Security, privacy, and ownership.

Reschematic takes your privacy and data security seriously and is Essential Eight compliant. Read on to better understand how we use and protect your data on our platform.

Data Security & Privacy

Trust as default.

Trust is inherent in everything we do at Reschematic. Your data stays within Australia meaning you can also be confident it is compliant for data residency and security.

Private by defaultAU data residencyNo AI training
  • Australian hosting. Our infrastructure is in Australia (Sydney).
  • You own your models. Content you create remains your IP.
  • Private by default. Unless you share a unique model link.
  • No AI training. Our AI API does not train on your data or IP.
  • Encryption as standard. TLS in transit; secure at rest.
  • Regular backups. Your data is backed up in 5-minute intervals.
Security Snapshot
A quick look at current practices
EncryptionTLS in transit, secure at rest
ResidencyAustralia (Sydney) by default
AccessPrivate by default; least-privilege ops
BackupsRegular 5-min interval backups
Need something specific for procurement? Contact us for a tailored security note.

Cybersecurity

Australian Essential Eight Compliance

Reschematic's cybersecurity framework is right-sized to align with Australia's Essential Eight cybersecurity framework at Maturity Level 1. Explore how we meet each control and what that means in practice.

Read more: ACSC Essential Eight Maturity Model

Patch applications
What ML1 requires

Apply security patches to internet-facing services, browsers and plugins within ML1 timeframes; remove unsupported apps.

How Reschematic addresses it

Regular dependency updates, weekly patch cadence, prompt remediation of critical issues, and deprecation of unsupported packages.

Patch operating systems
What ML1 requires

Apply OS security patches within ML1 timeframes; remove unsupported OS versions.

How Reschematic addresses it

Unattended-upgrades enabled; weekly OS patch window plus out-of-band for critical fixes.

Multi-factor authentication
What ML1 requires

Use MFA for remote/privileged access and important systems and services.

How Reschematic addresses it

MFA enforced on cloud provider, CI/CD, database consoles and other privileged systems; customer MFA at signup and for available for sensitive information where applicable.

Restrict administrative privileges
What ML1 requires

Limit admin privileges to those who need them, use separate admin accounts, and review regularly.

How Reschematic addresses it

Least-privilege across environments; just-in-time access for sensitive actions with auditing; no standing production database admin sessions.

Application control
What ML1 requires

Implement application control to prevent execution of unapproved/malicious executables, scripts and libraries.

How Reschematic addresses it

Only approved services and processes run on our hosts and restricts executive of executables, software libraries, scripts, compiled HTML, HTML applications and control panel applets.

Rescritct Office macro settings
What ML1 requires

Block macros from the internet and only allow vetted macros; prevent untrusted macro execution.

How Reschematic addresses it

We do not use Office macros in any systems; customer documents are never executed; internal policy blocks internet-sourced macros.

User application hardening
What ML1 requires

Disable or remove Internet Explorer 11, no java or web advertisements from the internet, users cannot change web security settings.

How Reschematic addresses it

Our workstations run Apple MacOS and do not include Internet Explorer. We do not run Java. We run adblockers in all browsers, and only admin can change web security settings.

Regular backups
What ML1 requires

Perform regular backups, protect them from compromise, and test restoration.

How Reschematic addresses it

Postgres backups every 5 minutes with point-in-time recovery; AU-region storage; and periodic restore tests.

Trust FAQ

Your compliance questions answered:

Who owns the models built in Reschematic?

You do. Content you create remains your IP; Reschematic provides the platform for you to generate and access them.

Who can access our data?

Models are private by default. Only you and people you send a unique model link to can access them. Operational access is restricted and logged.

Where is data stored?

All Reschematic data is stored in Australia (Sydney). If your procurement requires another region, talk to us.

How is data protected?

We adhere to Essential 8 ML1: TLS in transit, secured at rest, hardened infrastructure, backups in Australia data centres, and least-privilege access.

Do you use our data to train AI models?

No. Data processed via the AI APIs we use do not train third party AI models. But we do constantly refine our own modelling algorithms based on your feedback.

Can you provide a security questionnaire or DPA?

Yes. Contact us and we’ll supply our current pack or execute your standard terms where feasible.

Got any other questions? Reach us at hello@reschematic.com

Want to see it in action?

Book a demo and one of our modeling experts will give you a personalised tour of the platform.