Henoyo.Here. Now. Yours.
AUSTRALIA

Keep the AI layer inside the controls you already run in Australia.

In Australia, "data sovereignty" is usually shorthand for a bundle of concerns, not one statute. Privacy Act obligations. Australian Privacy Principles. Cross-border disclosure under APP 8. Notifiable Data Breaches. Consumer Data Right in regulated sectors. Government hosting expectations. Procurement questions about offshore support access. Henoyo is designed to keep that answer simple. The software deploys into your own AWS or Azure account, under your IAM and security boundary. If your organisation already runs in AWS Sydney or Azure Australia East, Henoyo can run there too. Your logs, secrets, and control plane stay in your environment. Your existing APP-aligned controls, retention rules, and access-review processes can continue to apply.

At a glance

  • Sovereign-by-architecture: deploys in AWS Sydney or Azure Australia East
  • APP 8 cross-border transfer questions become trivial — there is no transfer
  • NDB-scheme evidence trail built in
  • State and territory data sovereignty satisfied because data never leaves your account

APP 8 and cross-border disclosure.

For many Australian buyers, APP 8 is the first real pressure point. If personal information is disclosed overseas, what accountability follows? What due diligence is required? What contractual and technical safeguards exist? AI tools often create this problem by default because the product itself is hosted offshore and the customer has little visibility into where data goes next.

Henoyo reduces that uncertainty. The application runtime sits in your own AWS or Azure account, in the region you choose. You can keep the primary AI application layer in Australia if that is the policy requirement. Cross-border analysis may still be needed depending on the model provider or sub-processors you enable, but the architecture avoids creating an unnecessary second perimeter outside your control. That is a materially better starting point for APP 8 review.

APP 11 and reasonable security steps.

APP 11 requires organisations to take reasonable steps to protect personal information from misuse, interference, loss, and unauthorised access, modification, or disclosure. In practice, security teams want to see concrete controls, not only policy language.

Henoyo provides those controls at the application layer. Field-level masking uses AWS Comprehend on AWS or Microsoft Presidio on Azure before data reaches the model. Structured tokenization replaces values with ephemeral handles stored with a 15-minute TTL in DynamoDB or Cosmos DB. Prompt-injection defenses help prevent unsafe tool invocation and data leakage. Immutable audit records every run and can be exported to CSV, S3, or Splunk. Those are the kinds of technical measures Australian privacy and security teams expect to see when they ask how an AI system is actually governed.

Data sovereignty is also a procurement and government question.

Australian enterprises, universities, and public-sector-adjacent organisations often use "sovereignty" more broadly than the Privacy Act alone. They may need local hosting, local control of keys, restricted support access, or alignment with cloud environments already used in government or regulated settings. Some buyers will ask about IRAP-assessed environments or hosted government cloud concerns even if the project itself is not a government deployment.

The right answer here is careful, not inflated. Henoyo is designed to run inside your own AWS or Azure account, including Australian regions such as AWS Sydney or Azure Australia East, under your own IAM and security controls. Customers already operating in APP-aligned, regulated, or government-sensitive environments can extend those controls to the AI layer. Henoyo itself does not claim a government certification or assessment it does not have.

Consumer Data Right and sector-specific sensitivity.

In sectors touched by the Consumer Data Right or other sectoral obligations, the issue is often not whether AI is allowed. It is whether the organisation can prove that access, use, and disclosure stayed within the rules of the program. That requires more than a chatbot. It requires a governed application layer.

Prompts, Skills, Data Context Mappings, Agents, and Audit give you that structure. A Prompt can be limited to the exact fields needed. A Skill can be restricted to approved users or channels. Audit can show what happened. That matters in financial services, energy, and other sectors where data handling needs to be demonstrable, not merely asserted.

Breach notification and operational readiness.

Australia's Notifiable Data Breaches regime means organisations need to know when something happened, what data was involved, and how quickly they can investigate. AI systems become a problem when they are opaque. If a user pasted data into an unmanaged tool, the investigation starts with guesswork.

Henoyo is designed to avoid that opacity. The system runs in your own environment. Audit records runs and actions. Access is governed by your IAM. Logs can be exported into your existing monitoring and incident-response stack. That does not replace your own breach-assessment obligations, but it gives security teams a much better evidentiary base when they need to act quickly.

Australian privacy law continues to evolve — the Privacy and Other Legislation Amendment Act 2024 introduced a statutory tort for serious invasions of privacy and expanded children's privacy protections, and more reforms are expected. Customers should assess this architecture against current Privacy Act provisions and any sector-specific rules that apply to their environment.

RequirementHow Henoyo addresses it
APP 8 cross-border concernsCustomer-region deployment and customer choice over sub-processors
APP 11 security obligationsMasking, tokenization, prompt-injection defenses, immutable audit
Government and procurement concernsCustomer-cloud deployment, customer IAM, no standing access for Henoyo
Consumer Data Right and sectoral governancePinned Data Context Mappings, permissioned Skills, exportable evidence
NDB breach readinessAudit as a control plane and logs that can flow into your own incident-response environment

Australian obligation to product mechanism.

APP 8 cross-border concerns map to customer-region deployment and customer choice over sub-processors. APP 11 security obligations map to masking, tokenization, prompt-injection defenses, and immutable audit. Government and procurement concerns map to customer-cloud deployment, customer IAM, and no standing access for Henoyo. Consumer Data Right and sectoral governance concerns map to pinned Data Context Mappings, permissioned Skills, and exportable evidence. NDB breach readiness maps to audit as a control plane and to logs that can flow into your own incident-response environment.

Request more detail

Need a specific compliance questionnaire, a signed DPA, or a technical architecture review? We typically respond within one business day.