Last updated 03/12/2018
What personal data we collect and why we collect it
The information we collect about you may include:
- Your name
- Your contact details
- Your job position
- Details of your systems
- Passwords and other credentials
- Backups of your data
We collect this information only for the purpose of serving your IT requirements.
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
When, why and with whom do we share your information?
Your personal information may be stored at our business location (either our offices or inside a secured data centre) in various forms, usually as an electronic record but sometimes as a paper record or a voice recording.
Electronic records are stored inside a secured database. Passwords and other confidential information are further protected by systems requiring multi-factor authentication.
Backups of our systems may be stored off-site but will be encrypted in transit and at rest and will not leave Australia.
How do we store and protect your personal information?
In general, we do not share your information with any other party.
However it may be necessary to share this information:
- With third parties who work with your practice for business purposes – but only with your prior consent
- When it is required or authorised by law (eg court subpoena)
- For the purpose of confidential dispute resolution process
We will not share your information with anyone (unless under exceptional circumstances that are required by law), without your consent.
How do we access confidential information on your systems?
During the course of our work it is often necessary to access confidential information held on your systems or systems we manage for you.
We will only access private information when it is necessary in the course of our work. We will maintain the confidentiality of any information to which we have access. When practical we will do testing and troubleshooting using dummy data.
Access to your computer systems or systems we manage for you is via a secured system only available to appropriate staff. Each and every access to your systems is logged.
How can you access and correct your personal information at our business?
You have the right to request access to, and correction of, your personal information. We ask that you put this request in an email addressed to email@example.com . We will respond to this request within a reasonable time, usually not more than 7 days.
We will take reasonable steps to correct your personal information where the information is not accurate or up to date. From time to time, we will ask you to verify that your personal information held by our business is correct and current. You may also request that we correct or update your information, and you should make such requests as above.
How can you lodge a privacy-related complaint, and how will the complaint be handled?
We take complaints and concerns regarding privacy seriously. You should express any privacy concerns you may have in writing, either by email to firstname.lastname@example.org or by mail to PO Box 30, RBWH QLD 4029. Please provide contact details including an email address, your mailing address and contact phone number. A manager will deal with your complaint and reply to you within a reasonable time, usually not more than 7 days.
You may also contact the Office of the Australian Information Commissioner (OAIC). Generally, the OAIC will require you to give them time to respond before they will investigate. For further information visit www.oaic.gov.au or call the OAIC on 1300 363 992.
Privacy and our website
Our website uses Google Analytics, a service which transmits website traffic data to Google servers in the United States. Google Analytics does not identify individual users or associate your IP address with any other data held by Google. We use reports provided by Google Analytics to help us understand website traffic and webpage usage.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Policy review statement
This policy will be reviewed annually, or after significant change.