Your data security is our top priority
Work Safe Kit combines enterprise-grade security with privacy-first design to protect your workforce data. We're committed to maintaining the highest standards of data security and compliance.
Security you can trust
We implement comprehensive security controls across every layer of our platform to ensure your data is always protected.
Data Protection
All data encrypted in transit and at rest using industry-standard AES-256 and TLS 1.3 protocols.
Secure Infrastructure
Hosted on enterprise-grade cloud infrastructure with redundancy, automatic backups, and 24/7 monitoring.
Access Control
Role-based permissions, multi-factor authentication, and audit logging for complete visibility.
Privacy Compliance
Built with privacy by design, compliant with Australian Privacy Principles and GDPR requirements.
Infrastructure Security
Our platform is built on enterprise-grade infrastructure designed for resilience, scalability, and security.
Cloud-Native Architecture
Hosted on leading cloud providers with SOC 2 certified data centres, leveraging built-in security controls and global availability.
Redundancy & Backup
Automatic data replication across multiple availability zones with continuous backups and point-in-time recovery capabilities.
24/7 Monitoring
Continuous infrastructure monitoring with automated alerting for anomalies, performance issues, and security events.
Data Protection
We protect your data at every stage with industry-leading encryption and secure data handling practices.
Encryption at Rest
All stored data is encrypted using AES-256 encryption, with encryption keys managed through secure key management services.
Encryption in Transit
All data transmitted between your devices and our servers is protected using TLS 1.3, the latest transport layer security protocol.
Secure Data Deletion
When data is deleted, we follow secure deletion protocols to ensure complete removal from all systems and backups.
Access Security
We implement strict access controls to ensure only authorised users can access your data.
Multi-Factor Authentication
Support for MFA adds an extra layer of protection to user accounts, significantly reducing the risk of unauthorised access.
Role-Based Access Control
Granular permission controls let you define exactly who can view, edit, and manage different types of data and functionality.
Audit Logging
Comprehensive audit trails track all user actions and system events, supporting compliance requirements and security investigations.
Operational Security
Our security practices extend beyond technology to include people, processes, and continuous improvement.
Incident Response
We maintain documented incident response procedures to quickly identify, contain, and remediate security events.
Vulnerability Management
Regular security assessments, penetration testing, and prompt patching ensure our systems remain protected against known vulnerabilities.
Security Training
All team members receive regular security awareness training to maintain a security-conscious culture throughout the organisation.
Compliance & Standards
We align our security practices with globally recognised frameworks and are committed to achieving formal certifications as we grow.
ISO 27001 Aligned
Our information security management practices follow ISO 27001 standards for systematic security control implementation.
SOC 2 Principles
We implement controls aligned with AICPA Trust Services Criteria covering security, availability, and confidentiality.
Australian Data Sovereignty
Customer data is stored in Australian data centres, ensuring compliance with local data residency requirements.
Privacy by Design
Built from the ground up with privacy principles embedded into every feature and workflow.
Privacy-First Worker Tracking
We understand that location tracking for lone worker safety requires trust. That's why we've built transparency and consent into every aspect of our tracking features.
- Workers receive clear notifications when tracking is active
- Location data is only used for safety monitoring purposes
- Configurable data retention policies to minimise data collection
- Workers can view their own tracking history at any time
- No selling or sharing of personal data with third parties
Security Questions?
Our team is here to answer your security and compliance questions. We're committed to transparency about our security practices.