Security
We prioritise the highest standards of data protection and regulatory compliance.
Our Commitment to Security
At Kudosity, the security of your data is our top priority. We are committed to maintaining the highest standards of information security, confidentiality, and data integrity across all aspects of our platform and operations.
We are committed to protecting our customers’ data through industry-leading security practices, robust infrastructure, and strict compliance with globally recognised standards.
Our Security Certifications
Kudosity is certified to globally recognised security standards, demonstrating our commitment to protecting your data. These globally recognised frameworks validate the effectiveness of our security controls and our ongoing commitment to safeguarding your information.
ISO 27001 Certified
Kudosity is ISO 27001:2022 certified, demonstrating our commitment to managing information security in line with international best practices.

SOC 2 | Type II
Kudosity is SOC 2 Type II compliant, with independently audited controls in place to ensure the security, availability, and confidentiality of your data.
24/7/365 Support
We provide round-the-clock support so you can get timely help whenever you need it. Our team is available 24/7/365 to assist with any issues, ensuring a swift response to urgent concerns.
Australian Data Sovereignty
Your data remains securely stored in Australia at all times and is never shared with any third or related party, except where required by law or regulatory obligations. You maintain full ownership of your data at all times.
Back-up and availability
We perform daily, continuous backups of customer data to support point-in-time recovery. All backups are encrypted and stored securely to ensure data resilience and availability in the event of unexpected issues.
Encryption
All data is encrypted at rest and in transit. We use industry-standard encryption protocols to protect your information against unauthorised access and interception.
Secure Infrastructure
We use trusted infrastructure providers that are certified to ISO 27001 and SOC 2 standards, delivering enterprise-grade security, availability, and compliance.
Trusted Sub-Processors
We carefully assess vendors to ensure they comply with industry security and privacy standards and only work with third parties that meet our strict security requirements.
Explore our sub-processors →
Data Privacy
We're committed to privacy, and apply stringent privacy protections to all customers worldwide, regardless of their country of origin or location.
Kudosity complies with the Australian Privacy Principles (APPs) under the Privacy Act 1988 (Cth) and has aligned its platform and practices with GDPR principles to ensure strong, transparent data protection standards for all users.
View our Privacy Statement →
About Security
If you have a security-related concern or urgent issue, please contact our team by
submitting a ticket via our Helpdesk. This ensures that your concern is routed quickly to the
appropriate team for investigation and resolution.
FAQ's
What does ISO 27001 mean for you?
This certification demonstrates our meticulous commitment to protecting the confidentiality, integrity, and availability of your data. Choosing an ISO 27001 certified bulk SMS platform, which offers Full Australian Data Sovereignty, shows customers that you have their best interests at heart by protecting their personal data.
As we adhere to a global standard and are audited by independent third parties, we provide you with operational transparency when it comes to protecting your data, and we are proud to be the first to do so in Australia.
What security standards does Kudosity apply?
At Kudosity, you can rest assured that we have world-class information security standards that increase the safety of our daily operations, applications, and technologies, protecting the confidentiality, integrity, and availability of our information for you, your end users, and our stakeholders. Our staff are trained and mentored on information security protocols starting with our frontline team members all the way to our founders.
Where can I find additional information?
For additional information regarding our security policies, procedures, and compliance, visit the following links or get in touch with us.