Explore Gigs
Reliability and Security
Your peace of mind is our priority.
Reliability and security are our top priorities. We understand that you trust us with your data and your business, and we take that responsibility very seriously. That’s why we invest heavily in the latest security technologies and practices. We also have a team of experts who are constantly working to protect our systems and our customers’ data from cyber threats.
On this page, you’ll learn more about our specific reliability and security measures, as well as how we’re working to keep your data and your business safe.
Reliability
We understand that there may be some skepticism among Nigerians about hiring talent online and this is understandable. However, we want to assure you that GigLad is a registered and legitimate company that is committed to protecting our clients and freelancers.
- The freelancer’s profile: Before you hire a freelancer, be sure to check their profile carefully. This will give you a good sense of their skills, experience, and reputation. You should also read the feedback from previous clients.
- The escrow system: GigLad uses a secure escrow system to protect both clients and freelancers. This means that your payment is held in escrow until you are satisfied with the work that has been done.
- ID verification: All freelancers on GigLad are required to verify their identity. This helps to ensure that the people you are working with are who they say they are.
- Payment verification: We verify all payments made on GigLad. This helps to ensure that your money is safe and that you are not being scammed.
- Fraud detection: We have a team of fraud experts who are constantly monitoring our systems for suspicious activity. We also use a variety of fraud detection tools to identify and prevent fraud.
Data security
At GigLad, we understand that your data is precious, and we take its security very seriously. We have implemented a number of measures to protect your data from unauthorized access, use, or disclosure, including:
- Data encryption: All customer data is encrypted at rest and in transit, using industry-standard encryption algorithms. This means that even if someone were to gain unauthorized access to your data, they would not be able to read it.
- Access control: We have a strict access control policy in place to ensure that only authorized personnel have access to customer data. We also regularly review our access control lists to ensure that they are up-to-date and that only the people who need access to customer data have it.
- Access control: We have a strict access control policy in place to ensure that only authorized personnel have access to customer data. We also regularly review our access control lists to ensure that they are up-to-date and that only the people who need access to customer data have it.
- Security monitoring: We have a team of security experts who are constantly monitoring our systems for suspicious activity. We also use a variety of security tools to detect and prevent cyberattacks.
- Compliance: We are compliant with all applicable data security regulations, including the Nigeria Data Protection Regulation (NDPR).
The Principle
The three (3) key principle we by for reliability and security.
-
Trust is From the Past
-
Uncertainty Destroys Relations
-
Everyone Cares About Privacy