Security Policy

Application Security & Privacy Framework

At Lovestock & Leaf, the privacy and security of applications we develop and 3rd party Software as a Service cloud solutions we implement is of critical importance. A key component of all of our business critical development projects is to map out the security risks involved in handling client data and to ensure that the necessary processes and software are implemented to protect data from unauthorised access or loss. The level of security required will depend on the specific requirements of the business and data sensitivity, however at a minimum we consider and adhere to as necessary the following application security protocols.

Lovestock & Leaf - App Security - Responsible Disclosure Policy.pdf

EU Data Protection - GDPR Compliance

Lovestock & Leaf has always had a strong commitment to privacy, security, compliance and transparency. This approach includes compliance with EU data protection requirements, including those set out in the General Data Protection Regulation (“GDPR”), which replaced the EU Data Protection Directive (also known as “Directive 95/46/EC“) and became enforceable on May 25, 2018.

For more details on our GDPR Policy, please refer to our app licence agreement.

Encryption – Secure Socket Layers – (SSL)

As best practice for implementing security for web applications, SSL is always used as the base security layer, meaning that anything communicated over the web is encrypted with enterprise grade cryptographic protocols. By using SSL, all sessions to your application are encrypted and end-customers/users are directed to a secure HTTPS site. (e.g

Compliance with Information Privacy Principles

Working as an agency on behalf of our clients, we are always cognisant of the overarching 10 point privacy principals detailed in the Australian Privacy Act 1988. These privacy principles summarise the requirements of the Privacy Act of 1988. The principles are to be followed by companies that collect personal information from their own customers. Any web solution we develop that collects such customer data therefore must consider how these elements apply and what security measures need to be put in place for the project at hand.

Click here to view our latest Privacy Policy

Remote Authentication/Single-Sign-On (SSO)

At L&L, we are specialists in designing and configuring remote authentication and SSO solutions to securely sign in users seamlessly from one application to another. Specifically, we develop solutions for integration of multiple SaaS applications as well as utilising API frameworks to securely pass data between separate applications.

Data Access & Retrieval

One of the key criteria we use in selecting a SaaS solution for our clients is to ensure that the client's data, although hosted externally can be retrieved upon request and easily exported from the application for ongoing data backup and client use.

Intrusion Detection / Prevention

Our network is gated and screened by highly powerful and certified Intrusion Detection / Intrusion Prevention Systems. All security alerts are then centrally logged and tracked by security professionals

Multi-Factor Authentication

All systems used by Lovestock & Leaf require at least two or more forms of authentication provided during the initialization of each session. This ensures an greater level of security through the prevention of

Zero Knowledge Encryption

Lovestock & Leaf can provide clients with solutions built with end to end encryption (both at rest and in transit). Zero knowledge encryption ensures complete privacy and security for end users and security compliance by ensuring that only the end user can decrypt their own data.


Lovestock & Leaf maintains full audit logs on all our services and systems to ensure complete auditability in the unlikely event of a security breach. Infrastructure audit logs are archived indefinetly offsite in a secure facility and secured using role based multi factor authentication to ensure the highest level of integrity.


All Lovestock & Leafs' services are protected using sophisticated firewalls which maintain a secure perimeter. This provides full firewall protection that conceals the architecture of the internal networks from the outside world including protection against attacks.