Trust
Quality, experienced interviewers
We are dedicated to maintaining a global community of experienced interviewers who persistently deliver quality mock interview sessions to students across all years. Live webinars and asynchronous interviewer modules are part of the training process when interviewers are onboarded onto the platform at the start of each semester.
Vetting process
We employ a vetting process to create a network of quality interviewers. We verify that all interviewers who use our platform are competent, credible, and caring – the Three Cs criteria. These attributes are evaluated in a screening call with each interviewer. Here is how we breakdown down each criterion’s evaluation:
Credible: Potential interviewers have worked at well-known institutions within their respective career path and industry domain. These are institutions that are highly sought out, which students are likely to apply to. Potential interviewers ideally have been through multiple interview processes and completed multiple mock interviews as part of their preparation process.
Caring: Potential interviewers demonstrate a keen desire to give back and help students improve their interviewing skills. They provide thorough feedback and tailor the nature of the feedback to suit the confidence level of the student. In the application process, potential interviewers will be asked for at least 2 references which we will contact to validate and further gauge how suitable their personality is to be mock interviewer.
Competent: Potential interviewers should be able to effectively answer all questions that they are asking the interviewee. They should also be able to answer any follow-up and clarification questions within their industry domain that a student may ask. Potential interviewers should be able to put themselves in the student’s shoes and leverage their experiences to help improve student’s answers.
As a final step in the vetting process, we will observe a recording of a test mock interview and obtain feedback from the student while also assessing the live performance against how the Three Cs are displayed.
Adequate training
Our team is dedicated to providing interviewers with continuous support. The team checks in on interviewers after their first session to make sure that everything went smoothly and that interviewers have the tools they need in order to communicate with students efficiently and effectively. This involves reaching out to them directly and asking them to fill out a feedback survey to check if there were any bottlenecks during the hosting process for them.
Ratings & reviews
The quality and depth of an interviewer’s experience is reflected in the reviews given by students. Our team strives to verify reviews in order to ensure the quality of mock interviews and the validity of the transaction.
Safety
Session Recordings
Online sessions are required to be recorded upon onboarding interviewers and interviewees. These recordings are available to both parties upon request. Recording the mock interviews is required to mitigate the risk of any form of abuse or rudeness from either party. Mockt may review any sessions where a report has been made by any person using the platform for the purpose of investigating abuse. Mockt may also review any sessions for quality assurance and vetting purposes.
Security
Data
We ensure that both parties’ personal information stays secure. Our Privacy Policy outlines how our team takes extra steps to protect their personal information.
Parties will benefit from the Azure Cloud Platform (“ACP”) and network architecture built to meet the requirements of the most security-sensitive organizations. ACP encompasses numerous security tools responsible for the operations management of many education institutions, of which includes Microsoft Defender for Cloud (“MDC”). Read more about ACP’s security protocols here.
Video Encryption
All data in the Mockt interview sessions are encrypted end-to-end by default between parties for video sessions on a web browser. Mockt adheres to Internet Engineering Task Force (IETF) security standards for Datagram Transport Layer Security (DTLS) and Secure Real-time Transport Protocol (SRTP). Learn more about DTLS here.