提示某些子页面不提供中文版本(包括法律文件)。
OOHAi Public Security Overview
Effective Date: January 5, 2026
Last Updated: January 5, 2026
This Security Overview describes the measures OOHAi Pty Ltd uses to protect information
across its platforms and services.
It should be read together with the OOHAi Global Privacy Policy and relevant service specific
privacy notices.
1. Security Approach
OOHAi applies a security by design approach across its technology stack.
Security controls are integrated into system architecture, software development, device
management, and operational processes.
Our objective is to protect confidentiality, integrity, and availability of information while
supporting reliable platform operation.
2. Scope
This Security Overview applies to OOHAi advertising and display systems, advertiser and
device owner platforms, rideshare rider and driver applications, backend services and
infrastructure, and support and operational systems.
3. Data Protection Measures
3.1 Encryption
OOHAi uses encryption to protect data in transit using industry standard protocols and at
rest where supported by the underlying infrastructure.
3.2 Access ControlOOHAi restricts access to systems and data through role based access controls, least
privilege principles, and segregation of environments where appropriate.
Access rights are reviewed and adjusted as roles change.
3.3 Authentication and Account Security
OOHAi platforms use secure authentication mechanisms, credential management controls,
and session management protections.
Users are responsible for maintaining the confidentiality of their account credentials.
4. Secure Development and Operations
OOHAi applies secure practices across development and operations, including controlled
deployment processes, code review and testing, monitoring of system health and
performance, and logging of security relevant events.
5. Device and Infrastructure Security
For vehicle mounted and in car devices, OOHAi applies secure device provisioning,
controlled software updates, and monitoring of device status and integrity.
Backend infrastructure is hosted with established cloud service providers that implement
recognised security standards.
6. Incident Response
OOHAi maintains procedures to identify, assess, and respond to security incidents.
These procedures include incident detection and escalation, containment and mitigation
steps, investigation and remediation, and notification where required by law.
OOHAi’s incident response processes are aligned with applicable regulatory requirements,
including Australian data breach notification obligations.
7. Third Party Risk Management
OOHAi engages third party service providers to support platform operations, such as cloud
hosting, payment processing, and communications.OOHAi takes reasonable steps to ensure that third parties are selected based on security and
reliability considerations and are subject to contractual confidentiality and security
obligations.
8. Business Continuity and Availability
OOHAi designs systems with availability and resilience in mind.
Measures may include redundancy in critical components, monitoring and alerting, and
backup and recovery processes appropriate to the service.
9. Compliance and Assurance
OOHAi aligns its security practices with recognised international standards and
frameworks.
While OOHAi may reference readiness or alignment with standards such as ISO 27001 or
SOC 2, this document does not constitute a certification claim.
10. Continuous Improvement
Security is an ongoing process.
OOHAi regularly reviews and improves its security controls in response to changes in
technology, operational experience, emerging threats, and regulatory developments.
11. Contact
For security related questions or reports
Email: support@oohai.com.au
Status
This Public Security Overview is intended for informational purposes and does not replace
contractual security obligations.