Data Zoo utilises firewalls and encryption, which is used to protect all data and our applications. Databases have built in security that prevents unauthorised access. All transactions are user and IP logged. Our data is securely stored in a Tier 1 Data Centre with no single point of failure and with a fully scalable world-class infrastructure. Data Zoo complies with the Privacy Act in the management of personal information.
Our Corporate Security Program is comprehensive, proactive and designed to ensure that all information is secure whether you choose to do business with us through our website applications, XML web services or bureau.
Data Zoo conforms to the highest industry accepted security practices.
Data Zoo will insure that all companies sign the appropriate contracts for access to the data. These contracts will highlight the consequences of any misuse by the company and that it’s the responsibility of the company to insure that their internal process enforces the terms and use of the data.
The security of the data and our systems is of the utmost importance to Data Zoo and as such we have protected against misuse through a number of measures. They include:
- Data is only ever accessible through the applications provided.
- All companies wanting access to our systems are firstly vetted ensuring they are authorised in using the data provided by Data Zoo.
- Before access to the systems is allowed all organisations must sign access agreements and contracts and are, therefore, bound by our Terms & Conditions of use and are fully aware of any civil or criminal penalties that apply for the misuse of the data.
- All access to our products and services are logged, providing an auditable record of which users accessed what data and at what time.
The data is stored and held on site in a data centre for the duration of the job. The data centre has redundant power and data. The hardware is locked in our own rack.
The architecture of the application is n-tier.
Client data is stored inside of a trust-zone, which is behind a DMZ. (i.e. the product is supported by best practice application architecture). Access to the application is via username and password that has industry standard strength requirements.
Our products have passed third-party PCI DSS compliance tests.
Cross Border Data Transfers
Our policies are designed to ensure that all information is secure both in our own databases and when our customers are accessing it. Access to our systems is monitored electronically, providing an auditable record of who, what and when data was accessed.
Data does not leave the country of origin but remains housed there.
We store data in multiple tier 3+ world class data centres to ensure your data is protected. Currently located in Auckland, Sydney and China. When required these can act as the failover to ensure that connectivity is always maintained with a backup server located in Sydney.