Mobiledock Security

Protecting your information and the information of your supply chain partners is extremely important to us. We know you have questions about how we’re protecting that information, so what follows are details about some frequently requested information about Mobiledock’s information security.

Data Centers

We use Amazon Web Services (AWS) data centers based in Australia to host our systems. They all have SOC2 Type 2 reports and provide all the physical security protection measures you would expect.

For that matter, we place the same security requirements on all third-parties involved in the delivery of the Mobiledock service.

Proper Use

We want to ensure that Mobiledock is used for legitimate business purposes, and that information in Mobiledock can be trusted. We ensure that all users of Mobiledock have acknowledged a set of terms and conditions, which you can find here.

Application Security

We understand that software security is very important. We continuously scan our applications for vulnerabilities, using regularly scheduled dynamic testing.

Passwords are difficult to manage across all the services people may use, and so Mobiledock does not require you to have a separate password to access Mobiledock. Instead, we leverage the security and trust you have in your user authentication and email systems, by granting access to Mobiledock with verification through email or Microsoft Entra ID.

We also:

  • Encrypt all your data in transit using TLS.
  • Have an independent penetration test conducted on an annual basis.

If you identify a vulnerability in our site or services, here’s how to report it to us.

Operational Security

Access to our systems and your data is restricted only to those who need access in order to provide you awesome support.
We also have all the “people security” things you’d expect to see:

  • Background checks for our employees
  • Signed confidentiality agreements
  • Termination/access removal processes
  • Acceptable use agreements.

And we are in the process of obtaining SOC 2 Type II certification, based on our rigorous controls to safeguard your data.

Security is the responsibility of everyone who works for us. We train our employees so that they can identify security risks and empower them to take action to prevent bad things from happening.

Business Continuity/Disaster Recovery

We have redundant, geographically separate data centers so that we can provide consistent services for you. In the event one of our data centers becomes unavailable, we can recover quickly so that you can continue to make bookings and run your business.


You can view our privacy policy here, but needless to say that we believe in the confidentiality of your information. We have a data retention policy, and we stick to it.

If you have more in-depth questions about our security program, contact us.