We understand that your IT department may want to perform due diligence on all third party technology providers. To make life easier for everyone, we have assembled the most common and relevant questions and answers here.
If you require a bespoke compliance form to be completed, please contact support. Note that you will be asked to pre-purchase sufficient credits to cover ten uses of the product. Filling out those forms is no one’s idea of a good time, so we only do it for bona fide customers.
The following domain names can be used to access the application: partn.com.au rufflereport.com.au
You may receive email from addresses at the following domain names, and should ensure they are allowed in your email spam filter: @partn.com.au @rufflereport.com.au @ruffle.technology
Yes
Yes
Yes
Cloud
Software as a Service (SaaS)
Public cloud (eg, AWS, Azure, Google Cloud, etc)
Yes
DigitalOcean
Sydney, Australia
Multi-tenant
99.99% uptime per month
Yes
No removable media is used
Data is backed up on a daily basis, and retained for 7 days
Best endeavours to restore access as quickly as reasonably possible. Please remember that PartN.com.au and RuffleReport.com.au export to Word, Excel, and PDF, and those reports get saved onto your matter. Once saved to the matter, continued access by your team will be to the saved version in your matter management software.
Yes – see https://partn.com.au/legals
Yes
Yes
Yes
We notify affected individuals and the OAIC about an eligible data breach. An eligible data breach occurs when: 1. there is unauthorised access to or unauthorised disclosure of personal information, or a loss of personal information, that our organisation holds 2. this is likely to result in serious harm to one or more individuals, and 3. our organisation hasn’t been able to prevent the likely risk of serious harm with remedial action. Notification must be made promptly, and in any event within 7 business days of discovery of the eligible data breach.
Yes
Yes
Yes. Among other things, we log the IP address and logged in user ID for the following actions: - Log in (and all steps in the log in flow) - Log out - Access a product - Alter a product - Create a new product - Invite other users to gain access to a product - All steps in the payment flow
Yes. Internally, the software keeps track of users and memberships. Users can only access products to which they have a membership. Externally, logins are handled by email address. Accordingly, as soon as a former employee has their email access removed, they lose access to the app.
‘Magic links’, that is to say, login links emailed to the user's email address. These links last 5 minutes, and new login links invalidate old login links (even if the old ones were still 'in date'). Each user can only have one active session at a time. Sessions time out after 30 minutes (which can be extended by taking action), but the maximum session time is 24 hours, after which time the user will need to authenticate again using a magic link.
We do not currently offer this. However, because our user authentication is handled via email login links, if a staff member leaves your firm and loses access to their work email, they will also lose access to their account on PartN.com.au
Yes – temporary login link sent to email address
No. However, we maintain an information security capability commensurate with information security vulnerabilities and threats by taking the following precautions, among others: 1. We produce a minimal product, with minimal features, and therefore, minimal surface area exposed to the outside world. 2. We use extensive automated testing to ensure our software is and remains secure against malicious users attempting to access data they should have access to. 3. We leverage widely-adopted technologies with active security maintenance. 4. We use tightly constrained network architecture which only opens the ports and hostnames that are essential for continued operation. 5. We apply sweeping IP restrictions to production assets such that they are only accessible to other production assets, and to approved company workstations.
Yes. Wherever possible we use managed infrastructure where these patches are applied automatically for us.
Yes. We use XProtect to scan executables when they run, when they change, and when new signatures are made available. We also benefit from automatic MRT, SIP, Bastion, and XProtect Behavioural Analysis.
Yes
Yes
Yes
At least weekly
At least weekly
Among other things, suspicious activity is logged to an audit trail database and redundancy log store, and alerts are emailed to the technical team. Unexpected resource usage levels are emailed to the technical team.
No
Yes
All new employees or contractors undergo background checks and identity verification
Yes
Yes
Yes