Our data comes from official, verifiable sources. For example, all Australian trade mark information comes directly from IP Australia.
When you search with us, we aggregate data from the various official government registers, analyse it and present it to you in a way that actually makes sense.
In some cases, we use third-party services to retrieve the information, but the data itself is the official information that you'd get if you went each register directly.
For each search you run, we give you evidence of the search. We'll also give you the evidence of the search in the form of PDF search reports, extracts or screenshots from the register itself.
For example, a trade mark search is accompanied with an IP Australia Search Report; and a PPSR search comes with search certificates from the PPSR.
Our information is only as current as our sources. As most of the information we provide is derived from third-parties, we can't guarantee it's free from errors. Accordingly, we make no representation or warranty that the information provided by third-parties is reliable, adequate, current, accurate or complete.
Your search data is yours. DDLoop does not use or share your data for purposes other than conducting the searches you request and to make sure we're giving you the best services possible.
We use third-party services (for example, Google or the Australian Business Register) to conduct searches. Your searches are governed by the terms and conditions of those third-party services.
DDLoop is securely hosted in industry-leading data centres operated by Amazon Web Services (AWS). Our ISO27001 aligned Information Security Program covers all aspects of our business: from the technologies we use to the people we hire.
Our servers and data localisation policy keeps your data securely stored in Australia. Our production servers are hosted with Amazon Web Services (AWS) and Digital Ocean in NSW.
All data is enrypted in transit and at rest.
Data at rest is encrypted in the DDLoop production databases using the industry standard AES-256 encryption algorithm.
Data in transit uses TLS 1.2 or greater with a limited set of modern secure ciphers enforced. Security headers are applied to all production endpoints where possible.
We know the drill. We're happy to look it over and give you an ETA on getting it filled out for you. Reach out to request more details.