We use Amazon Web Services (AWS) data centers based in Australia to host our systems. They all have SOC2 Type 2 reports and provide all the physical security protection measures you would expect.
For that matter, we place the same security requirements on all third-parties involved in the delivery of the Mobiledock service.
We want to ensure that Mobiledock is used for legitimate business purposes, and that information in Mobiledock can be trusted. We ensure that all users of Mobiledock have acknowledged a set of terms and conditions, which you can find here.
We understand that software security is very important. We continuously scan our applications for vulnerabilities, using regularly scheduled dynamic testing.
Passwords are difficult to manage across all the services people may use, and so Mobiledock does not require you to have a separate password to access Mobiledock. Instead, we leverage the security and trust you have in your user authentication and email systems, by granting access to Mobiledock with verification through email or Microsoft Entra ID.
We also:
If you identify a vulnerability in our site or services, here’s how to report it to us.
Access to our systems and your data is restricted only to those who need access in order to provide you awesome support.
We also have all the “people security” things you’d expect to see:
And we are in the process of obtaining SOC 2 Type II certification, based on our rigorous controls to safeguard your data.
Security is the responsibility of everyone who works for us. We train our employees so that they can identify security risks and empower them to take action to prevent bad things from happening.
We have redundant, geographically separate data centers so that we can provide consistent services for you. In the event one of our data centers becomes unavailable, we can recover quickly so that you can continue to make bookings and run your business.
You can view our privacy policy here, but needless to say that we believe in the confidentiality of your information. We have a data retention policy, and we stick to it.
If you have more in-depth questions about our security program, contact us.