Data Security and Privacy

CareLineLive provides extremely high levels of protection against loss of customers’ data due to malicious activity. At the same time, the historical uptime for our services is at 99.997% and we have robust backup processes and a strong disaster recovery plan.

homecare-software-data-security-privacy
Certified with internationally recognised standards

As a company we are ISO 27001 certified and Cyber Essentials Plus compliant. Data is stored in AWS servers in Sydney, Australia and cyber insurance is in place.

ISO 9001 Care Software Company
ISO 27001 Care Software Company
Cyber-Essentials-Plus
homecare-software-safeguarding

Safeguarding data against malicious activity

CareLineLive employs a multi-layered approach to protect customer data from malicious activities. These include:

  • Web-browser based access such as ours is significantly safer than remote desktop environments which are notoriously insecure as they allow users access to the server’s operating system
  • Strict network and application firewall policies with AI-assisted anomaly detection, to stop and identify any malicious activity
  • Isolated network infrastructure, restricting the ability for worms to propagate
  • Strong encryption used whenever data is transferred (in-transit) or stored (at rest)
  • We have both automated as well as human-managed penetration tests that regularly test the vulnerabilities of the systems
Data security and privacy

Automated data backup and disaster recovery

Of course, it’s not right to assume that the worst-case scenario is not a possibility. In the event of a disaster event, we have the following mitigations in place to help us quickly recover:

check circle 1

Automated backups

Point-in-time-recovery backups enabled, allowing us to restore data back to a specific point in time; as well as regular full backups which are stored in a separate location

check circle 1

Rapid infrastructure replacement

‘Immutable’ infrastructure, allowing any service to be replaced in a matter of minutes

check circle 1

Disaster recovery plan

A comprehensive and regularly tested disaster recovery plan, accessible to all staff

check circle 1

Standby server always available

Data is replicated to a standby server as soon as it is written, allowing us to failover to the standby server in seconds

check circle 1

Continuous scanning for vulnerabilities

Continuous vulnerability scanning to detect and rectify any potential issues before an attacker does