Security

We prioritise the highest standards of data protection and regulatory compliance.

Our Commitment to Security

At Kudosity, the security of your data is our top priority. We are committed to maintaining the highest standards of information security, confidentiality, and data integrity across all aspects of our platform and operations.

We are committed to protecting our customers’ data through industry-leading security practices, robust infrastructure, and strict compliance with globally recognised standards.

Our Security Certifications

Kudosity is certified to globally recognised security standards, demonstrating our commitment to protecting your data. These globally recognised frameworks validate the effectiveness of our security controls and our ongoing commitment to safeguarding your information.

Feature Icon

ISO 27001 Certified

Kudosity is ISO 27001:2022 certified, demonstrating our commitment to managing information security in line with international best practices.

Feature Icon

SOC 2 | Type II

Kudosity is SOC 2 Type II compliant, with independently audited controls in place to ensure the security, availability, and confidentiality of your data.

24/7/365 Support

We provide round-the-clock support so you can get timely help whenever you need it. Our team is available 24/7/365 to assist with any issues, ensuring a swift response to urgent concerns.

Australian Data Sovereignty

Your data remains securely stored in Australia at all times and is never shared with any third or related party, except where required by law or regulatory obligations. You maintain full ownership of your data at all times.

Back-up and availability

We perform daily, continuous backups of customer data to support point-in-time recovery. All backups are encrypted and stored securely to ensure data resilience and availability in the event of unexpected issues.

Encryption

All data is encrypted at rest and in transit. We use industry-standard encryption protocols to protect your information against unauthorised access and interception.

Secure Infrastructure

We use trusted infrastructure providers that are certified to ISO 27001 and SOC 2 standards, delivering enterprise-grade security, availability, and compliance.

Trusted Sub-Processors

We carefully assess vendors to ensure they comply with industry security and privacy standards and only work with third parties that meet our strict security requirements.

Explore our sub-processors

Data Privacy

We're committed to privacy, and apply stringent privacy protections to all customers worldwide, regardless of their country of origin or location.

Kudosity complies with the Australian Privacy Principles (APPs) under the Privacy Act 1988 (Cth) and has aligned its platform and practices with GDPR principles to ensure strong, transparent data protection standards for all users.

View our Privacy Statement

Feature Icon

About Security

If you have a security-related concern or urgent issue, please contact our team by
submitting a ticket via our Helpdesk. This ensures that your concern is routed quickly to the
appropriate team for investigation and resolution.

Submit a Ticket →

Enterprise Security

FAQ's

What does ISO 27001 mean for you?

This certification demonstrates our meticulous commitment to protecting the confidentiality, integrity, and availability of your data. Choosing an ISO 27001 certified bulk SMS platform, which offers Full Australian Data Sovereignty, shows customers that you have their best interests at heart by protecting their personal data.

As we adhere to a global standard and are audited by independent third parties, we provide you with operational transparency when it comes to protecting your data, and we are proud to be the first to do so in Australia.

What security standards does Kudosity apply?

At Kudosity, you can rest assured that we have world-class information security standards that increase the safety of our daily operations, applications, and technologies, protecting the confidentiality, integrity, and availability of our information for you, your end users, and our stakeholders. Our staff are trained and mentored on information security protocols starting with our frontline team members all the way to our founders.

Where can I find additional information?

For additional information regarding our security policies, procedures, and compliance, visit the following links or get in touch with us.