MinterEllison's Security Program
MinterEllison takes IT and cybersecurity seriously and will continue to undertake several important operational and strategic Information Security initiatives across the firm.
MinterEllison's Information Security Program aims to:
-
Develop and implement the Information Security Policy which underpins the controls, standards and guidelines for all aspects of security to protect and assure availability of all MinterEllison's and its clients' information, data and systems.
-
Monitor and strengthen MinterEllison's information security practices that ensures that all sensitive information is protected from inadvertent disclosure, fraud, misappropriation, misuse, sabotage or cyber threats.
-
Ensure the integrity and accuracy of all MinterEllison electronic information systems and to prevent damage or loss to Minter Ellison information, its operations and client information.
-
Report and maintain MinterEllison's security posture against policy, risk and compliance to industry best practices.
Compliance



Documents & Policies
System Security
Audits & Reports
Human Resource Security
Data Security
Application Security
Supply Chain Security
Legal | Privacy
Access Control
Infrastructure
Endpoint Security
Network Security
Corporate & Physical Security
Security Policies
Security Grades

Trust Center Updates
Published on 21 November 2023
MinterEllison is aware of the recent CitrixBleed vulnerability that has been making headlines. We want to assure you that the security of our systems and the protection of your data is our top priority.
We have taken immediate action and have successfully patched our systems against this vulnerability.
We will continue to monitor the situation closely and take necessary actions as required to ensure the highest level of security for the data in our environment.
Published on 14 June 2023
MinterEllison is aware of the latest MOVEit vulnerabilities. We do not utilise the MOVEit software in our operations and are not affected by it. We are monitoring the situation closely across our environment including third party suppliers.
If you think you may have discovered a vulnerability, please send us a note.