Security At Stellar Board

Your board’s information is some of the most sensitive data your organisation holds. At Stellar, security and privacy are built into everything we do. Our platform is designed to keep your information safe while remaining easy to use.

At a Glance

  • Data residency: Hosted in trusted, regionally compliant data centres.
  • Encryption everywhere: Data is protected both in transit and at rest.
  • Access control: Role-based permissions and secure sharing options.
  • Identity protection: Multi-factor authentication and device safeguards.
  • Audit trails: Comprehensive records of user and administrator activity.
  • Resilience: Backups and redundancy to ensure availability.
  • Secure development: Regular testing, reviews, and ongoing improvements.
  • Privacy by design: Practices aligned with New Zealand and Australian privacy regulations.

Platform & Hosting
Our services are delivered through a leading global cloud provider, with data hosted locally for performance and compliance. Systems are designed with segregation and restricted access to protect customer data.

Encryption & Protection
All data is encrypted during transfer and while stored. Access is tightly controlled, with additional protections at the file level.

Identity & Access
We support multi-factor authentication and role-based access, giving administrators the ability to set the right level of permissions for each user or document.

Monitoring & Visibility
System activity is logged to support transparency and compliance, with visibility across user actions, document access, and administrative changes.

Business Continuity
We maintain regular backups and redundancy to minimise disruption and enable recovery in the event of an outage.

Secure Development
Our development processes include peer reviews, vulnerability scanning, and testing to ensure security is maintained at every stage of product evolution.

Privacy & Compliance
Our approach to privacy follows recognised regional standards, including the New Zealand Privacy Act and Australian Privacy Principles. We only collect the data needed to deliver the service and give customers full control over their information.

Administration Made Simple
Administrators (Librarians) maintain full control of their environment – enforcing multi-factor authentication, managing roles and library permissions, setting retention and download policies, and reviewing comprehensive audit logs to support compliance and oversight.

Menu