Features
DocumentsShared TasksCommunicationE-Signatures
Solutions
Finance Teams
Integration
OverviewNetSuiteSuiteAppNetSuite ProjectsOutlookCeligo
Resources
WebinarsGuidesCustomer StoriesFeature VideosBlogHelp Centre
Pricing
Book a demo
Book a chat
Sign-in
Features
Documents
Shared Tasks
Communication
E-Signatures
Solutions
Finance Teams
Integration
Overview
NetSuite
SuiteApp
NetSuite Projects
Outlook
Celigo
Resources
Webinars
Guides
Customer Stories
Feature Videos
Blog
Help Centre
Pricing
Book a demo
Book a chat
Sign-in

WORKIRO TERMS, POLICIES & NOTICES

Security and Availability

Last Updated June 2022
Features
DocumentsShared TasksCommunicationE-Signatures
Solutions
Finance Teams
Integration
OverviewNetSuiteSuiteAppNetSuite ProjectsOutlookCeligo
Resources
WebinarsGuidesCustomer StoriesFeature VideosBlogHelp Centre
Pricing
Book a demo
Book a chat
Sign-in
Features
Documents
Shared Tasks
Communication
E-Signatures
Solutions
Finance Teams
Integration
Overview
NetSuite
SuiteApp
NetSuite Projects
Outlook
Celigo
Resources
Webinars
Guides
Customer Stories
Feature Videos
Blog
Help Centre
Pricing
Book a demo
Book a chat
Sign-in
Terms of ServicePrivacy NoticeSecurity & AvailabilityeSignaturesNames & AddressesPrevious Terms

Security & Availability

GetBusy products and services adhere to the highest industry standards for security. You can use our products and services with confidence, safe in the knowledge that we use the same security methods and principles as the most diligent of institutions such as government bodies and financial institutions.

We have teams of experts using the latest technologies and best practices to ensure that our products are, and remain, safe and protected so you can use them worry free.

Processes

Security of our products and services, including how they are designed, built, tested and worked on, and by whom, are our highest priorities. We are proud to be ISO27001 certified in relation to our UK developed products: WORKIRO, Virtual Cabinet and Virtual Cabinet Portal.

Encryption

All data in transit across all of our products and services, outside of your own network, is encrypted as well as certain customer content data, such as documents, which are encrypted at rest.

Data Centres

We use infrastructure and services provided by Amazon Web Services (AWS). AWS, like us, treat security as their highest priority. AWS documentation on the security of their infrastructure and services is comprehensive and can be found here https://aws.amazon.com/security/

Specific details about physical and environmental security and network architecture can be found in their white paper AWS: https://bit.ly/21ph425

Penetration Testing

At a minimum, we conduct regular penetration testing of all our products and services via specialist independent and industry accredited third party penetration professionals. For our WORKIRO, Virtual Cabinet, Virtual Cabinet GO, and Virtual Cabinet Portal products, as well as our non-product operations in the UK, we adopt Continuous Offensive Security ("COS"). COS ensures that our products and operations are under continual but controlled attack from specialist third parties based on the latest attack vectors, moving well beyond point-in-time penetration testing practices.

Availability

We leverage the best that AWS has to offer to provide high levels of availability, redundancy and scalability.

Data Protection

We are fully committed to all Data Protection regulatory requirements that are in place in the territories where we operate and have in place a Privacy Policy that covers:

  • Your privacy rights and how to exercise them;
  • How we collect, use, share and protect your personal data;
  • The legal bases we rely on to process your personal data; and
  • How we operate in our capacity as a data processor acting on your behalf.

We have tools and processes as well as a dedicated Security and Compliance staff to ensure that we stay on top of all Data Protection Requirements, and we actively monitor regulatory guidance and interpretations of key Data Protection requirements to make sure we're well informed and doing the right things in the right way.

Reporting Vulnerabilities

GetBusy is committed to investigating and resolving security issues reported by the security community. If you have information on a suspected vulnerability or other security concerns, you can submit details to the GetBusy security team at https://www.getbusyplc.com/security/vulnerability-reporting

Work with documents, get any work done, and communicate in a way that truly matters.

Company

About us
Contact us
LinkedIn
Twitter
YouTube

Product

Pricing
Feature library
Customer stories

Security & Compliance

Terms of Service
Privacy Notice
Security
Signature Compliance
GetBusy PLC →

© 2022 GetBusy |  All rights reserved