Client Data Security Statement
Your data is stored in a Client Relationship Management software (CRM) called Adviser CRM. Below is an explanation of how and where your data is stored. If you have questions about this statement, please contact your financial adviser directly. Adviser CRM is a technology partner of Zoho Corporation and Adviser CRM is hosted on their Developer Platform. One of the driving factors to partner with Zoho was the infrastructure and security they provide. Adviser CRM is not Zoho CRM.
How secure is your information
We take data security very seriously and being certified for industry standards was a critical consideration when we looked for a Partner. They have certified standards such as ISO27001:2013 and SOC 2 Type II. They have also taken steps to implement appropriate administrative, technical & physical safeguards to prevent unauthorised access, use, modification, disclosure or destruction of information.
If you have any concerns regarding the security of your data, we encourage you to email us at support@advisercrm.co.nz
INTERNATIONAL CERTIFICATIONS
Adviser CRM is built on a secure and reliable platform, that meets the highest industry security standards.

SOC2 Certification
For SOC 2, AICPA has defined five Trust Services Criteria (TSC) that service organizations can choose to meet: Security, Availability, Processing Integrity, Confidentiality, and Privacy. All SOC 2 reports must cover Security.
Once the TSCs have been chosen, the service provider must define controls to ensure that those criteria are met. For instance, to meet the Security criterion, a service provider might define a control that requires access to all sensitive internal systems to be protected by multi-factor authentication.
There are also 02 types of SOC report: Type I and Type II.
- A SOC 2 Type I report is a point-in-time report - detailing the systems, tools, and strategies you have in place for keeping customer data secure at a single point in time.
- SOC 2 Type II report, on the other hand, measures and reports on the effectiveness of a vendor’s security controls over time (generally at least 06 months). To issue a Type II report, a CPA firm not only assesses the design and implementation of a vendor's controls but also evaluates whether the controls were operating effectively over the entire audited period.
What Is SOC2?
SOC stands for "System and Organization Controls", and is a framework governed by the American Institute of Certified Public Accountants (AICPA). It’s the leading industry standard when it comes to security compliance and the most commonly required and accepted way to demonstrate security when conducting business. SOC2 report assures customers, partners and investors that a business has a solid baseline of security and data protection guidelines in place.

ISO/IEC 27001:2013
ISO/IEC 27001:2013 is an international standard for establishing, implementing, maintaining, and continually improving an Information Security Management
System (ISMS)
It was published jointly by the International Organisation for Standardisation (ISO) and the International Electrotechnical Commission (IEC).
What it Does
ISO 27001:2013 provides a structured framework to help organizations:
Identify information security risks
- Implement appropriate security controls
- Protect sensitive information (e.g., customer data, intellectual property, financial data)
- Continuously monitor and improve security practices
- Implement appropriate security controls
- Protect sensitive information (e.g., customer data, intellectual property, financial data)
- Continuously monitor and improve security practices
Key Features
Annex A controls – Contains a list of 114 security controls (in the 2013 version) across areas such as access control, cryptography, physical security, and incident management.
Risk-based approach – Organisations must assess risks and apply controls based on those risks.
Annex A controls – Contains a list of 114 security controls (in the 2013 version) across areas such as access control, cryptography, physical security, and incident management.
Continuous improvement – Follows the Plan–Do–Check–Act (PDCA) cycle.
Certification
Organisations can be formally certified by an accredited certification body after undergoing an audit to verify compliance with the standard.
Important Note
ISO/IEC 27001:2013 has been superseded by ISO/IEC 27001:2022, which includes updated controls and structural changes. Organisations certified to the 2013 version were required to transition to the 2022 version within the official migration period.
