How do we govern data and security?
We have a team of experts from different areas in information security working collaboratively to safeguard against threats and ensure processes and protocols are in place.
Event logs, fault logs, and exception logs are all maintained on our system for governing data. For security, we have implemented controls to assure the security of information in networks and protect connected services from unauthorized access.
You can find out more about our commitment to your data and security, detailed in our charter.