Technical FAQs

Technical FAQs 2019-08-20T12:10:09+00:00

Data Centre and Network

Verified is committed to securing our customers data to the highest degree. Our customers include educational institutes, government agencies, healthcare providers, banking and finance and retail industry clients, who trust us with their data.  That’s why security protocols and procedures are required to be able to deliver our services to leading industry clients.

Physical Security

Verified servers are hosted on a private cloud located in world class, access-controlled tier 4 datacentres in Australia that meet the ISO 27001 security standard for Information Security Management Systems (ISMS).  These datacentres are monitored 24/7 for all aspects of operations security and performance.

Physical access to the data centre is restricted to only individuals who require access to maintain systems needed to support the platform.

Network Security

Verified monitors its network 24/7 against any potential threats including data breaches, hackers, phishing attempts and more.

Access to Verified online systems are protected via:

  • Encrypted HTTPS connection. A 2048-bit SSL certificate issued by DigiCert Inc to ensure information transmitted by users are secure
  • Access controlled log-ins to protect user information and only accessible by administrators with appropriate login credentials
  • Intrusions prevention system and firewalls

Verified systems are scanned by industry leading anti-spam/anti-virus scanners to prevent client information from being compromised by viruses, trojans etc.



Verified services are available for use over 99% of the time, meaning less interruptions for your business.

Data is backed up daily off-site with disaster recover procedures in place including copies of encrypted archives.


Web Application

Verified is accessible via a web browser meaning the software always up to date.  There is no program to install or storage required.


Disclosure of Personal Information

We do not share any data unless required by law, or with your permission.  Read our privacy policy for more information.