Whistic Security Portal: At Workiro, we aim to be transparent in how we deliver our manage, secure, and operate our services.
We recognise that our customers and suppliers follow a Third Party Risk Management process for cloud services. We want to help you with that process.
Workiro has pre-completed standardised questionnaires to answer the common questions we regularly receive from our customers. It is important to note that each of these questionnaires consists of self-attestation-style responses. They have not been independently verified by a third party, and they should not be regarded as contractual commitments, as they may be subject to change.
Our externally validated certificates and attestations can be accessed via our Information Security Profile in Whistic. We believe that these certifications can and should serve as your primary assurance that we are operating, securing, and managing our cloud services with our customers' best interests at the core.
If your Third Party Supplier Risk Management process aligns with a standardised questionnaires or requires certifications, please view the documents via the Whistic Portal.
If the options we have provided don’t address your question, please reach out to our Compliance Team at compliance@getbusy.com
Whistic Security Profile
Cookie Policy
We value your privacy and strive to be transparent about how we use cookies to provide you with the best possible online experience.
Full Policy
Privacy Notice
We respect your privacy and are committed to protecting your personal data. Delve into our privacy notice to discover how we collect, use and disclose your personal data.
Full Policy
Terms of Service
Dig into the rulebook for using Workiro. Learn what you can and can't do, your responsibilities, and what happens if things go off track.
Full Policy
Acceptable Use Policy
This policy outlines rules for responsible, legal, and ethical use of our solution, site, or service.
Full Policy
E-signature Compliance
As a software provider, we understand the importance of seamless and secure e-signature transactions. Discover more about e-signatures and the legislation surrounding them.
Full Policy
Security Practices
At Workiro, we take security seriously. Our security strategy is implemented enterprise wide, and designed to protect the confidentiality, integrity and availability of both business and customer data.
Full Policy
Vulnerability Disclosure
Workiro prioritises security and privacy, employing various methods to enhance our security measures. Discover more in our vulnerability disclosure.
Full Policy
AI Principles
AI technology within GetBusy’s products has the potential to bring significant value to our customers, enabling them to leverage deep insights from the valuable content entrusted to us, significantly enhancing their productivity.
Full Policy