Legal
Security Measures
Technical and organisational measures that protect your data
This page summarises UNCAPT's technical and organisational measures to protect Customer Data and operate the UNCAPT ELI Platform securely. It is incorporated by reference into the Terms of Service and the Data Processing Addendum.
Related documents: Terms · DPA · Privacy Policy · Cookie Policy
1. Security Governance
- Information Security Management System (ISMS) aligned to ISO/IEC 27001 practices — covering policies, risk assessment and treatment, and continuous improvement.
- Documented policies covering: access control, acceptable use, cryptography, secure development, vendor risk, incident response, change management, backup and DR, data retention, and privacy.
- Security training for all personnel; role-based training for engineers; background checks for employees where permitted by law.
- Security and privacy by design: risk assessment and data-protection considerations are embedded in product and project lifecycles.
- Separation of duties; least-privilege by default; periodic access reviews.
2. Shared Responsibility Model
Security responsibilities depend on deployment model.
SaaS (UNCAPT-hosted on Azure AU)
| Area | UNCAPT | Customer |
|---|---|---|
| Application-layer security and operations | ✓ | |
| Hosting and storage of platform data | ✓ | |
| Backups and DR for SaaS platform data | ✓ | |
| Monitoring, logging, and incident response (app layer) | ✓ | |
| User provisioning, RBAC, credential hygiene | ✓ | |
| Data quality, lawful data use, AUP compliance | ✓ | |
| SSO / IdP configuration (if used) | ✓ |
VPC / On-Prem (Customer-managed base)
| Area | UNCAPT | Customer |
|---|---|---|
| Platform application components per runbook / SOW | ✓ | |
| Base infrastructure, network, OS / hypervisor | ✓ | |
| IAM / SSO, identity lifecycle | ✓ | |
| Backups of Customer-managed layers | ✓ | |
| Physical security and endpoint controls | ✓ | |
| Infra / network monitoring and patching | ✓ |
3. Access Control and Identity
- Role-based access control (RBAC) and least-privilege access.
- MFA enforced for administrative and privileged accounts.
- Centralised identity for production access; just-in-time elevation for sensitive operations where applicable.
- Segregation of environments (dev / test / staging / prod).
- Quarterly access reviews; immediate revocation on role change or termination.
4. Data Protection
- Encryption in transit: TLS 1.2+ for all external communications and service-to-service calls where supported.
- Encryption at rest: AES-256 (or cloud-equivalent) for databases, storage, and backups — provided by Microsoft Azure AU managed services.
- Key management: Azure KMS / HSM where applicable; key rotation per provider best practices and policy.
- Secrets management: Dedicated secrets vault; no secrets in code repositories; rotation on compromise or schedule.
- Tenant isolation: Logical segregation of Customer Data; strict access controls and guardrails.
- Data minimisation: Purpose limitation aligned to the DPA; de-identification applied to analytics outputs.
5. Secure Development (SSDLC)
- Threat modelling for material features; design reviews for security and privacy.
- Code review on all changes; CI/CD with automated checks.
- Dependency management with vulnerability scanning (SCA).
- Application security testing: SAST/DAST integrated into the pipeline where applicable; manual security testing for high-risk areas.
- Change management with approval workflow, rollback plans, and production change logging.
6. Vulnerability and Patch Management
Regular vulnerability scanning of applications and relevant infrastructure. Remediation SLA targets (guideline, may vary by environment):
| Severity | Target remediation |
|---|---|
| Critical | 7 days |
| High | 30 days |
| Medium | 90 days |
| Low | Best effort |
- Emergency patching for actively exploited issues.
- Third-party libraries monitored and updated routinely.
7. Logging, Monitoring, and Detection
- Centralised logging of security-relevant events (auth, admin actions, configuration changes, data access patterns).
- Time-synchronised systems; tamper-resistant log storage.
- Alerting for anomalous activity and failed security controls.
- Regular review of alerts and security dashboards.
8. Incident Response
- Documented incident response plan with severity classification, roles, and escalation paths.
- Customer notifications for confirmed Security Incidents “without undue delay” consistent with the DPA; collaboration on containment, forensics, and remediation.
- Post-incident reviews and corrective actions for Sev 1/2 incidents; RCA summary provided per SLA.
9. Business Continuity and Disaster Recovery
SaaS backups of platform data under UNCAPT control; periodic restoration testing.
| Objective | Target (SaaS, best-efforts — see SLA) |
|---|---|
| RPO (Recovery Point Objective) | 24 hours |
| RTO (Recovery Time Objective) | 12 hours |
- Documented BCP/DR plans; annual exercises.
- For VPC/On-Prem, Customer is responsible for backups and DR of Customer-managed layers.
10. Data Residency, Retention, and Deletion
- Data residency and hosting regions as specified in your Order. Default: Microsoft Azure AU (Australian data centres).
- Retention aligned to contractual and legal requirements; data minimisation principles applied.
- Self-service export features where available; assisted export on request (see Terms/DPA).
- On termination or request: export then delete Personal Information from active systems and purge from backups per standard cycles; certification available on request (see DPA).
11. Subprocessors and Suppliers
- Use of reputable cloud and service providers for hosting, monitoring, email delivery, ticketing, etc. Primary infrastructure: Microsoft Azure AU.
- Security and privacy due diligence prior to onboarding; contractual obligations no less protective than the DPA.
- Current subprocessors list available on request or in Annex B of the DPA.
- Notifications of material subprocessor changes per the DPA, with an objection/transition process.
12. Network and Infrastructure Security
- Network segmentation and security groups; least-privilege firewall rules.
- Managed WAFs and DDoS protections where applicable.
- Hardened images and baseline configurations; CIS-aligned benchmarks where feasible.
- Bastion-based administrative access with MFA and session logging.
13. Product-Level Controls and Safety
The ELI Platform includes safety and governance controls as core architectural components:
- Safety gates and governance layer baked into the Platform (quality gates, confidence scoring, human-in-the-loop, audit trails).
- Stage verifiers enforce reasoning constraints at each decision point; HALT escalation routes uncertain cases to domain experts.
- Versioning of knowledge structures and logic; change approval workflows for Living Knowledge Banks.
- Audit trail generation for decisions and evidence provenance; configurable retention (see SLA/Order).
- Guardrails to reduce harmful or unsafe outputs; monitoring of model performance and drift where relevant.
- Zero hallucinations maintained in clinical evaluation contexts through expert-supervised stage verifiers.
14. Privacy
- Compliance with the Privacy Act 1988 (Cth) and applicable State health records laws; privacy-by-design principles.
- Health Information processed in accordance with applicable Australian privacy legislation, including the Health Records Act 2001 (Vic), the Health Records and Information Privacy Act 2002 (NSW), and equivalent state and territory legislation.
- Full details in the Privacy Policy and Data Processing Addendum.
15. Customer Security Features
- SSO (SAML/OIDC) and SCIM (where available) for centralised identity and provisioning.
- RBAC with configurable roles and permissions.
- IP allow-listing and session controls (where available).
- API authentication via OAuth2 / bearer tokens; per-client rate limits and scopes.
- Export utilities for Customer Data.
16. Penetration Testing and Disclosure
- Periodic third-party penetration testing of the externally exposed application and APIs.
- Findings triaged and remediated under the vulnerability SLAs above.
- Coordinated Vulnerability Disclosure: report issues to security@uncapt.com; please include details (affected component, steps to reproduce, impact).
- Do not perform unapproved penetration or load testing (see AUP).
17. Physical Security
- For SaaS, UNCAPT relies on Microsoft Azure AU certified data centres with industry-standard physical and environmental controls (access controls, surveillance, redundant power and cooling).
- For VPC/On-Prem, Customer is responsible for data centre and office physical security and endpoint protections.
18. Compliance
- ISMS aligned with ISO/IEC 27001 practices.
- ISO 27001 certified. Where additional certifications or attestations are achieved (e.g., SOC 2), UNCAPT will publish details or make reports available under NDA upon request.
- MRFF-backed research partnerships; University of Sydney Brain and Mind Centre peer review.
- Industry-specific requirements (e.g., aged care, mental health) addressed contractually via SOWs/Orders where applicable.
19. Contacts and Status
- Security: security@uncapt.com
- Privacy: info@uncapt.com
- Abuse / AUP violations: abuse@uncapt.com
- Status page: https://status.uncapt.com
- General: info@uncapt.com
We may update this Security Summary from time to time. Material changes will be reflected in the version/date above and, where relevant, notified alongside updates to the Terms, DPA, and SLA.
v1.1 (1 Mar 2026): Updated cloud provider to Microsoft Azure AU, added ELI Platform-specific controls (stage verifiers, HALT escalation, Living Knowledge Banks), added compliance section details.
v1.0 (15 Jul 2024): Initial publication of Security Measures Summary.