Security Policy

Last updated: February 2026

At ReddReports, we take privacy very seriously. We've updated our privacy policy (Policy) to ensure that we communicate to You, in the clearest way possible, how we treat personal information. We encourage You to read this Policy carefully. It will help You make informed decisions about sharing Your personal information with us.

The defined terms in this Policy have the same meaning as in our Terms of Use, which You should read together with this Policy. By accessing our Website and using our Service, You consent to the terms of this Policy and agree to be bound by it and our Terms of Use.

Protecting your data

We're committed to the security of our customers' data and provide multiple layers of protection for the personal and financial information you trust to ReddReports.

You control access

As a ReddReports customer you have the flexibility to invite unlimited users into your account to collaborate on your data, and the person that holds the subscription has control over who has access and what they are able to do. However, our technical staff have full access to your information in order to setup your information database, the data models, reports and dashboard.

User authentication

We provide secure access to the ReddReports software through a login and password.

Data encryption

We encrypt all data that goes between you and ReddReports using industry-standard TLS (Transport Layer Security), protecting your personal and financial data.

Network protection

ReddReports takes a "defense in depth" approach to protecting our systems and your data. Multiple layers of security controls protect access to and within our environment, including firewalls, intrusion protection systems and network segregation. ReddReports security services are configured, monitored and maintained according to industry best practice.

Always There

ReddReports is there when you need it, regardless of the day or time, or where you happen to be.

Best in class availability

With a record of 97% uptime, ReddReports delivers best-in-class availability. We use multiple redundancy technologies for our hardware, networks, data centres and infrastructure. These ensure that if any component fails, ReddReports will keep on running – with little or no disruption to your service.

Built to perform at scale

ReddReports has been designed to grow with your business. Our high performance servers, networks and infrastructure ensure we can deliver quality service to you and our hundreds of thousands of other users.

Disaster recovery and readiness

ReddReports performs real-time data replication between our geographically diverse, protected facilities, to ensure your data is available and safely stored. This means that should even an unlikely event occur, such as an entire hosting facility failure, we can switch over quickly to a backup site to keep ReddReports and your business running. We transmit data securely, across encrypted links.

Constant updates and innovation

We're constantly enhancing ReddReports, delivering new features and performance improvements. Updates are delivered frequently, with the majority of them being delivered without interrupting our service and disrupting users.

Your online safety

We design security into ReddReports from the ground up. However, there can be risks to working and playing online. Whether you're shopping, banking, doing your accounts, or simply checking your email, cyber criminals and scammers are always looking for ways to steal money or sensitive information. There are precautions you can take to reduce the risks and help keep you safe from harm online.

Phishing and malicious emails

A phishing email is a favoured way for cyber criminals to get access to your sensitive information, such as your usernames and passwords, credit card details, bank account numbers, etc. This kind of email may look as if it has come from a trustworthy source, but will attempt to trick you into:

Once you are hooked, the cyber criminal may be able to steal or extort money from you, or gather sensitive personal or business information that they can use for other attacks.

However, you can protect yourself and your business by being aware of these scams, and by knowing what to look for that may help you identify a malicious email:

Try to avoid a phishing attack by following these rules

If you receive a suspicious email make sure you:

This policy may be updated from time to time

ReddReports reserves the right to change this Policy at any time, and any amended Policy is effective upon posting to this Website. ReddReports will make every effort to communicate any significant changes to You via email or notification via the Service. Your continued use of the Service will be deemed acceptance of any amended Policy.