Our methodology in maintaining data security and privacy protection:

HUMAN CONTROLS


Control
Effect

 

We employ only people we know (referrals) Reduced risk of fraud
Every employee is security checked Reduced risk of fraud
We induct, train and retrain our staff Awareness of consequences of data loss
All employees are supervised Reduced risk of fraud
Appropriate employee work conditions Reduced risk of fraud

PROCEDURAL CONTROLS


Control
Effect

 

We operate 100% paperless No risk of paper based data loss
Alarmed and monitored premises Reduced risk of break-ins and data loss
Standardised work procedures in place Reduced risk of accidental data loss
Separate guest web access network Reduced risk of data loss via internet attack
Bring your own device policy in place Reduced risk of data loss via mobile devices
Data security risk assessments Understanding risks and risk controls
Regular system and compliance audits Ability to detect issues and implement remedies
Dedicated internal Data Security and Privacy Protection officer Improved security monitoring, staff induction and training, and system audit processes

TECHNICAL CONTROLS


Control
Effect

 

Sophos Cloud end point protection Reduced risk of data loss via internet attack
Workstation and solution encryption Reduced risk of data loss via web/physical theft
Complex password enforcement Reduced risk of data loss via password hack
Two-step password verification enforcement Reduced risk of data loss via out of office access
Mobile storage devices are blocked Reduced risk of data loss via storage device
Access to data-sharing websites is blocked Reduced risk of data loss via website upload
Access to high risk websites is blocked Reduced risk of data loss via internet attack
Email controls/restrictions in place Reduced risk of data loss via email transfer
Broken-e for drag and drop control Prevents accidental drag and drop of folders in windows
Last Pass for single sign on Password control for multiple client sites

INFORMATION SECURITY POLICY

  1. Cross-border Disclosure
  • We will disclose personal information about our clients to our employees and contractors outside Australia only for the purposes of Supply of Services Agreement (SSA) and as specified in SSA.
  • We will maintain full compliance with Australian Privacy Principles, ensuring that the recipient of the information is subject to a law and contract that are substantially similar to the Australian Privacy Principles.

 

  1. Our Employees & Contractors
  • In selecting our staff, we will take all reasonable care to ensure adequate security background, understanding of our processes and policies, operational training and supervision.
  • All staff and contractors will be required to sign the agreement binding them to maintain client private information.
  • Individual client information will only be known to a supervisor and an employee responsible for entering data into systems.
  • All employees will receive Data Protection and Privacy Laws training as a part of their induction.
  • We are dedicated to improving our information security system.

 

  1. Controls

 

  • Electronic File Storage
  • We don’t hold paper copies of any client files.
  • We use Dropbox for Business for all work in progress client data storage and Google Apps for all email services.  We use dropbox server located in Australia.
  • We use virtual windows machines, installed on our server, so no work related files are located on our physical machines.
  • We will often rename the client file to a standard naming convention, identifying document and date of its receipt/processing.
  • Upon client request or once the client information was no longer required we will remove client data from our storage systems.
  • We do not use portable storage devices.

 

 

 

  • Allowed Applications
  • Only business related and approved applications can be installed or used on xSource workstations and vitual machines.

 

  • Password Protection
  • All computer platforms and networks we operate are a subject to username and password protection.
  • All passwords are minimum ten characters in length and contain at least one of each: a capital letter, a lower-case letter, a number and a special symbol.
  • Each workstation and virtual machines has a screen saver that requires a password re-entry after being idle for 5 minutes.
  • Where possible, each application will have a two-step verification.

 

  • Level of Access
  • Client files will only be accessed by the employee performing the processing work, their supervisor and client themselves.
  • If required to provide client supplied personal information to the relevant Auditing body, we will do so with the written approval from the client.

 

  • Secure Premises
  •    Our offices are secured and monitored when unattended.

 

  • Incident Reporting & Investigation
    • Any breaches of data security or security incidents are reported to the senior management and to the affected client.
    • Any breaches of data security or security incidents are investigated in order to ensure prevention of future breaches of future incidents.