Compliance

At Asset Reality, your security is our top priority.

We are continuously working to ensure that our systems and processes adhere to industry-leading security standards and are fully committed to protecting the privacy and data of our clients.

Our platform is powered by Amazon Web Services (AWS) Global Infrastructure. It offers advanced security features, including encryption for assets at rest and in transit, automated threat detection and round-the-clock monitoring through our dedicated Security Operations Center (SOC).

To further enhance our operational security, we utilise geographically dispersed key management, the Four Eyes Transfer Protocol, and comprehensive in-line and in-flight audits.

In the event of a data breach or any security incident, please promptly contact us (legal@assetreality.com)  for assistance.

Our Security Credentials

Cyber Essentials is a government-backed, industry-supported scheme to help organisations protect themselves against common online threats.

The Federal Information Processing Standard (FIPS) Publication 140-2 is a U.S. government standard that defines minimum security requirements for cryptographic modules in information technology products, as defined in Section 5131 of the Information Technology Management Reform Act of 1996.

SOC 2 is a security and compliance standard that offers guidelines for service organisations to protect sensitive data from unauthorised access, security incidents, and other vulnerabilities.

Security Technical Implementation Guides (STIGs) are configuration standards developed by the Defense Information Systems Agency (DISA). They are designed to make device hardware and software as secure as possible, safeguarding the Department of Defense (DoD) IT network and systems.

The General Data Protection Regulation (GDPR) is a comprehensive data privacy law in the European Union that aims to protect EU residents' personal data and privacy by setting strict guidelines for how organisations should collect, process, and protect personal data in a manner that respects individual's privacy and integrity and ensures transparency, consent, and security.

The California Consumer Privacy Act (CCPA) mandates that businesses' privacy policies must contain detailed information about consumers' privacy rights and the procedures for exercising them.