We know that our customers rely on us as an important part of their business and decision making processes. We take this responsibility to our customers very seriously, and the security and reliability of the software, systems and data that make up our products and services are our top priority.

We have worked to establish the best possible security policy, articulated below.  Nonetheless we reserve the right to modify this at any time without notice.

1. Infrastructure Security

2. Application Security

3. Payment Security

4. Contact Us

1. Infrastructure Security

All of our applications are built upon Google Cloud (Cloud Service Provider), allowing us to take advantage of the same secure-by-design infrastructure, built-in protection and global network that Google uses to protect your information, identities, applications, and devices. Security measures in place at our Cloud Service Provider, include:

  • Employee background checks
  • Security training for all employees
  • Internal security and privacy events
  • Dedicated security team
  • Dedicated privacy team
  • Internal audit and compliance specialists
  • Collaboration with the security research community

Operational Security

Our infrastructure is deployed using rigorous security practices. Operations teams at our Cloud Service Provider detect and respond to threats to the infrastructure from both insiders and external actors, 24/7/365.

Communications

Communications over the Internet are encrypted in transit. Our Cloud Service Provider's network and infrastructure have multiple layers of protection to defend our customers against Denial of Service attacks.

Identity

Identities, users, and services are strongly authenticated with multiple factors by our Cloud Service Provider. Access to sensitive data is protected by advanced tools like phishing-resistant Security Keys.

Data

Data stored on our infrastructure is automatically encrypted at rest and distributed for availability and reliability. This helps guard against unauthorized access and service interruptions.

Hardware

From the physical premises to the purpose-built servers, networking equipment, and custom security chips to the low-level software stack running on every machine, our entire hardware infrastructure is Google-controlled, -secured, -built, and -hardened.

Compliance

Our infrastructure is subject to regular independent verification of security, privacy, and compliance controls, achieving certifications against global standards to earn your trust, including:

  • ISO 27001
  • ISO 27017
  • ISO 27018
  • SOC 1
  • SOC 2
  • SOC 3
  • PCI DSS
  • HIPAA
  • CSA STAR
  • FedRAMP
  • Argentina Personal Data Protection Law 25,326
  • Australian Privacy Principles (APP)
  • Australian Prudential Regulation Authority (APRA) Standards
  • COPPA (U.S.)
  • EU Model Contract Clauses
  • FERPA (U.S.)
  • FIPS 140-2 Validated
  • FISC (Japan)
  • GDPR
  • HITRUST CSF
  • Independent Security Evaluators (ISE) Audit
  • IRAP Assessed
  • The Personal Information Protection and Electronic Documents Act (PIPEDA)
  • Privacy Shield
  • UK NCSC Cloud Security Principles
  • MPAA
  • MTCS (Singapore) Tier 3
  • My Number Act (Japan)
  • NIST 800-53
  • NIST 800-171
  • Sarbanes-Oxley Act (SOX)

For more information, please see https://cloud.google.com/security/.

2. Application Security

Q-CTRL adopts the Open Web Application Security Project (OWASP) Top Ten as a means of ensuring application code is free from flaws and security vulnerabilities. The OWASP Top Ten is a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce a list of the top ten security vulnerabilities affecting web applications. Adopting the OWASP Top Ten ensures our applications are protected against:

  1. Injection
  2. Broken Authentication
  3. Sensitive Data Exposure
  4. XML External Entities (XXE)
  5. Broken Access Control
  6. Security Misconfiguration
  7. Cross-Site Scripting (XSS)
  8. Insecure Deserialization
  9. Using Components with Known Vulnerabilities
  10. Insufficient Logging & Monitoring

For more information, please see https://www.owasp.org/.

3. Payment Security

Q-CTRL uses the Stripe payments platform for the secure transaction and storage of certain payment data. Stripe has been audited by a PCI-certified auditor and is certified to PCI Service Provider Level 1. This is the most stringent level of certification available in the payments industry. To accomplish this, Stripe makes use of best-in-class security tools and practices to maintain a high level of security.

For more information, please see https://stripe.com/docs/security/stripe.

4. Contact Us

If you have any security concerns or questions, please contact us at https://q-ctrl.com/company/#contact.

You can also send a letter to us at the following address:

Q-CTRL Pty Ltd
Sydney Nanoscience Hub
Building A31, Physics Road
The University of Sydney
NSW 2006 Australia

Did this answer your question?