Allied Trust

Organisation


Our approach to trust, security and privacy is built around three key principles. They’re at the heart of everything we do relating to sensitive or personal information.

 

  • Transparency: We take a human approach to how we process your information and data by being open, honest and transparent


  • Security: We champion industry leading approaches to securing the personal data entrusted to us


  • Stewardship: We accept the responsibility that comes with possessing your data

 

We have put together a clear and up-to-date privacy policy that discloses how we collect, store and manage your data in accordance with the Australian Privacy Principles.


It also discloses third party vendors who assist us in processing and storing data and addresses cross-border disclosure.

Organisation


Our approach to trust, security and privacy is built around three key principles. They’re at the heart of everything we do relating to information.

 

  • Transparency: We take a human approach to how we process your information and data by being open, honest and transparent


  • Security: We champion industry leading approaches to securing the personal data entrusted to us


  • Stewardship: We accept the responsibility that comes with possessing your data

 

We have put together a clear and up-to-date privacy policy that discloses how we collect, store and manage your data in accordance with the Australian Privacy Principles. It also discloses third party vendors who assist us in processing and storing data and addresses cross-border disclosure.

Did you know we have more information tailored for you at our Privacy Centre?

VISIT THE CENTRE

To show how serious we are about privacy, we have:


  • had an end-to-end privacy review by independent and qualified lawyers, who have assessed our privacy framework, policy, procedures and infrastructure

  • voluntarily ‘opted-in’ to be treated as an organisation for the purposes of the Privacy Act and therefore are subject to the Australian Privacy Principles


This makes sense for us as we work with a number of Healthcare, Legal and Government clients and need to ensure that there is parity in standards when it comes to managing personal information.

You can check us on the OAIC Register

OAIC REGISTER

People


New Paragraph

We recruit based on alignment with our values. That means our people share our ethos, and our commitment to our clients and the broader community.


Nonetheless, all employees:

 

  • are required to adhere to our code of conduct;
  • are required to sign our confidentiality and security agreement;
  • pass and maintain a clear national police check; and
  • are regularly trained and tested in privacy and confidentiality principles and best-practice.
  • hold a working with vulnerable people clearance (if required)
  • are granted data access rights are based on their job function and role


People


We recruit based on alignment with our values. That means our people share our ethos, and our commitment to our clients and the broader community.


Nonetheless, all employees:

 

  • are required to adhere to our code of conduct
  • are required to sign our confidentiality and security agreement
  • are only granted data access rights based on their job function and role
  • are regularly trained and tested in privacy and confidentiality principles and best-practice
  • pass and maintain a clear national police check
  • hold a working with vulnerable people clearance (if required)


Systems


We have invested heavily  in a ‘Zero Trust’ approach to ensure that the digital systems we use are enterprise grade, and industry leading.


Examples of our Zero Trust approach include:


  • our employees can only access your data when our 'zero trust' criteria are met, such as being on a company owned device, that works only when they insert their physical security key


  • all of our systems are enterprise grade and use the latest in security best practice standards


  • all of our devices are secured via encryption and are centrally managed


  • we diligently apply updates to employee machines and continuously monitor employee workstations for threats


  • we have the ability to apply critical patches and remote wipe a machine


  • we use multi-factor authentication (MFA) and other similar technology to further secure access to our corporate infrastructure


  • we only use a limited number of hand-selected and evaluated technology partners who comply with Australian standards or equivalent privacy and security best-practice


  • employees are provided with ongoing training and support to adopt safe digital practices

Physical Security

Our office is secured via CCTV and keycard access which is logged, and visitors are recorded at our front desk.

Confidentiality &

Non-Disclosure Agreements

We will be happy to consider your confidentiality agreement upon commencement or if you don’t have one we can just use ours!

We're ready to start. Are you?

CALL NOW
Share by: