Trust Center
We believe the trust of our customers and partners is earned through three essential building blocks: privacy, security, and good intent.
This Trust Center provides you with information about our commitment to protect the data of our many stakeholders – our customers, their customers, regulators, employees, suppliers, business partners and most importantly the community we work in.
As well as being based on industry standards, these principles have been built up on the basis of operating principles developed since the businesses inception in 2017.
Trust Center
We believe the trust of our customers and partners is earned through three essential building blocks: privacy, security, and good intent.
This Trust Center provides you with information about our commitment to protect the data of our many stakeholders – our customers, their customers, regulators, employees, suppliers, business partners and most importantly the community we work in.
As well as being based on industry standards, these principles have been built up on the basis of operating principles developed since the businesses inception in 2017.
How is civilian data protected?
SenSen takes multiple approaches to protect our customer’s data. At the first level, we only keep data that is essential to achieve the outcome required – for as short a time as possible – meaning we hold the smallest possible dataset for each solution.
Secondly, SenSen performs de-identification on data. In the case of images, we remove objects from the scene that are not required, such as the faces or licence plates of surrounding people and vehicles. In the case of personally identifiable information, the data is only used for a specific purpose and workflow controls make it impossible be re-used for any other purpose.
Thirdly, SenSen’s solutions are only deployed on industry-standard ISO27001 environments in the jurisdiction of the customer unless otherwise requested. This provides assurance that our customer’s data is subject to overarching regulation associated with their jurisdiction. As an example of the controls available in these environments, SenSen configures its hosting providers to enforce indiscriminate technical blocks on all known bad actors.
How is civilian data protected?
SenSen takes multiple approaches to protect our customer’s data. At the first level, we only keep data that is essential to achieve the outcome required – for as short a time as possible – meaning we hold the smallest possible dataset for each solution.
Secondly, SenSen performs de-identification on data. In the case of images, we remove objects from the scene that are not required, such as the faces or licence plates of surrounding people and vehicles. In the case of personally identifiable information, the data is only used for a specific purpose and workflow controls make it impossible be re-used for any other purpose.
Thirdly, SenSen’s solutions are only deployed on industry-standard ISO27001 environments in the jurisdiction of the customer unless otherwise requested. This provides assurance that our customer’s data is subject to overarching regulation associated with their jurisdiction. As an example of the controls available in these environments, SenSen configures its hosting providers to enforce indiscriminate technical blocks on all known bad actors.
Trust Components
Privacy
We value your privacy and trust. Explore information on various privacy topics, including your choices about how we collect and use your information.
Security
The security of your data and digital experiences is our priority. Explore how SenSen builds security into everything we do.
AI Principles
We’re committed to improving the lives of as many people as possible. And we’ll continue to responsibly build solutions – powered by Live Awareness.
Privacy
We value your privacy and trust. Explore information on various privacy topics, including your choices about how we collect and use your information.
Security
The security of your data and digital experiences is our priority. Explore how SenSen builds security into everything we do.
AI Principles
We’re committed to improving the lives of as many people as possible. And we’ll continue to responsibly build solutions – powered by Live Awareness.
“They keep our customer information private, safe, and secure. With one of the world’s most advanced security infrastructures, SenSen uphold responsible data practices and create easy to use privacy and security settings so we’re in control.”
Leading Global Retailer
Sr. Director of Asset Protection Operations
Privacy
Your privacy is incredibly important to us. At SenSen, we value, protect, and defend data privacy. We believe in transparency, so that people and organisations can control their data and have meaningful choices in how it’s used. We empower and defend the data privacy choices of every person who uses our products and services.
Privacy
Your privacy is incredibly important to us. At SenSen, we value, protect, and defend data privacy. We believe in transparency, so that people and organisations can control their data and have meaningful choices in how it’s used. We empower and defend the data privacy choices of every person who uses our products and services.
How we respect your privacy
We are committed to safeguarding individuals’ privacy by implementing policies and practices that prioritise trust and transparency. With advanced encryption, SenSen helps protect your data both at rest and in transit. Industry-standard encryption protocols erect barriers against unauthorised access to the data, including two or more independent encryption layers to safeguard against compromises of any one layer.
- Data at rest – SenSen employs a wide range of industry-standard encryption capabilities, giving you the flexibility to choose the solution that’s best for your business.
- Data in transit – SenSen uses and enables the use of industry-standard encrypted transport protocols, such as Transport Layer Security (TLS) and Internet Protocol Security (IPsec).
- APIs – All SenSen-managed APIs are secured using industry-standard techniques such as OAuth to help you control access to your data.
How we respect your privacy
We are committed to safeguarding individuals’ privacy by implementing policies and practices that prioritise trust and transparency. With advanced encryption, SenSen helps protect your data both at rest and in transit. Industry-standard encryption protocols erect barriers against unauthorised access to the data, including two or more independent encryption layers to safeguard against compromises of any one layer.
- Data at rest – SenSen employs a wide range of industry-standard encryption capabilities, giving you the flexibility to choose the solution that’s best for your business.
- Data in transit – SenSen uses and enables the use of industry-standard encrypted transport protocols, such as Transport Layer Security (TLS) and Internet Protocol Security (IPsec).
- APIs – All SenSen-managed APIs are secured using industry-standard techniques such as OAuth to help you control access to your data.
Security
The security of data is critical to the success of our business and we know that it is important for our customers. So you can be assured we take security extremely seriously.
We make security a priority in our business practices and throughout the development process, maintaining effective controls over the security, availability, confidentiality and processing integrity of the platform. This creates a highly secure platform that allows our customers and partners to access information in a safe and secure way.
Security
The security of data is critical to the success of our business and we know that it is important for our customers. So you can be assured we take security extremely seriously.
We make security a priority in our business practices and throughout the development process, maintaining effective controls over the security, availability, confidentiality and processing integrity of the platform. This creates a highly secure platform that allows our customers and partners to access information in a safe and secure way.
Security Principles for Protecting Our Enterprise
Access Control
-Access Control Policy
Establish an Access Control Policy for every application or system that describes how to manage risks from user account management, access enforcement and monitoring, separation of duties, and remote access.
-User Access Management
Assign access rights based on a business need-to-know basis. Privileged access should be assigned carefully and with the least amount of privilege required. Revoke rights when there is no longer a business need for the employee or contractor to have the access.
-Application and System Access Control
Use secure logon procedures to control access to applications and systems, including multi-factor authentication.
Asset Management
Register and inventory assets. Establish an acceptable use policy for each asset or group of assets.
Data and Asset Classification and Protection
Assign the appropriate classification and controls to information, data and assets categories. Apply appropriate access controls to restrict access on a business need-to-know basis.
Network Security
Design and operate networks with the following objectives:
- To limit access to SenSen networks to authorise parties
- To be resilient when confronted with external threats such as intrusion and disruption
Operations Security
Maintain operating procedures and make these available to relevant users. Operating procedures may include:
- Installation and configuration of applications and systems
- Startup and close-down procedures
- Authentication and authorisation management
- Maintenance and backup procedures
- Information handling procedures, both automated and manual activities
- Problem determination and handling
- Logging and monitoring
- Communication with support and escalation contacts
- Security incident handling
- Security testing
- Vulnerability and patch management
Organisation and Governance
SenSen has a dedicated team is responsible for leading enterprise-wide information security strategy, policy, standards, architecture, and processes. The team works across all of the organisations within the Company to protect SenSen, its brand and its customers against cybersecurity risks.
Physical and Environmental Security
Place infrastructure assets in controlled access areas, with the exception of those intended for public use. Apply risk-based access controls, which may include locking or guarding areas to:
- Allow access only to authorised individuals
- Maintain physical security during power outages
- Maintain access logging
Security and Use Standards for SenSen Personnel
– Security and Use Standards for SenSen Personnel
SenSen has established security and use standards for SenSen personnel and their workstations and mobile devices used to conduct SenSen business or that connect to the SenSen internal network. The focus of these standards is to protect data and information technology assets from loss, modification, or destruction. SenSen’s internal policies summarise the most critical steps employees must take to protect workstations and mobile devices. Further, the standards outline employee responsibilities for protecting SenSen Confidential information and provide security and appropriate use requirements.
– Physical Security
SenSen employees are provided with specific guidance intended to maintain the physical security of their workstations, mobile devices and work areas, and maintain security while traveling.
– Logical Security
Access management is required to protect information and systems at both individual and role-based levels. Passwords are expected to be changed regularly and comply with password complexity standards.
– Safe Use and Education
SenSen employees receive guidance and education regarding the safe use of information technology assets. Further, SenSen has implemented annual mandatory IT security education to help employees understand security risk and comply with IT policies. Employees also receive education on SenSen’s Business Conduct Guidelines that requires SenSen employees to conduct business observing high ethical standards and in accordance with data security and confidentiality policies. Employees are expected to report illegal or unethical behaviour.
Supplier Management
Evaluate suppliers based on their ability to meet business and security requirements. The supplier must demonstrate security and privacy practices, for example, through certifications or third-party attestations.
Use of Encryption
Use encryption based on risk criteria, such as information sensitivity or classification:
- To protect data in transit on public and private networks, and
- How data is stored in applications or systems to mitigate threats
Security Principles for Protecting Our Enterprise
Access Control
-Access Control Policy
Establish an Access Control Policy for every application or system that describes how to manage risks from user account management, access enforcement and monitoring, separation of duties, and remote access.
-User Access Management
Assign access rights based on a business need-to-know basis. Privileged access should be assigned carefully and with the least amount of privilege required. Revoke rights when there is no longer a business need for the employee or contractor to have the access.
-Application and System Access Control
Use secure logon procedures to control access to applications and systems, including multi-factor authentication.
Asset Management
Register and inventory assets. Establish an acceptable use policy for each asset or group of assets.
Data and Asset Classification and Protection
Assign the appropriate classification and controls to information, data and assets categories. Apply appropriate access controls to restrict access on a business need-to-know basis.
Network Security
Design and operate networks with the following objectives:
- To limit access to SenSen networks to authorise parties
- To be resilient when confronted with external threats such as intrusion and disruption
Operations Security
Maintain operating procedures and make these available to relevant users. Operating procedures may include:
- Installation and configuration of applications and systems
- Startup and close-down procedures
- Authentication and authorisation management
- Maintenance and backup procedures
- Information handling procedures, both automated and manual activities
- Problem determination and handling
- Logging and monitoring
- Communication with support and escalation contacts
- Security incident handling
- Security testing
- Vulnerability and patch management
Organisation and Governance
SenSen has a dedicated team is responsible for leading enterprise-wide information security strategy, policy, standards, architecture, and processes. The team works across all of the organisations within the Company to protect SenSen, its brand and its customers against cybersecurity risks.
Physical and Environmental Security
Place infrastructure assets in controlled access areas, with the exception of those intended for public use. Apply risk-based access controls, which may include locking or guarding areas to:
- Allow access only to authorised individuals
- Maintain physical security during power outages
- Maintain access logging
Security and Use Standards for SenSen Personnel
– Security and Use Standards for SenSen Personnel
SenSen has established security and use standards for SenSen personnel and their workstations and mobile devices used to conduct SenSen business or that connect to the SenSen internal network. The focus of these standards is to protect data and information technology assets from loss, modification, or destruction. SenSen’s internal policies summarise the most critical steps employees must take to protect workstations and mobile devices. Further, the standards outline employee responsibilities for protecting SenSen Confidential information and provide security and appropriate use requirements.
– Physical Security
SenSen employees are provided with specific guidance intended to maintain the physical security of their workstations, mobile devices and work areas, and maintain security while traveling.
– Logical Security
Access management is required to protect information and systems at both individual and role-based levels. Passwords are expected to be changed regularly and comply with password complexity standards.
– Safe Use and Education
SenSen employees receive guidance and education regarding the safe use of information technology assets. Further, SenSen has implemented annual mandatory IT security education to help employees understand security risk and comply with IT policies. Employees also receive education on SenSen’s Business Conduct Guidelines that requires SenSen employees to conduct business observing high ethical standards and in accordance with data security and confidentiality policies. Employees are expected to report illegal or unethical behaviour.
Supplier Management
Evaluate suppliers based on their ability to meet business and security requirements. The supplier must demonstrate security and privacy practices, for example, through certifications or third-party attestations.
Use of Encryption
Use encryption based on risk criteria, such as information sensitivity or classification:
- To protect data in transit on public and private networks, and
- How data is stored in applications or systems to mitigate threats
AI Principles
While we are optimistic about the potential of AI, we must uphold an unwavering commitment to developing these powerful technologies responsibly and ethically. The transformative potential of AI goes hand-in-hand with intricate challenges that demand nuanced consideration and proactive governance.
These AI Principles describe our commitment to developing technology responsibly and outline a principled framework to steer our organisational pursuit and global deployment of AI solutions.
AI Principles
While we are optimistic about the potential of AI, we must uphold an unwavering commitment to developing these powerful technologies responsibly and ethically. The transformative potential of AI goes hand-in-hand with intricate challenges that demand nuanced consideration and proactive governance.
These AI Principles describe our commitment to developing technology responsibly and outline a principled framework to steer our organisational pursuit and global deployment of AI solutions.
Fundamental Principles
1. Follow the rules
Our AI systems and processes will be architected from the ground up to comply with all relevant national and international laws, policies, and human rights standards, including the EU’s AI Act, GDPR, and other relevant guidelines.
2. Clear responsibility
Accountability is a cornerstone of our approach to AI development. We establish clear lines of responsibility for the deployment and operation of our AI systems. This commitment to clear responsibility ensures that there is always someone accountable for the AI systems’ actions and decisions.
3. Protect your data
The privacy and security of citizen data are paramount. Our AI technologies are built with robust privacy measures to safeguard personal information. We prioritise data sovereignty, ensuring that all data handling complies with governmental regulations. By protecting your data, we help maintain trust and confidence in our AI systems and the services they support.
4. Fair for everyone
We believe in creating AI solutions that promote fairness and inclusivity. Our systems are designed to serve all citizens equally, without bias or discrimination. By focusing on equitable access, we aim to enhance public services, ensuring that everyone benefits from the advancements in AI technology. This commitment to fairness helps build a more just and inclusive society.
5. Safe and reliable
Safety and reliability are non-negotiable in our AI solutions. We implement stringent safety protocols to ensure that our AI systems operate securely and effectively, especially in critical government applications. By prioritising safety and reliability, we ensure that our technologies can be trusted to perform consistently and without failure, supporting the crucial functions they are designed for.
6. Work together
Collaboration is key to the success of AI in government. We create interoperable AI systems that facilitate seamless cooperation between different government agencies and international partners. By fostering a collaborative ecosystem, we enable more efficient and effective solutions to complex challenges, promoting global cohesion and better outcomes for all.
7. Teach and inform
Education and public engagement are essential to the responsible deployment of AI. We promote AI literacy among government employees and the general public, ensuring that everyone is informed about the benefits and risks of AI technologies. Through continuous education and transparent communication, knowledgeable & engaged community can make informed decisions about AI.
AI applications we will not pursue
In addition to the above objectives, we will not design or deploy AI in the following application areas:
- Technologies that cause or are likely to cause overall harm. Where there is a material risk of harm, we will proceed only where we believe that the benefits substantially outweigh the risks and will incorporate appropriate safety constraints.
- Weapons or other technologies whose principal purpose or implementation is to cause or directly facilitate injury to people.
- Technologies that gather or use information for surveillance violate internationally accepted norms.
- Technologies whose purpose contravenes widely accepted principles of international law and human rights.
As our experience in this space deepens, this list may evolve.