Reporting security concerns to Cloudwater Systems
If you have found a potential security vulnerability or privacy breach in any of our software solutions or digital channels, please contact our security team as soon as possible by email at email@example.com.
With your help, we can ensure that potential vulnerabilities are quickly investigated using our established security response procedures and any threats are eliminated without delay.
Security is our top priority
Cloudwater Systems values the trust that our customers place in us by letting our people interact with their data and systems. We take our responsibility to protect and secure your information seriously and strive for transparency around our security practices.
We understand how critical security is to your business and in turn maintaining trust with your customers. Our customer-focused principles ensure that security continues to be a top priority for Cloudwater Systems and our goal is to ensure that we retain your confidence in using our products and services. And we are committed to maintaining robust processes and operations that are designed around a core security ethos.
Dedicated Security Expertise
Cloudwater Systems has a dedicated and highly skilled security team which focuses on application, network, and system security. This team is also responsible for security compliance, education, and incident response.
Cloudwater Systems maintains and regularly reviews and updates its information security policies, and all employees must acknowledge these policies and any updates on an annual basis. Appropriate job specific security training and skills development is also undertaken as required.
All contracts with customers clearly stipulate our security obligations along with those of the respective customer. These include but are not limited to the following:
- The protection of customer data against unauthorised access
- Meeting legislative and regulatory requirements
- Development, maintenance and testing of Business Continuity plans
- Reporting and investigation of actual or suspected information security breaches
- Security procedures including virus control measures, encryption, password control and continuity plans.