Security and trust
Security and trust are fundamental to the platform.
Search Training and Training Wallet are designed for regulated training environments. The goal is practical trust: strong access boundaries, privacy by design, audit-aware structures, and clear responsibility boundaries.
Important wording
This page supports serious evaluation. It communicates security posture and sector awareness without implying certifications or controls that have not been formally achieved.
Security Principles
Access, infrastructure, and trust controls designed for regulated training workflows.
Encrypted connections
All platform traffic uses encrypted connections. Sensitive credential and booking data is never transmitted over unprotected channels.
Role-based access
Access is shaped by platform roles, tenant boundaries, and fail-closed behavior on sensitive routes.
Secure infrastructure
The platform uses separated environments, guarded service flows, and explicit route gating for operational systems.
Privacy by Design
Credentials stay private by default in Training Wallet. Consent remains central to data release and employer sharing. The platform does not expose learner records without explicit learner action.
Compliance Alignment
Search Training is designed for AVETMISS-aware data flows, audit-ready structures, and regulated training support without overclaiming certification status.
Controls for AI-Enabled Workflows
Where AI-assisted tools are used within the platform, the following controls apply:
- Access control: AI components operate under the same role-based access model as the rest of the platform. They cannot access data beyond the scope of the function they serve.
- Encryption: Data passed to or processed by AI components is encrypted in transit (TLS 1.2+) and at rest (AES-256).
- Audit logging: Actions influenced by AI-assisted workflows are logged and attributable to the triggering user or system event.
- Human oversight: No automated AI output causes a material change to user data, access, or account status without a human review step or a clearly defined, auditable rule set.
- Data minimisation: AI-assisted workflows are designed to minimise use of personal information. Where possible, de-identified, tokenised, or minimal data is used.
Regulated environment support
Designed for Regulated Training Environments
The platform is built to support marketplace discovery, provider workflows, credential handling, and operational evidence in a sector where data correctness and audit posture matter.
- AVETMISS-aligned enrolment data flows where applicable
- Credential issuance connected to the broader learner lifecycle
- Employer verification that respects learner consent
- Audit-aware operational structures throughout the platform
Training Wallet
Credential handling in regulated contexts
Training Wallet is designed for the privacy and trust requirements of regulated training. Credentials are private by default. Sharing requires explicit learner action. The platform handles mobile app privacy requirements consistent with App Store and Google Play review expectations.
Responsible Disclosure
If you identify a security concern or vulnerability in Search Training or Training Wallet, please reach out before public disclosure. We take security reports seriously and will respond promptly.
Contact security teamsecurity@searchtraining.com.au