Our methodology in maintaining data security and privacy protection:
HUMAN CONTROLS
Control |
Effect |
We employ only people we know (referrals) | Reduced risk of fraud |
Every employee is security checked | Reduced risk of fraud |
We induct, train and retrain our staff | Awareness of consequences of data loss |
All employees are supervised | Reduced risk of fraud |
Appropriate employee work conditions | Reduced risk of fraud |
PROCEDURAL CONTROLS
Control |
Effect |
We operate 100% paperless | No risk of paper based data loss |
Alarmed and monitored premises | Reduced risk of break-ins and data loss |
Standardised work procedures in place | Reduced risk of accidental data loss |
Separate guest web access network | Reduced risk of data loss via internet attack |
Bring your own device policy in place | Reduced risk of data loss via mobile devices |
Data security risk assessments | Understanding risks and risk controls |
Regular system and compliance audits | Ability to detect issues and implement remedies |
Dedicated internal Data Security and Privacy Protection officer | Improved security monitoring, staff induction and training, and system audit processes |
TECHNICAL CONTROLS
Control |
Effect |
Sophos Cloud end point protection | Reduced risk of data loss via internet attack |
Workstation and solution encryption | Reduced risk of data loss via web/physical theft |
Complex password enforcement | Reduced risk of data loss via password hack |
Two-step password verification enforcement | Reduced risk of data loss via out of office access |
Mobile storage devices are blocked | Reduced risk of data loss via storage device |
Access to data-sharing websites is blocked | Reduced risk of data loss via website upload |
Access to high risk websites is blocked | Reduced risk of data loss via internet attack |
Email controls/restrictions in place | Reduced risk of data loss via email transfer |
Broken-e for drag and drop control | Prevents accidental drag and drop of folders in windows |
Last Pass for single sign on | Password control for multiple client sites |
INFORMATION SECURITY POLICY
- Cross-border Disclosure
- We will disclose personal information about our clients to our employees and contractors outside Australia only for the purposes of Supply of Services Agreement (SSA) and as specified in SSA.
- We will maintain full compliance with Australian Privacy Principles, ensuring that the recipient of the information is subject to a law and contract that are substantially similar to the Australian Privacy Principles.
- Our Employees & Contractors
- In selecting our staff, we will take all reasonable care to ensure adequate security background, understanding of our processes and policies, operational training and supervision.
- All staff and contractors will be required to sign the agreement binding them to maintain client private information.
- Individual client information will only be known to a supervisor and an employee responsible for entering data into systems.
- All employees will receive Data Protection and Privacy Laws training as a part of their induction.
- We are dedicated to improving our information security system.
- Controls
- Electronic File Storage
- We don’t hold paper copies of any client files.
- We use Dropbox for Business for all work in progress client data storage and Google Apps for all email services. We use dropbox server located in Australia.
- We use virtual windows machines, installed on our server, so no work related files are located on our physical machines.
- We will often rename the client file to a standard naming convention, identifying document and date of its receipt/processing.
- Upon client request or once the client information was no longer required we will remove client data from our storage systems.
- We do not use portable storage devices.
- Allowed Applications
- Only business related and approved applications can be installed or used on xSource workstations and vitual machines.
- Password Protection
- All computer platforms and networks we operate are a subject to username and password protection.
- All passwords are minimum ten characters in length and contain at least one of each: a capital letter, a lower-case letter, a number and a special symbol.
- Each workstation and virtual machines has a screen saver that requires a password re-entry after being idle for 5 minutes.
- Where possible, each application will have a two-step verification.
- Level of Access
- Client files will only be accessed by the employee performing the processing work, their supervisor and client themselves.
- If required to provide client supplied personal information to the relevant Auditing body, we will do so with the written approval from the client.
- Secure Premises
- Our offices are secured and monitored when unattended.
- Incident Reporting & Investigation
-
- Any breaches of data security or security incidents are reported to the senior management and to the affected client.
- Any breaches of data security or security incidents are investigated in order to ensure prevention of future breaches of future incidents.