Security & Trust
Your data is protected with enterprise-grade security
How We Protect Your Data
Encryption
All data is encrypted in transit (TLS 1.3) and at rest (AES-256). Your passwords are hashed using bcrypt with unique salts.
Secure Infrastructure
Hosted on AWS in Australian data centers with 24/7 monitoring, DDoS protection, and automated backups.
Access Controls
Role-based permissions, two-factor authentication (2FA) for administrators, and strict internal access policies.
Compliance
We comply with Australian Privacy Principles (APPs), GDPR, and industry best practices for data protection.
Regular Audits
Third-party security audits, vulnerability scanning, and penetration testing on a regular schedule.
Data Backups
Automated daily backups with 30-day retention. Point-in-time recovery available for Enterprise plans.
Your Responsibilities
Security is a shared responsibility. Here's what you can do to keep your account safe:
- Use a strong, unique password (at least 12 characters with letters, numbers, and symbols)
- Enable two-factor authentication (2FA) on your account
- Never share your password or login credentials
- Log out from shared or public devices
- Review your account activity regularly
- Report suspicious activity to our support team immediately
Incident Response
In the unlikely event of a security incident, we have a documented incident response plan:
- Immediate containment: Isolate affected systems and prevent further unauthorized access.
- Investigation: Determine the scope, cause, and impact of the incident.
- Notification: Inform affected users within 72 hours (as required by law).
- Remediation: Fix vulnerabilities and restore normal operations.
- Post-incident review: Analyze the incident and update security measures to prevent recurrence.
Reporting a Vulnerability
We take security seriously and welcome responsible disclosure of vulnerabilities. If you discover a security issue, please email security@mypokertourney.com.au with:
- A detailed description of the vulnerability
- Steps to reproduce the issue
- Potential impact and severity
- Your contact information (optional, for follow-up)
We will acknowledge your report within 48 hours and work with you to resolve the issue. We do not currently offer a bug bounty program, but we recognize and thank security researchers in our Hall of Fame (with your permission).