Chocolate Kiwi Limited understands that the confidentiality, integrity, and availability of our customers' information are vital to their business operations and our own success. We use a multi-layered approach to protect that key information, by constantly monitoring and improving our application, systems, and processes to meet the growing demands and challenges of security.
To report security issues or possible abuse, please contact one of our support engineers or send a report to john@chocolatekiwi.com
Chocolate Kiwi Limited has privacy and security-conscious policies that apply to all of our information handling practices.
Chocolate Kiwi Limited's contracts include confidentiality provisions that prohibit us from disclosing customer confidential information, including Customers Content and Personal Data, except under certain narrowly defined circumstances, and when required by law. Customer Content refers to the definition in section 3.2 of our Terms and Service Agreement. Personal Data refers to section 4 of our Privacy Policy. Customer Data includes both Customer Content and Personal Data.
Chocolate Kiwi Limited agrees not to access customer's accounts, regarding Customer Content, except to maintain the service, prevent or respond to technical or service problems, to respond to requests that customer makes, or where required by law.
Chocolate Kiwi Limited agrees not to access customer’s accounts, regarding Personal Data, except to respond to requests that customer makes, to aid us in serving the customer better, or where required by law. For a more detailed overview of how we use customer’s Personal Data please refer to section 5.1. of our Privacy Policy.
Every Chocolate Kiwi Limited employee and contractor must follow Chocolate Kiwi Limited's code of conduct, sign confidentiality agreements, and follow Chocolate Kiwi Limited's information security policies.
For information collected on Chocolate Kiwi Limited's website, Chocolate Kiwi Limited provides assurances around the types of information collected, how that information may be used, and how that information may be shared.
Chocolate Kiwi Limited offers individuals the opportunity to manage their receipt of marketing and other non-transactional communications. Chocolate Kiwi Limited offers individuals the opportunity to update or change the information they provide.
Chocolate Kiwi Limited's comprehensive privacy and security program includes communicating with personnel and customers about current issues and best practices.
Chocolate Kiwi Limited regularly communicates with our personnel about our obligation to safeguard confidential information, including customer data and personal information. Chocolate Kiwi Limited provides training around confidentiality, privacy, and information security for all new employees during its new hire orientation.
Chocolate Kiwi Limited strongly encourages all of our customers and users to adopt industry-standard solutions to secure and protect their authentication credentials, networks, servers, and computers from security attacks. We communicate with our customers about current issues and trends through our website. We email end users about specific security issues when warranted.
Chocolate Kiwi Limited has multiple organisations, teams, and individuals responsible for security and security-related matters. The Chocolate Kiwi Limited security team includes members from multiple teams and is responsible for Chocolate Kiwi Limited's security program and personnel, including information, product, and corporate security, enterprise risk management, and technology audit & compliance. Additionally, all Chocolate Kiwi Limited personnel are required to follow Chocolate Kiwi Limited's confidentiality, privacy, and information security policies
Chocolate Kiwi Limited maintains a comprehensive array of technical measures to protect the Chocolate Kiwi Limited service and offers a robust set of customer-controlled settings to further heighten privacy and security protection.
Application features that protect customer data:
The Chocolate Kiwi Limited service is highly scalable and redundant, and distributed over multiple world-wide regions. It allows for fluctuation in demand and expansion of users while greatly reducing the threat of long-term outages. Load-balanced networks, pools of application servers, and clustered databases are features of our design.
Our service is hosted on Amazon AWS with further security compliance defined on their dedicated security page. https://aws.amazon.com/security/