Security Framework

Below is information about how Wollemi Solutions and its affiliates (“we”) have given priority to security and various measures adopted to ensure a safe and secure environment for its various products

This policy is effective as of January 31, 2021. Please note that the security measures will be updated from time to time.

Icon
    User Security

    Following measures have been built to provide a highly safe and personalized environment for the users.

  • Need-based access – users will only have access to projects they are associated with along with designated rights
  • New device verification – OTP verification when a new device has been used for log-in. This will prevent access to your account even in case of stolen log-in credentials
  • Flexible user management –
    1. 1. The easy and flexible way to add/ remove users. Idle accounts automatically go in abeyance.
    2. 2. Flexibility to set up password policy as per your organization guidelines
Icon
    Data Security/ Privacy

    Following measures have been built across the organization's systems and processes to deliver a highly safe, private, and secure data environment. More details in our privacy policy

  • GDPR Compliant
  • High-end encryption
  • Security safeguards
  • Restore/ Recovery
  • HTTPS/ firewalls/ antivirus
Icon
    Data Confidentiality

    Following measures have been deployed to ensure data integrity.

  • Restricted data access –
    1. 1. Relevant personnel within Wollemi will have access to project-specific data
    2. 2. Data will be archived and saved post project completion/ archival
    3. 3. Non-sharing of your project data with any other customers or third party
  • Local servers – Servers are hosted in the country of the customers so that their data remains in their own country.
  • Cybersecurity – Multi-layer encryption and data security measures to secure your project data from external thefts/ attacks
  • End-to-end encryption – All the communications by the customers and their team members on the platform are fully encrypted. None of the Wollemi employees, partners, advisors, and affiliates have access to the communication
  • Legal safeguards – Intensive and thorough CDA’s have been signed with all of the Wollemi employees, advisors, and partners to ensure tight execution of confidentiality practices.
Icon
    Infrastructure Security

    Advanced and integrated security framework has been used to offer a high level of security:

  • Server security
    1. 1. AWS security – Our servers cover the full range of Amazon Web Servers (AWS) security features
    2. 2. Advanced encryption – Use of advanced encryption methods
    3. 3. Added security– An additional layer of security measures been deployed on top of AWS security to prevent phishing attacks
  • Internet Security – Use of standard best practices to minimize phishing/ data theft attacks
  • Machine security – Various checks are been placed on all the systems of Wollemi Employees, partners, advisors, and affiliates like:
    1. 1. Only need-based access for all internal users
    2. 2. Restriction to upload content on the web or download any content from the platform that covers customer-specific information
    3. 3. Restricted access to malicious websites
    4. 4. Restrictions on usage of external data devices like hard drive/ pen drive etc.
  • Recovery/ back-up – Wollemi has a robust recovery/ back-up policy which comprises periodic back-up on cloud servers and systematic back-up on the secured local server.
Icon
Let’s Familiarize

We are happy to talk further and discuss details and elements of various engagement models