You’re trusting us with your systems, your data, and your operations. That trust isn’t given lightly, and we don’t take it lightly. Here’s how we protect what matters.
We maintain the standards you’d expect from a firm handling sensitive business systems and data.
Our data handling practices comply with Australia’s Privacy Act 1988 and the 13 Australian Privacy Principles. We collect, store, and process personal information in accordance with Australian privacy law.
For clients with European operations or data subjects, we maintain compliance with the General Data Protection Regulation. Data processing agreements, right to deletion, data portability, and breach notification protocols are in place.
Our information security management practices align with ISO 27001 standards. We maintain documented security controls, risk assessment procedures, and continuous improvement processes.
We carry comprehensive professional indemnity insurance covering technology consulting, systems integration, and advisory services. Coverage protects both our clients and our work.
Our cyber liability policy covers data breaches, cyber incidents, and technology errors. This provides an additional layer of protection for client data and systems under our care.
Our internal security posture aligns with the Australian Cyber Security Centre’s Essential Eight mitigation strategies. We apply these same standards to client engagements where applicable.
How we handle your data, from collection to disposal.
All client data is classified by sensitivity: Public, Internal, Confidential, or Restricted. Classification determines storage, access controls, encryption requirements, and handling procedures.
We maintain documented procedures for security incidents, data breaches, and system failures.
As an AI and automation consultancy, we apply rigorous governance to AI systems we build and deploy.
Day-to-day practices that keep your systems and data secure.
Need detailed documentation for your procurement, compliance, or risk team? Our Security Pack includes complete security policies and procedures, data processing agreement templates, incident response playbooks, insurance certificates of currency, compliance attestations and certifications, AI governance documentation, and vendor security questionnaire responses (CAIQ, SIG, VSA).
We're currently making improvements. Please check back soon.