System Security

Data Zoo provides you with peace of mind around data compliance and how we manage data and keep information and our systems secure.



Data Zoo utilises firewalls and encryption, which is used to protect all data and our applications. Databases have built in security that prevents unauthorised access. All transactions are user and IP logged. Our data is securely stored in a Tier 1 Data Centre with no single point of failure and with a fully scalable world-class infrastructure. Data Zoo complies with the Privacy Act in the management of personal information.

Our Corporate Security Program is comprehensive, proactive and designed to ensure that all information is secure whether you choose to do business with us through our website applications, XML web services or bureau.

Data Zoo conforms to the highest industry accepted security practices.


Internal Processes

All staff of Data Zoo that have access to the systems or data sign a compliance certificate warning them of the consequences of any authorised use our data and through our systems.


External Processes

Data Zoo will insure that all companies sign the appropriate contracts for access to the data. These contracts will highlight the consequences of any misuse by the company and that it’s the responsibility of the company to insure that their internal process enforces the terms and use of the data.


Security Measures

The security of the data and our systems is of the utmost importance to Data Zoo and as such we have protected against misuse through a number of measures. They include:

  1. Data is only ever accessible through the applications provided.
  2. All companies wanting access to our systems are firstly vetted ensuring they are authorised in using the data provided by Data Zoo.
  3. Before access to the systems is allowed all organisations must sign access agreements and contracts and are, therefore, bound by our Terms & Conditions of use and are fully aware of any civil or criminal penalties that apply for the misuse of the data.
  4. All access to our products and services are logged, providing an auditable record of which users accessed what data and at what time.

The data is stored and held on site in a data centre for the duration of the job. The data centre has redundant power and data. The hardware is locked in our own rack.

The architecture of the application is n-tier.

Client data is stored inside of a trust-zone, which is behind a DMZ. (i.e. the product is supported by best practice application architecture). Access to the application is via username and password that has industry standard strength requirements.

Our products have passed third-party PCI DSS compliance tests.


Cross Border Data Transfers

Our policies are designed to ensure that all information is secure both in our own databases and when our customers are accessing it. Access to our systems is monitored electronically, providing an auditable record of who, what and when data was accessed.

Data does not leave the country of origin but remains housed there.

We store data in multiple tier 3+ world class data centres to ensure your data is protected. Currently located in Auckland, Sydney and China. When required these can act as the failover to ensure that connectivity is always maintained with a backup server located in Sydney.

    Contact Us

    Simply fill out the form below, and a team member will get back to you shortly.

      Book a Meeting

      Conferences are an opportunity to learn from experts, contribute to a global conversation, and grow your personal network. Meet us at our next conference.

        Join our Newsletter

        We'll keep you up to date with Data Zoo news. No spams here.