Compliance & Security

Trust isn't a claim. It's engineered in.

Chasyr is designed to support lawful, fair, secure and auditable payment communications and dispute-resolution workflows — aligned with Australian regulatory expectations and enterprise security standards.

Aligned with ACCC & ASIC RG 96

Operational alignment, not endorsement

Spam Act 2003 controls

Sender ID · consent · unsubscribe

Privacy Act 1988 / APPs

Documented data handling

ASIC-registered Australian company

Operating under Australian law

TLS in transit · encrypted at rest

Industry-standard cryptography

SOC 2 aligned architecture

Certification subject to third-party audit

Regulatory Compliance

ACCC & ASIC Guidance (Australia)

Chasyr is designed to comply with the ACCC & ASIC Debt Collection Guidelines (RG 96) and related consumer protection expectations. Platform workflows, content controls and contact rules are architected to prevent harassment, coercion, misleading conduct or unfair pressure.

  • Reasonable contact limits across SMS, email and voice
  • Permitted contact hours applied consistently across channels
  • Tone and content controls prohibiting threats, misleading statements or emotional pressure
  • Clear identification of sender and purpose in all communications
  • Immediate opt-out handling where applicable
  • Full audit logging of communications for evidentiary review

These controls are mandated through Chasyr practice statements and workflow governance, not left to user discretion. Chasyr does not represent that it is “approved” or “endorsed” by the ACCC or ASIC — the system is operationally aligned with published regulatory guidance.

Electronic Messaging

Spam Act 2003 Compliance

Where electronic messaging is used, Chasyr enforces statutory requirements at the channel layer — they cannot be bypassed by configuration.

  • Sender identification in every message
  • Lawful consent handling (including B2B implied consent)
  • Simple, immediate unsubscribe mechanisms
  • Restricted message frequency controls

Privacy

Australian Privacy Principles (APPs)

Chasyr's data handling aligns with the Australian Privacy Act 1988 and APPs.

  • Collection limited to legitimate business purposes
  • Secure storage and controlled access
  • User rights to access relevant records and communication logs
  • Separation of case data and strict role-based permissions

All personal and business information captured through the platform is handled under documented privacy and security controls.

Corporate Status

Australian Entity

Chasyr is operated by an ASIC-registered Australian company, conducting business under Australian law and jurisdiction.

Security Architecture

Encryption & Data Protection

Chasyr uses industry-standard encryption to protect data across invoices, payment records, communications and evidence exports.

  • Secure HTTPS/TLS for data in transit
  • Encrypted storage for sensitive records
  • Tokenised, time-limited access links
  • Prohibition on insecure attachments and executable files

Evidence Integrity

Evidence-Grade Audit & Integrity Controls

Chasyr is built for disputes, which means evidence integrity is non-negotiable.

  • Immutable, append-only logging of actions and communications
  • Timestamped records aligned with authoritative system time
  • Tamper-evident storage of agreements, transcripts and payment confirmations
  • Structured “Export All Evidence” artefacts suitable for legal proceedings

No administrator or user can quietly alter historical records.

AI Governance

AI Governance & Containment

Chasyr uses AI as a controlled advisory and execution layer, not as an autonomous decision-maker.

  • AI operates only within predefined workflows
  • No autonomous negotiation, enforcement or legal interpretation
  • Explicit human authorisation gates for critical actions
  • Mandatory disclosure and escalation to humans where required
  • Full retention of AI-generated transcripts and decisions

This governance model ensures AI enhances trust and efficiency without compromising legal or ethical standards.

Enterprise Standards

SOC 2 Alignment

Chasyr's architecture and operational controls are aligned with SOC 2 Trust Services Criteria — Security, Availability, Confidentiality and Processing Integrity.

  • Role-based access control
  • Comprehensive audit logging
  • Change-control and release governance
  • Evidence retention policies
  • Continuous system monitoring

Formal SOC 2 certification is a third-party audit process. Chasyr does not claim certification unless and until an external SOC 2 report has been issued.

A Compliance-First Platform

Chasyr is purpose-built for situations where accuracy, fairness, security and evidentiary integrity matter. Compliance, security and governance are not optional features — they are constitutional characteristics of the platform.

Information on this page is general in nature and does not constitute legal advice. Regulatory references, including ACCC/ASIC RG 96, the Spam Act 2003, the Privacy Act 1988 and SOC 2 Trust Services Criteria, are described as alignment objectives — not certifications or endorsements.