Altura Health Data Storage & Security Policy
This policy explains, at a high level, how Altura Health safeguards information to prevent loss, unauthorised access, or misuse. It also outlines our approach to backups and restoration.
Data Storage and Residency
- Customer data is hosted in Australia using AWS.
- Data is encrypted in transit and at rest using industry-standard encryption.
- Access to systems and customer data is controlled using least privilege principles and role-based access.
Data Governance and Handling
- Data access is restricted to authorised personnel and governed by documented processes.
- Logging and auditability controls support traceability and accountability.
- Data retention and deletion are managed in line with contractual and regulatory obligations.
Backups and Restoration
- Backups are performed regularly using cloud-native services.
- Backups frequency and retention vary depending on the product, environment, and data type (e.g. databases vs documents).
- Backup storage is protected using access controls and safeguards to reduce the risk of unauthorised access, deletion or modification.
- Restoration procedures are documented and maintained. Recovery time depends on the nature of the incident and the impacted component.
Monitoring and Assurance
- Operational monitoring is used to support backup integrity and availability.
- Periodic backup checks and restore testing are performed to validate recoverability.
Security Assurance
- Altura Health undertakes regular independent security testing (e.g. penetration testing and security assessments) with third-party specialists.
- A summary of recent security assessment results may be provided on request, subject to appropriate confidentiality arrangements.
Account Access
- Altura Health Supports Single Sign-On (SSO) where configured and enforces Multi-Factor Authentication (MFA) for account access.
- Altura Health supports RBAC, and each facility decides the role structure and is responsible for assigning and maintaining user access for their team.
- Authentication and access controls may vary depending on customer configuration and agreed requirements.

