Our cloud-based health and safety management system utilizes data encryption methods, and industry-standard security software and methodologies. Your data is also protected with your unique authentication credentials as well as access control ensuring the protection of your records.
Our website is Secure Socket Layer (SSL) encrypted, ensuring data processed remains secure. SSL technology makes an internet connection secure and safeguards any sensitive data that is being exchanged between two systems, preventing criminals from reading and modifying any information transferred, including potential personal details.
Our clients trust us to ensure the security and confidentiality of their information. Our providers utilise Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform employing world-class cloud infrastructure. Providers are SOC 2 Type II and ISO 27001 certified. ISO27001 is a global standard for the management of information security. A SOC 2 Type 2 is an internal controls report capturing how a company safeguards customer data and how well those controls are operating.
Personal data is protected using the appropriate physical, technical and organisational security measures. Where applicable, we provide additional attention to sensitive personal data and respect local laws and customs. We are committed to protecting personal data and we implement the appropriate technical and organizational security measures. You retain ownership of data you enter and upload into your system. Safe Ag Systems only utilises this data to provide you with our services. Information is processed for the purpose in which it was collected or authorised in accordance with our privacy policy.
Learn more about the control measures Safe Ag Systems implement in our daily operations.
The policy includes Technology Liability protection and Cyber protection.
Incident Response
Business Interruption
Data and System Recovery
Cyber Extortion
Firewall in Place
Deep Packet Inspection
Encrypted Traffic
Zero-Day and ML Protection
Web Protection
Advanced Threat Protection
Application Control
User Identity
Employee Cyber Awareness Training
Data Protection Training
Device Encryption Policy
Application Control Policy
Data Loss Prevention
Windows Firewall
Peripheral Control
Threat Protection
Update Management
Web Control
VPN for Remote Workers
Microsoft Intune Device Management
Daily backups with Veeam
Access Control in Place
Multi-Factor Authentication is Enforced
Employees store their passwords in a company-controlled password manager
Physical Security: Office building has a key card door lock system, security cameras and motion sensors.
Cyber Security Incident Reporting
Data Breach Response Plan
Disaster Recovery Plan
Network Diagram
Penetration Test Report