We're sorry but Culturate.ai doesn't work properly without JavaScript enabled. Please enable it to continue.
Level 20, 135 King St, Sydney NSW 2000Privacy Policy
Hero ShapeHome Hero Culturate

Certified information security
practises and implementation

Utilise industry best practise for information security management

Arrow LeftArrow Right
By Design

World-class data ethics and governance

ISO 27001 is the accepted global benchmark for demonstrating your information security management system (ISMS)

  • Loading...


    Encryption at rest and in transit, architecture designed securely, raw data deletion policy

  • Loading...


    Personal information anonymised, date aggregated, sensitive data removed, e.g. emails

  • Loading...

    Positive Impact

    Metrics designed to support positive use cases, must be explainable, reviewed internally


Security by design

Culturate is committed to ensuring that an appropriate level of security is applied to protect the confidentiality, integrity, and availability of its information assets

Culturate has employed a number of practices targeting people, process, and technology in order to ensure an optimum level of information security is maintained

Collectively, these processes are known as the Information Security Management System (ISMS) in alignment with the ISO/IEC27001 (ISO 27001) 2013 Information Security Management System standard

  • Checklist [object Object]ISO 27001 certified
  • Checklist [object Object]Public cloud infrastructure
  • Checklist [object Object]Architecture and data segregation
  • Checklist [object Object]Data encryption
  • Checklist [object Object]Audits
  • Checklist [object Object]Deletion of raw customer data
  • Checklist [object Object]Strong personnel practices
Best practise

Privacy by design

  • Checklist [object Object]Anonymised personal information

    All Personally Identifiable Information is anonymised and encrypted when data is analysed, so insights will never be attributed to a single individual

  • Checklist [object Object]Data aggregation

    All data is aggregated into minimum cell sizes when any insights are visualised or delivered

  • Checklist [object Object]Remove sensitive data

    No email or messaging data will be analysed or used

ISO27001 Badge
Personal sensitive dataPersonal and sensitive data

This is the full data including
personal and sensitive data

  • Culturate Employee ID
  • NameJhon Mark
  • Emailjhon@mail.com
  • Date of birth10/01/1984
  • GenderMale
  • DepartmentSales
  • ReligionChristian
Pseudonymous dataPseudonymous data

Personal information is replaced with pseudonyms and sensitive data is removed

  • Culturate Employee ID
  • NameJhon Mark
  • Emailjhon@mail.com
  • Date of birth10/01/1984
  • GenderMale
  • DepartmentSales
  • ReligionChristian
Alert SecurityAnonymous data

Personal information is replaced with a random ID, only non-sensitive data retained

  • Culturate Employee ID00547
  • Name Jhon Mark
  • Emailjhon@mail.com
  • Age33
  • GenderMale
  • DepartmentSales
  • ReligionChristian
Ethical use cases

Positive impact by design

Data Governance
  • Checklist [object Object]Positive use cases

    All use cases are reviewed to ensure they contribute towards a positive impact. We do not deliver results which would bias against demographic groups

  • Checklist [object Object]Explainable models

    All our artificial intelligence techniques utilise approaches which allow us to have explainable variables rather than a “black box” approach

  • Checklist [object Object]Review process

    All models are peer reviewed by our data science team who have more than 20 years' experience in the industry