
Data Privacy and Security
Discover our robust security protocols and data protection practices. Explore how we prioritise and protect your information every step of the way.
Industry-leading security measures to protect your data
Built-In Security from the Ground Up
Our platform is designed with security at its very core. We use multiple layers of protection to safeguard your sensitive data from unauthorized access or threats. By following best practices in data protection, we proactively identify and address potential risks, ensuring your information remains secure at all times.
Robust Data Security and Privacy
Protecting your data is our top priority. We use strong encryption protocols to secure your data both in transit and at rest. This means your information is encrypted when it's stored on our servers and when it's transmitted between your device and our platform. Our strict privacy policies ensure that your data is handled with the utmost confidentiality.
Secure Access and Permissions
We ensure that only authorized individuals can access the platform through strong login procedures. With clearly defined user roles, each person gets access only to the features and data relevant to them. This means your team members see just what they need, keeping everything else securely out of reach.
Reliable and Secure Infrastructure
Our platform is built on Amazon Web Services (AWS), a trusted and secure cloud provider. AWS helps us keep your data safe with strong encryption and constant monitoring. This reliable foundation means you can count on us to protect your information while providing a seamless experience.
Advanced Threat Protection
We actively defend against online threats using advanced tools and protocols. By continuously monitoring our network and using secure communication channels, we prevent unauthorized access and protect against cyberattacks. Your data stays safe with our vigilant security measures.
Secure Everyday Operations
Security is part of our daily routine. We continuously monitor our systems to quickly spot and address any issues. With plans in place for any situation—from minor incidents to major events—we ensure that our platform remains secure and operational, giving you uninterrupted peace of mind.
Constant Vigilance for New Threats
We are always on the lookout for potential vulnerabilities. Through regular testing and updates, we find and fix weaknesses before they can be exploited. By staying ahead of emerging threats, we keep our security measures strong and up-to-date.
A Culture of Trust and Accountability
Trust and accountability are the pillars of our company culture. E very team member is committed to maintaining the highest standards of ethics and responsibility. We work together to create a secure and respectful environment, ensuring that your trust in us is well-placed.


Your Data is Safe with SNA Toolbox
At SNA Toolbox, we are committed to protecting the privacy and security of your data. We employ industry-leading security measures to ensure that all sensitive information remains confidential, secure, and accessible only to authorized users. By focusing on robust encryption, secure access controls, and proactive threat detection, we maintain the integrity and availability of your data, so you can focus on building a thriving organisation.
Frequently asked questions
Do you share my data with third parties?
No, we do not share your data with any third parties. Your information is used only to provide and improve our services to you.
Can I request the deletion of my data?
Yes, you can ask us to delete your data at any time. Simply contact our support team, and we'll securely remove your information from our systems.
Where is my data stored and backed up?
Your data is securely stored and backed up on Amazon Web Services (AWS) servers located in Sydney and Melbourne, Australia. If you prefer, we can accommodate your request to store your data in a different region, such as the European Union or the United States, to meet your specific regulatory or operational requirements.
How is my data protected?
We use advanced security measures, including encryption, to protect your data both when it's stored and when it's transmitted.
Why we require certain user information
To provide valuable insights and create a network map of your organisation, we need to know who your team members are and how they connect. This involves collecting names, IDs, and contact information like email addresses or phone numbers to send surveys. While we can't collect this data anonymously, we ensure privacy by removing staff identities when sharing reports with organisational leaders.
Who can access the collected data?
Only authorised users can access the collected data, and they can only see what their permissions allow. We use role-based access control, so users see only the data relevant to them. Based on your requirements, we can adjust access levels—for example, allowing users to view only certain subsets of data, de-identified information, or aggregated results.
What happens in the event of a data breach?
We have a plan to respond quickly to any data breaches. We'll immediately address the issue, notify you promptly, and implement measures to prevent it from happening again.
Do you have another question that is not answered here?