Enterprise-Grade Security

Your Data Security is Our Priority

mployr is built with security at its core. We employ industry-leading security measures to protect your business data, hosted entirely within Australia on AWS infrastructure.

Hosted in Sydney, Australia
Australian Privacy Act Compliant
256-bit Encryption
Data Protection

Comprehensive Security Features

Multiple layers of security protect your data at every level.

256-bit AES Encryption
All data is encrypted at rest using AES-256, the same encryption standard used by banks and government agencies.
TLS 1.3 in Transit
All data transmitted between your browser and our servers is protected with TLS 1.3 encryption.
Multi-Factor Authentication
Protect your account with MFA using authenticator apps, SMS, or hardware security keys like YubiKey.
Single Sign-On (SSO)
Enterprise SSO support with SAML 2.0 and OAuth 2.0 for seamless integration with your identity provider.
Role-Based Access Control
Granular permissions system allowing you to control exactly who can access what data and features.
Audit Logging
Comprehensive audit trails track all user actions, providing full visibility into system activity.
Infrastructure

Australian-Hosted Cloud Infrastructure

Your data never leaves Australia. We exclusively use AWS's Sydney data centre (ap-southeast-2) to ensure your information remains under Australian jurisdiction and complies with local data residency requirements.

AWS Sydney Region

Hosted exclusively in AWS ap-southeast-2 (Sydney) region, ensuring your data stays in Australia.

Redundant Infrastructure

Multi-availability zone deployment with automatic failover ensures 99.9% uptime.

Daily Backups

Automated daily backups with point-in-time recovery capability and 30-day retention.

Disaster Recovery

Comprehensive disaster recovery plan with regular testing and sub-4-hour recovery time objective.

AWS Sydney Region

ap-southeast-2

Data Centre LocationSydney, NSW
Availability Zones3 AZs
Uptime SLA99.9%
Data SovereigntyAustralian
IRAP Assessed AWS Infrastructure
Compliance

Regulatory Compliance

We maintain compliance with Australian and international security standards.

Australian Privacy Act

Fully compliant with the Privacy Act 1988 and Australian Privacy Principles (APPs).

SOC 2 Type II

Planned

SOC 2 Type II certification is on our roadmap to formally verify our security controls and practices.

ISO 27001

Planned

ISO 27001 certification is planned to formally validate our information security management system.

Security Practices

Proactive Security Measures

We continuously monitor and improve our security posture.

Regular penetration testing by independent security firms
Vulnerability scanning and continuous security monitoring
Security awareness training for all employees
Incident response team on call 24/7
Bug bounty program for responsible disclosure
Regular security updates and patching
Network segmentation and firewall protection
DDoS protection and mitigation

Report a Security Vulnerability

We take security seriously. If you've discovered a security vulnerability in our platform, please report it responsibly. We offer a bug bounty program for qualifying reports.

Contact Security Team

Have Security Questions?

Our security team is happy to discuss our security practices and answer any questions about how we protect your data.