Invoices

The security and privacy of your data is important to us. We commit to keeping your data secure and to protect your privacy as required by law.

Last updated: October 03, 2024

Frame 1707480122 (1)

GDPR and Privacy

We maintain a comprehensive privacy policy that articulates our commitment to protecting personal information. You can access our privacy policy here for detailed insights into our practices and principles. 

Data hosting

Any data collected from you through our website or through email communications is transferred to Chaser’s servers through the Internet with secure http protocol.

Our Website is hosted by Google Cloud Platform and by Digital Ocean. The servers where our website and data reside are all located within the European Economic Area (EEA), primarily with Google, Inc. (Google) who we contract for the provision of our technical services. 

If you want to find out more about how Google stores your Personal Data then you can view their policies here.

If the location of our servers will change in the future, we will update this Policy.

See Chasers’ privacy policy for more information.

Data storage
As required by law, Chaser shall not retain any personal data for any longer than is necessary in light of the purpose(s) for which that data is collected, held, and processed. Different types of personal data, used for different purposes, will necessarily be retained for different periods (and its retention periodically reviewed), as set in our data retention policy.

 

Encrypted traffic

We uphold stringent encryption standards for data both in transit and at rest. Our approach ensures comprehensive protection across all accounts, assuring the confidentiality and integrity of your information.

  • Data Retention Policy: This document outlines our practices regarding the storage and deletion of data. It provides detailed information about how we manage data throughout its lifecycle, ensuring that it is retained only for as long as necessary.
  • IT Security Policy: Our IT Security Policy is designed to safeguard sensitive information and ensure the integrity, confidentiality, and availability of data. It encompasses measures related to network security, access controls, encryption, and more.
  • Privacy Policy: This policy provides a comprehensive overview of how we collect, use, disclose, and protect personal information. It also outlines individuals' rights and our commitment to compliance with relevant data protection laws.

External security audits and penetration tests
We work with a third party organisaiton who completes penetration tests on our application an annual basis.

 

Two Factor Authentication
We require all users to set up Two factor authentication if they are a user of an orgniasation with an active subscriptions which is >28 days old. It is possible to set up Two Factor Authentication sooner if you wish. For Australian organisations, Two factor authentication is required immdeidately upon registration due to local regulations.