Your Data is Protected
We take security seriously. Learn about our comprehensive security measures, compliance standards, and data protection practices.
Security Overview
At kall.au, security is fundamental to everything we do. We employ industry-leading security practices to protect your data, ensure service availability, and maintain the highest standards of privacy and compliance.
Data Encryption
All data is encrypted using industry-standard encryption protocols:
- Data at Rest: AES-256 encryption for all stored data
- Data in Transit: TLS 1.3 encryption for all network communications
- Call Recordings: End-to-end encryption with customer-controlled keys
- Database: Encrypted database storage with regular key rotation
Infrastructure Security
Our infrastructure is built on secure, Australian-based cloud infrastructure:
- Australian data centers for data sovereignty compliance
- Redundant systems and automatic failover
- Regular security patches and updates
- DDoS protection and traffic filtering
- Network segmentation and firewall protection
- Intrusion detection and prevention systems
Access Control & Authentication
- Multi-factor authentication (MFA) for all accounts
- Role-based access control (RBAC)
- Single Sign-On (SSO) support for enterprise customers
- Regular access reviews and audits
- Password complexity requirements
- Session management and timeout controls
Compliance & Certifications
We maintain compliance with Australian and international standards:
- Privacy Act 1988 (Cth): Full compliance with Australian Privacy Principles
- ISO 27001: Information security management system
- SOC 2 Type II: Security, availability, and confidentiality controls
- GDPR: Compliance for international customers
- Australian Consumer Law: Full compliance with consumer protection requirements
Monitoring & Incident Response
- 24/7 security monitoring and threat detection
- Automated alerting for suspicious activities
- Incident response team with defined procedures
- Regular security audits and penetration testing
- Vulnerability scanning and patch management
- Security information and event management (SIEM)
Data Backup & Recovery
- Automated daily backups with 30-day retention
- Geographically distributed backup storage
- Regular disaster recovery testing
- Recovery Time Objective (RTO): < 4 hours
- Recovery Point Objective (RPO): < 1 hour
Third-Party Security
We carefully vet all third-party service providers and integrations:
- Security assessments for all vendors
- Data processing agreements (DPAs) in place
- Regular vendor security reviews
- Integration security testing
Security Best Practices for Customers
We recommend the following security practices:
- Enable multi-factor authentication on your account
- Use strong, unique passwords
- Regularly review account access and permissions
- Keep integration credentials secure
- Monitor call logs and analytics for unusual activity
- Report any security concerns immediately
Security Updates & Transparency
We maintain transparency about our security practices and will notify customers of any security incidents that may affect them, in accordance with our legal obligations and best practices.
Security Contact
For security-related inquiries or to report a security concern: