<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.castlepoint.systems</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/resources/blog</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/resources/case-studies</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/checkout</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/about-us/clients</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/resources/community-guidelines</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/contact</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/resources/faqs</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/resources/media</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/order-confirmation</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/about-us/our-story</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/paypal-checkout</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/pricing</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/resources/privacy</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/resources/modern-slavery-statement</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/trends-in-infosec</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/ca</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/uk</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/check-up</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/nz</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/sg</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/a-case-study-in-automated-records-management</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/a-federal-government-case-study</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/a-guide-to-managing-risk-with-data-mapping-and-ethical-ai</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/ai-explainability-for-defensible-decision-making-the-ultimate-checklist</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/ai-innovation-for-public-safety-castlepoints-success-with-hatch-dimension-x-singapore</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/ai-readiness-bridging-data-culture-and-innovation</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/ai-systems-are-only-as-strong-as-the-data-behind-them-heres-how-to-protect-it</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/are-freedom-of-information-requests-increasing</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/article-ai-about-more-than-just-harnessing-technology</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/asd-and-the-problem-to-the-solution</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/australian-founder-challenges-global-approach-to-ai-regulation-startups-resisting-ai-compliance-are-doomed-to-fall-behind</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/australian-government-cant-afford-to-get-data-wrong-especially-now</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/automated-security-labelling-with-microsoft-purview</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/boosting-services-exports-with-dfat</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/building-trust-in-the-public-record-the-new-policy-for-government</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/can-you-do-good-records-management-if-you-dont-do-good-security-management</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/castlepoint-earns-prov-tick-for-vers-3---trusted-by-victorian-government-agencies</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/castlepoint-government-momentum-media-release</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/castlepoint-has-a-successful-first-round-of-anu-interns</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/castlepoint-is-a-finalist-for-the-regtech-association-awards-2020</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/castlepoint-launches-new-purview-integration-to-strengthen-global-data-governance</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/castlepoint-named-in-australias-top-100-innovators-for-2023</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/castlepoint-systems-named-state-finalist-in-telstra-best-of-business-awards-2023-for-embracing-innovation</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/chatgpt-algorithms-and-ethical-ai</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/chatgpt-and-the-cyber-risk-you-havent-though-of</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/circular-reference-broken-between-afda-and-ism</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/critical-industries-and-the-risk-management-program</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/cui-cmmc-and-the-modern-defense-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/current-challenges-for-ethical-ai-adoption-in-the-united-kingdom</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/data-governance-for-generative-ai-insights-from-parker-lawrence-growth-advisory-and-castlepoint</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/data-minimisation-the-key-to-managing-the-impact-of-a-breach</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/dc2020-failures-confirmed-by-anao</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/discouraging-breaches</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/elementor-1313</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/elementor-2013</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/explainable-ai-xai-and-new-laws-for-data-governance</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/government-ai-adoption-the-gap-between-ambition-and-reality</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/higher-education-and-records-governance-managing-the-risks</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/how-can-we-handle-regulatory-change</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/how-new-zealand-can-meet-the-compliance-challenge-in-government-recordkeeping</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/how-to-stay-safe-from-compliancevirus</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/information-protection-and-privacy-doing-just-enough-is-no-longer-good-enough</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/interview-with-ceo-rachael-greaves</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/is-musks-twitter-safe-and-should-organisations-reconsider-its-use</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/legal-holds-what-are-the-actual-requirements</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/leveraging-metadata-and-ai-to-extract-value-from-data</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/limitations-of-records-management-in-microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/machine-learning-giving-us-all-a-bad-name</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/mechanical-turks</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/more-case-studies-with-federal-government</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/office-365-retention-labels-can-it-work</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/overcoming-complexity-with-ai-powered-information-classification</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/press-release-castlepoint-systems-wins-isaca-innovation-solutions-award</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/public-health-organisation-partners-with-castlepoint-systems</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/records-and-risk-management-in-box-with-autoclassification-2</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/records-management-of-confluence-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/robodebt-and-the-death-knell-of-the-draft</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/statement-from-the-director-general-of-the-national-archives-of-australia</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/supplying-to-defense-your-obligations-for-cui-security</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/the-broken-promises-of-records-management</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/the-call-is-coming-from-inside-the-house</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/the-critical-challenge-of-effective-recordkeeping-in-government</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/the-imminent-retirement-of-m365-records-management-and-the-hidden-costs</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/the-inevitability-of-automation</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/the-inextricable-link-between-pii-and-cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/the-information-management-lessons-of-2022</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/the-new-government-ethical-ai-principles-and-what-they-mean-for-information-management-automation</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/the-proposed-requirement-to-screenshot-whatsapp-messages</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/the-risks-of-relying-on-making-a-record</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/the-whole-of-government-data-strategy-sharing-versus-protecting</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/turning-a-corner-in-place-management-is-here-to-stay</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/turning-check-up-into-capability-how-agencies-can-lift-maturity</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/understanding-dora-compliance</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/we-risk-losing-a-generations-worth-of-archives</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/what-can-we-learn-from-the-deletion-of-millions-of-police-records</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/what-do-financial-services-need-to-know-about-cyber-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/what-happens-if-we-cant-find-our-documents</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/what-happens-when-you-get-rid-of-all-your-records-managers</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/what-is-a-record-and-who-gets-to-decide</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/what-is-a-record-anyway</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/what-the-2024-25-asd-cyber-threat-report-reveals-about-australias-cyber-future</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/why-a-creaky-edrms-poses-a-significant-business-risk</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog/women-in-fintech-powerlist-2022</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/audit</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/automation</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/compliance</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/edrms</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/feature-new-zealand</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/feature-singapore</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/financial-services</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/government</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/higher-education</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/news</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/records-management</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/risk-management</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/blog-post-categories/security</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/team/rachael-greaves</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/platform/audit</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/platform/cyber-security</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/platform/discovery</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/platform/generative-ai</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/platform/privacy</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/platform/records-management</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/afma-case-study</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/ai-driven-data-control-for-local-government</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/ai-powered-data-governance-for-a-government-health-agency</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/ai-powered-data-governance-secures-critical-water-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/ai-powered-discovery-in-a-fully-disconnected-environment</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/archival-appraisal-for-an-environment-agency</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/automated-security-classification-of-financial-data-for-a-wealth-management-office</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/charles-darwin-university</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/cloud-transformation-for-a-government-financial-security-agency</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/commonwealth-treasury</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/data-governance-for-a-national-defence-support-provider</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/dynamic-information-asset-register-for-a-government-agency</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/enterprise-records-governance-for-a-national-law-enforcement-agency</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/establishing-regulatory-leadership-with-a-vocational-training-regulator</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/explainable-ai-autoclassification-of-financial-data-for-a-government-financial-management-office</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/fortifying-national-broadband-infrastructure-with-ai-powered-data-governance</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/governance-from-day-one-federal-government-agency</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/how-a-critical-infrastructure-program-achieved-compliance-without-compromise</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/how-a-large-insurer-deployed-ai-data-compliance-at-scale</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/how-a-leading-fund-manager-automated-record-compliance-and-protected-member-data</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/how-an-asx-listed-property-group-scaled-data-minimisation-for-corporate-compliance</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/legacy-complexity-to-lifecycle-clarity-for-a-longstanding-government-department</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/local-government-scales-compliance-across-complex-data-estate</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/machinery-of-government-change-for-an-agricultural-department</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/managing-data-of-vulnerable-persons</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/managing-hybrid-records-classification-for-a-government-agency</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/nationwide-health-system-unifies-records-governance-with-ai-powered-oversight</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/protecting-and-preserving-critical-records-for-leading-trust</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/protecting-sensitive-digital-records-for-an-online-safety-regulator</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/radford-college-compliance-for-schools</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/replacing-manual-information-asset-register-with-dynamic-ai-driven-compliance</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/resources-anu-case-study</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/resources-child-abuse-case-study</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/south-east-water-pii-discovery-project-defends-against-increased-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/state-government-department-compliance-for-shared-services</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/those-24hrs-after-a-data-breach</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/success-stories/waikato-regional-council-creates-future-proof-compliant-data-network</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/solutions/ai</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/solutions/audit</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/solutions/cyber</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/solutions/legal</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/solutions/privacy</loc>
    </url>
    <url>
        <loc>https://www.castlepoint.systems/solutions/records</loc>
    </url>
</urlset>