Loading...

Security and hosting

Illustration shield

A culture of security

As information specialists Logicly understands not only why but how data security should be managed seriously. At Logicly, security is integrated and prioritised as a core value and capability in our processes and culture. We partner with our clients to help them safely and accurately gather insights from sensitive data that inform high-stakes outcomes.

Illustration tasks

Matching the security to the project

We understand the importance of tailoring security activities to meet the specific requirements of a project. Our infrastructure and organisational processes have been designed to successfully meet the Australian Government standards, yet we understand that some projects need to meet specific security frameworks.


Illustration lock

A continuous, systematic approach to risk analysis and security

To ensure we're at the cutting edge of security best practices, and align with client needs, we keep a rigorous routine of continuous review and investment in our methods. Our data solutions are created to respond to each client's unique information challenge, including their risk requirements.




Illustration server

Hosted in Australia

We understand the value of data and the importance of keeping it safe, which is why we will only ever store WebSurvey data in Australia. WebSurvey data is hosted in Amazon Web Services Sydney (AWS Sydney). AWS Cloud services have been assessed against the Australian Government Information Security Manual (ISM) by an independent IRAP assessor and is recognised as a robust, secure cloud hosting service.

Security activities

Logicly has undertaken a range of activities to support individual projects' security requirements, such as:

  • Working with data custodians to establish an appropriate level of security requirements (usually based on the Protective Services Policy Framework)

  • Infosec Registered Assessors Program (IRAP) assessment

  • Vulnerability scanning and penetration testing of the system

  • Testing against the OWASP Top 10

  • Assessment against the Essential Eight

  • Development of project-specific security documentation such as a Security Risk Management Plan, Incident Response Plan, Statement of Applicability and Compliance Audits

  • Internal review of project security

  • Review against appropriate framework

  • Documentation of activities undertaken in line with framework

Want to know more about how we keep our data secure?

Call us for more information on +61 3 9340 9001, or email us at info@websurvey.com.au.