Verified is committed to securing our customers’ data to the highest degree.
Verified is committed to securing our customers’ data to the highest degree. Our customers include educational institutes, government agencies, healthcare providers, banking and finance and retail industry clients, who trust us with their data. That’s why security protocols and procedures are required to be able to deliver our services to leading industry clients.
Verified servers are hosted on a private cloud located in world class, access-controlled tier 4 data centres in Australia that meet the ISO 27001 security standard for Information Security Management Systems (ISMS). These data centres are monitored 24/7 for all aspects of operations security and performance.
Physical access to the data centre is restricted solely to accredited individuals who require access to maintain systems needed to support the platform.
Verified monitors its network 24/7 against any potential threats including data breaches, hackers, phishing attempts and more.
Access to Verified online systems is protected via:
Verified systems are scanned by industry leading anti-spam/anti-virus scanners to prevent client information from being compromised by viruses, trojans etc.
Verified services are available for use more than 99% of the time, meaning fewer interruptions for your business.
Data is backed up daily off-site with disaster recovery procedures in place including copies of encrypted archives.
Verified is accessible via a web browser, meaning the software is always up to date. There is no program to install or storage required.
Verified is committed to ensuring that the technology we create is accessible and inclusive and we are continually working to create web-based content that follows the Web Content Accessibility Guidelines (WCAG).
Verified employ the newest technologies to ensure testing and issue resolutions meet the WCAG.
Accessibility testing is ongoing as we continue to upgrade our systems.
We do not share any data unless required by law, or with your permission. Read our Privacy Policy for more information.