Security and data protection

We take security seriously. Your call data and business information are protected with industry-standard security measures.

How we protect your data

Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption. Call recordings and sensitive information are never stored unencrypted.

Australian hosting

Your data is stored exclusively in Australian data centers. We do not transfer or store data outside of Australia unless explicitly agreed with you.

Regular security audits

We conduct regular security assessments and penetration testing to identify and address potential vulnerabilities before they can be exploited.

Access controls

Role-based access control ensures team members only see the data they need. Multi-factor authentication is available for all accounts.

Audit logging

All system access and configuration changes are logged. You can review who accessed what data and when.

Infrastructure security

Our infrastructure is hosted on enterprise-grade platforms with redundancy, DDoS protection, and 24/7 monitoring.

Compliance and standards

Privacy compliance

We comply with the Australian Privacy Principles (APPs) under the Privacy Act 1988. We handle personal information in accordance with Australian privacy law.

Telecommunications regulations

Our services are provided in compliance with Australian telecommunications regulations. We work with licensed telecommunications carriers.

Data retention

We retain call records and metadata in accordance with legal requirements and your configured retention policies. You have full control over how long your data is stored.

Security incident response

In the unlikely event of a security incident, we have established procedures to respond quickly and transparently.

Detection

Automated monitoring systems alert our team to potential security issues immediately.

Response

Our incident response team investigates and contains any security issues within hours.

Communication

Affected customers are notified promptly with clear information about the incident and our response.

Questions about security?

We're happy to discuss our security practices in detail. Contact us to learn more.

Contact us