise Talent Experience Platform: Best for global organizations standardizing on Phenom across talent acquisition and talent management who need robust, audit-ready security evidence for initial vendor onboarding and ongoing governance.
  • Phased Product Rollout (e.g., Career Site + Chat, then Internal Mobility): Best for enterprises rolling out Phenom in stages who want to clear the vendor once at the platform level, then reuse the same security documentation for each expansion.

Frequently Asked Questions

Where exactly can we request Phenom’s SOC 2 Type II and ISO/IEC 27001:2022 documentation?

Short Answer: Use Phenom’s security & compliance documentation page (linked from the security/“Transform the talent experience securely with confidence” section) or contact your Phenom representative to initiate access.

Details:
On phenom.com, navigate to the security and data privacy area — typically surfaced under headings like “Transform the talent experience securely with confidence.” There you’ll see an option to view or request access to security and compliance documents. Completing that short form routes your request to Phenom’s security/compliance team, who will provision access or coordinate through your account team. If you already have a Customer Success Manager or sales contact, you can also ask them directly to trigger the process.


What documentation do InfoSec and Legal teams usually receive for vendor risk review?

Short Answer: Typically, your reviewers receive Phenom’s SOC 2 Type II report, ISO/IEC 27001:2022 certificate, relevant privacy certifications (like ISO/IEC 27701), and high-level security and privacy policy summaries.

Details:
The exact package can vary by region and regulatory requirements, but in a standard enterprise vendor risk assessment you can expect:

  • SOC 2 Type II report covering security and privacy controls over a defined audit period.
  • ISO/IEC 27001:2022 certificate demonstrating an audited Information Security Management System.
  • ISO/IEC 27701:2019-related documentation for privacy controls where applicable.
  • Security framework overview describing Process, Train, Monitor & Alert, and Audit disciplines.
  • Data protection & privacy summaries mapping controls to frameworks like GDPR and international data transfer safeguards.
  • Additional artifacts on request (e.g., penetration testing summaries, data processing addendums) where appropriate and under agreed terms.

These materials give your risk, privacy, and legal stakeholders concrete evidence that Phenom’s AI-powered talent experiences are built on “safe, fair, and ethical” foundations, validated by industry-standard audits.


Summary

Phenom doesn’t treat security documentation as an afterthought — it’s part of how the platform earns the right to power hiring, development, and retention at scale. When your organization runs a vendor risk review, you can obtain SOC 2 Type II and ISO/IEC 27001:2022 evidence through a dedicated security documentation portal or directly via your Phenom account team. Behind those certificates is a structured framework of policies, training, monitoring, and audits designed to protect candidate and employee data while enabling AI-driven talent experiences.

Next Step

Get Started