Keep your customers’ data
safe and secure

Data Zoo keeps privacy and security at the core of our products, infrastructure and policies. Our ecosystem lets you engender customer trust in your brand by ensuring data transparency, protection, privacy and ownership.

COMPLIANCE

Compliance at the core

In today's digital landscape, organisations face the challenge of expanding privacy regulations and increasing end-user expectations for data handling transparency. Data Zoo's ecosystem is certified and adheres to the highest industry standards and regulations around the world.

ISO 27001:2013

Data Zoo’s information security management system meets the requirements of ISO 27001 international standards.

CSA Star

Data Zoo has achieved the third-party assessment-based certification (CSA STAR Level 2: Attestation) for its cloud infrastructure.

SOC 2 (Type 2)

Data Zoo’s SOC 2 (Type 2) report validates our controls regarding security, availability, processing integrity, and confidentiality.

SOC 3

The SOC 3 confirms our compliance with the principles of security, availability, processing integrity and confidentiality.

Consumer Data Right

Data Zoo’s data standards and information security controls meet the legal and IT requirements of open banking (CDR) rules.

ASAE 3150

Data Zoo’s ASAE 3150 report validates the suitability of our design controls to achieve identified control objectives.

GDPR

Data Zoo complies with the EU General Data Protection Regulation (GDPR).

CCPA

Data Zoo complies with the California Consumer Privacy Act (CCPA).

chat-image

Impact driven research and innovation collaboration with Data Zoo produced a privacy preserving trusted digital identity verification architecture, which is imperative for enabling digital economy and sustainable smart city initiatives.

A/Prof Asif Gill Director DigiSAS Lab
SECURITY

Comprehensive security

Confidentiality

Access to senstive data is restricted by implementing the principle of “least Privilage” and only granted on “need to know” basis.

Integrity

Our services are backed by independant, reliable and compliat data that enables integrity of our data.

Availability

Our resilient infrastructure ensure the availability of our data and services to authorized users.

user-info

Secure infrastructure to protect customers’ data

We have designed our ecosystem to prioritise privacy, maintain security standards for them and build their trust around our services without neglecting the changing requirements of robust regulations.

  • Multiple server locations
  • Annual third-party independent audits
  • Independent penetration and vulnerability testing
  • Industry best practice data de-identification scheme
  • Multiple server locations
  • Encrypted HTTPS protocols

Security is embedded in our people and culture

With privacy as a core value, it improves the ability of our programs to execute and drive alignment with multiple teams, increasing their understanding of and desire to support the achievement of privacy goals.

  • Monthly training and awareness program
  • A holistic approach to privacy
  • Continous adapting and iterating
user-info

Ready to see the difference?

Book a free demo with our experts today.