Our PrinciplesWe have a simple approach to data protection and privacy which adheres to the 13 Australian Privacy Principles. Our obligations under the Privacy Act 1988 (Privacy Act):
CollectionWe collect your personal information so that we can provide you with the products, services or information that we supply. Sometimes we collect personal information from a third party or from a publicly available source, but only if you have consented to your information being used in this way, or would reasonably expect us to collect it in this way. We only collect this information from companies or sources that are allowed to disclose it to us. Below you will find a breakdown of the different ways your personal information is collected.
Use and DisclosureWe only use personal information for the purpose which was requested of us, or for the purposes which directly relate to one of our functions or activities. We will not provide your personal information to other entities or bodies, or any other party unless one of the following applies (as per and in line with APP 6 – use and disclosure of personal information):
- You have consented.
- You would reasonably expect, or have been informed, that information of such kind would be passed on to those individuals, entities or bodies (for more information, see subclause 6.2).
- It is otherwise required or authorised by law, or reasonably necessary for the enforcement of a criminal law or of a law imposing a pecuniary penalty, or for the protection of public revenue.
- It may prevent or lessen a serious and imminent threat to somebody’s life or health.
Quality of Personal InformationWe do what we can to keep your personal information up to date and accurate at all times as this allows us to deliver a better service to you. If any information we have for you needs to be corrected, you can contact us via email@example.com.
Data SecurityWe take active steps to protect the personal information we hold against loss, unauthorised access, use, modification or disclosure, and against other misuse. These steps include password protection for all of our IT systems. While we cannot share with you details of our entire security system for safety reasons, if you have any questions, you can always contact us at firstname.lastname@example.org. When no longer required or requested by you, all personal information is destroyed in a secure manner.