linkedin-logo-full linkedin-logo-icon logo-404-frontlogo-404-back LinkedIn logo LinkedIn logo LinkedIn logo LinkedIn logo LinkedIn logo LinkedIn logo LinkedIn logo LinkedIn logo LinkedIn logo LinkedIn logo LinkedIn logo LinkedIn logo
LinkedIn logo LinkedIn logo LinkedIn Security
  • Trust & Compliance
  • Vulnerability Disclosure
  • Safety Center
  • Security Practices
  • Privacy Policy
Share on LinkedIn Share on Facebook Share on Twitter

Your business is no one else’s

Here’s how we keep our
customers safe and secure

We never stop working to ensure LinkedIn is secure for your business.
We use a combination of industry standards and our own best practices.

Information Security Program

LinkedIn maintains a robust and extensive security program with policies and detailed security requirements that guide the program's execution. The objective of this program is to maintain the confidentiality, integrity and availability of information, intellectual property, and systems of LinkedIn and/or its users, members, guests, employees and business partners while meeting industry standards.

Compliance

LinkedIn policies, procedures, and standards are based on the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) 27001. In addition, we use an independent third-party body to audit our compliance with leading industry standards periodically.

Please see LinkedIn’s Security and Compliance page: https://security.linkedin.com/trust-and-compliance

Incident Management

A full security monitoring and incident response program is in place to alert, investigate, triage and remediate security events. Our Incident Response team performs a full investigation to determine the scope and impact of any security event or suspected incident and coordinates with the relevant teams for remediation.

Secure Software Development

LinkedIn maintains policies and procedures to ensure that system, device, application and infrastructure development is performed in a secure manner. A full Software Development Life Cycle (SDLC) framework, based on industry standards, is used to ensure secure design and engineering principles are integrated directly into the design and development process and are built into all products at LinkedIn.

Data Classification & Protection

LinkedIn maintains policies and procedures for data classification and protection governing how to securely handle different types of data.

Disaster Recovery and Business Continuity

LinkedIn maintains policies and procedures to ensure that LinkedIn may continue to perform business critical functions in the face of an extraordinary event. This includes data center resiliency and disaster recovery procedures for business critical data and processing functions.

Access Control

LinkedIn maintains policies and procedures to control access to LinkedIn’s facilities and systems using the least privilege paradigm where access is restricted to the minimum level necessary to perform business functions.

Risk Assessment Program

LinkedIn has a documented risk management procedure and Secure Software Development Life Cycle process. We perform risk assessments of our products and infrastructure on a regular basis, including review of our data classification policies and targeted reviews of highly confidential data flows.

Privacy policy


LinkedIn’s Privacy Policy governs our treatment of the information our members entrust us with every day. Please read our complete Privacy Policy for more information on the types of information we collect, how we use personal information, member’s choices and obligations, and other important information including how to contact us with privacy related questions or comments. 

Contact us
  • About
  • Cookie Policy
  • Privacy Policy
  • Your California Privacy Choices
  • User Agreement
  • Accessibility
LinkedIn logo © LinkedIn Corporation 2023