Farm Data Policy
AgriAudit’s data handling approach is primarily focused on the management of Farm Data relating to farm business operations, compliance, assurance, and audit readiness.
This includes farm business information, operational records, environmental and sustainability records, and audit evidence uploaded by AgriAudit users.
AgriAudit processes this Farm Data solely to deliver the services requested by the farmer, ensuring transparency, farmer control, and appropriate use at all times.
Consent-Based Storage: Data is only stored with the user’s consent and used solely for its intended purpose.
User Control: Farmers have full control over their data, including the ability to edit or permanently delete records at any time.
Permanent Deletion: When a farmer chooses to delete their account, all associated files and records are fully and permanently removed from our system, with no residual data retained.
Authentication & Access Security
OAuth 2.0 Authentication: We use industry-standard OAuth for secure user login.
This ensures:
- No passwords are stored or exposed directly.
- Access tokens are securely managed.
- User access is role-based and permission-controlled, reducing the risk of unauthorised access.
At-Rest Encryption: All stored data is encrypted to prevent unauthorised access.
In-Transit Encryption: We use Secure Sockets Layer (SSL) / Transport Layer Security (TLS) to secure communication between users and the platform, ensuring data cannot be intercepted or tampered with during transmission.
Security Infrastructure / AWS EC2
Our platform is hosted on Amazon Web Services (AWS) EC2, leveraging AWS’s robust, enterprise-grade security features:
- Secure Physical Infrastructure: AWS data centres meet ISO 27001, SOC 1/2/3, and PCI DSS compliance standards.
- Firewalls & Access Control: Our EC2 instance is protected by AWS Security Groups, which restrict access to authorised traffic only.
- Automated Patching & Monitoring: AWS provides automatic security updates, continuous monitoring, and AI-driven threat detection to guard against cyber threats.
Updated: 20/12/2025