Security principles

  1. Secure by design.  System and service confidentiality, integrity and availability are planned and managed in a coherent solution.  Access is constrained to authorised users undertaking legitimate actions.
  2. Private by design.  The sensitivity of data is protected throughout the lifecycle of the data.  (See Privacy)
  3. Secure services by design.  Services embrace cloud security principles regardless of the infrastructure design.
  4. Risk management. Overcast will implement security measures based on the needs of clients.
Scroll to Top

This website uses cookies to ensure you get the best experience on our website. To manage cookies, please refer to our Privacy Policy. Please note that you must "accept" the privacy policy to continue using this website. View the Privacy Policy

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.