Work Safe Kit
Security & Data Protection

Your data security is our top priority

Work Safe Kit combines enterprise-grade security with privacy-first design to protect your workforce data. We're committed to maintaining the highest standards of data security and compliance.

Security you can trust

We implement comprehensive security controls across every layer of our platform to ensure your data is always protected.

Data Protection

All data encrypted in transit and at rest using industry-standard AES-256 and TLS 1.3 protocols.

Secure Infrastructure

Hosted on enterprise-grade cloud infrastructure with redundancy, automatic backups, and 24/7 monitoring.

Access Control

Role-based permissions, multi-factor authentication, and audit logging for complete visibility.

Privacy Compliance

Built with privacy by design, compliant with Australian Privacy Principles and GDPR requirements.

Infrastructure Security

Our platform is built on enterprise-grade infrastructure designed for resilience, scalability, and security.

Cloud-Native Architecture

Hosted on leading cloud providers with SOC 2 certified data centres, leveraging built-in security controls and global availability.

Redundancy & Backup

Automatic data replication across multiple availability zones with continuous backups and point-in-time recovery capabilities.

24/7 Monitoring

Continuous infrastructure monitoring with automated alerting for anomalies, performance issues, and security events.

Data Protection

We protect your data at every stage with industry-leading encryption and secure data handling practices.

Encryption at Rest

All stored data is encrypted using AES-256 encryption, with encryption keys managed through secure key management services.

Encryption in Transit

All data transmitted between your devices and our servers is protected using TLS 1.3, the latest transport layer security protocol.

Secure Data Deletion

When data is deleted, we follow secure deletion protocols to ensure complete removal from all systems and backups.

Access Security

We implement strict access controls to ensure only authorised users can access your data.

Multi-Factor Authentication

Support for MFA adds an extra layer of protection to user accounts, significantly reducing the risk of unauthorised access.

Role-Based Access Control

Granular permission controls let you define exactly who can view, edit, and manage different types of data and functionality.

Audit Logging

Comprehensive audit trails track all user actions and system events, supporting compliance requirements and security investigations.

Operational Security

Our security practices extend beyond technology to include people, processes, and continuous improvement.

Incident Response

We maintain documented incident response procedures to quickly identify, contain, and remediate security events.

Vulnerability Management

Regular security assessments, penetration testing, and prompt patching ensure our systems remain protected against known vulnerabilities.

Security Training

All team members receive regular security awareness training to maintain a security-conscious culture throughout the organisation.

Compliance & Standards

We align our security practices with globally recognised frameworks and are committed to achieving formal certifications as we grow.

ISO 27001 Aligned

Our information security management practices follow ISO 27001 standards for systematic security control implementation.

SOC 2 Principles

We implement controls aligned with AICPA Trust Services Criteria covering security, availability, and confidentiality.

Australian Data Sovereignty

Customer data is stored in Australian data centres, ensuring compliance with local data residency requirements.

Privacy by Design

Built from the ground up with privacy principles embedded into every feature and workflow.

Privacy-First Worker Tracking

We understand that location tracking for lone worker safety requires trust. That's why we've built transparency and consent into every aspect of our tracking features.

  • Workers receive clear notifications when tracking is active
  • Location data is only used for safety monitoring purposes
  • Configurable data retention policies to minimise data collection
  • Workers can view their own tracking history at any time
  • No selling or sharing of personal data with third parties

Security Questions?

Our team is here to answer your security and compliance questions. We're committed to transparency about our security practices.

Security Enquiries security@worksafekit.com
Report a Vulnerability Responsible Disclosure