ICT Security Pty Limited takes your privacy very seriously. The following policy explains how ICT Security Pty Limited protects your privacy and how the personal information you provide is used by ICT Security Pty Limited. ICT Security Pty Limited is bound by the Privacy Act 1988 and in particular within National Privacy Principles in the Privacy Act.
We do not disclose any personal or billing information such as contact or account information provided to us by you or your company. ICT Security Pty Limited encourages you to read this Policy in its entirety and contact us with any questions that you may have. Our Contact information is available at https://www.ictsecurity.com.au/contact-us/.
There are two types of information collected; Personally Identifiable Information and Non-Personally Identifiable Information.
a) Personally Identifiable Information (“personal information”) is information that identifies you as an individual, such as your name, mailing address, email address, contact details and, if necessary, your credit or debit card numbers and other billing information. We may obtain credit information about you from a credit reporting agency or from a credit provider.
As a general rule we do not collect personal sensitive information. Personal sensitive information is only obtained when you voluntarily provide the information to us. ICT Security Pty Limited uses personal sensitive information for validation and to provide you with better service.
As Visitors navigate or interact with ICT Security Pty Limited’s Web sites, ICT Security Pty Limited may also automatically collect information through the use of commonly-used information-gathering tools, such as cookies and Web beacons.
b) Non-Personally Identifiable Information (“non-personal information”) is information that does not identify you as an individual, such as your browser type, IP Address, the URL of the previous web site you visited. ICT Security Pty Limited may automatically collect certain types of non-personal information from you when using www.ictsecurity.com.au. We may also collect non-personal information that you voluntarily provide, such as information included in response to a questionnaire or survey.
Third Party Tracking
A cookie is a small piece of information sent by a web site that is saved on your hard disk by your computer’s browser.
Our uses of “cookies” are limited to the following specific situations. The first situation is with respect to temporary cookies. There are two instances in which we use temporary cookies. First, if you are accessing our services through one of our forums sections our Web server may automatically send your browser a temporary cookie, which is used to help your browser navigate our site. The only information contained in these temporary cookies is a direction value that lets our software determine which page to show when you hit the back button in your browser. This bit of information is erased when you close your current browser window. Second, if you log into an access-controlled section of our site, we set a temporary session cookie to establish that you have been authenticated. If you choose not to accept a temporary cookie, you will not be able to navigate in the access-controlled section of the site.
Customer Testimonials, Comments, & Reviews
We may post Customer testimonials, comments, and reviews on our Web sites, which may contain Personal Information. We do obtain the Customer’s consent via email prior to posting the testimonial, in order to be able to post their name along with their testimonial. If You wish to update or delete Your testimonial, you can contact us at email@example.com.
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. You may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Targeting or Advertising Cookies
ICT Security Pty Limited uses targeting and advertising cookies for marketing purposes, but only with respect to our public-facing Web sites, and not with respect to our production environment Service. You may opt out of behaviourally-targeted ads anytime by deleting your browser’s cookies.
Third Party Services
Opt out of all cookies
How We Use and Disclose Your Personal Information
We may use your information in accordance to:
a) assess any application by you for services and goods to be provided by us.
b) collect payments that are overdue in respect of any services and goods provided by us.
c) provide the services and goods to you (including the investigation or resolution of disputes relating to any services and goods provided to you).
We may disclose your personal information to:
a) third parties such as our service providers. For example, ICT Security Pty Limited may share personal information with third parties to perform services such as processing credit card payments.
b) appropriate government agencies or individuals appointed by a government such as (ACA) responsible for the investigation and resolution of disputes or complaints concerning your use of the services for the purpose of enabling investigation and resolution of those disputes or complaints.
In certain situations, ICT Security Pty Limited may be required by law enforcement or judicial authorities to provide personal information to appropriate governmental authorities. We will disclose personal information upon the receipt of a court order, subpoena, or to cooperate with a law enforcement investigation.
We may also use or disclose your personal information if we believe such actions is necessary in order to:
a) protect or defend our legal rights in our property or our users;
b) assist in investigate, prevent or take actions regarding other unlawful activities;
c) assist in suspected fraud situations;
d) assist in recovery of lost or stolen equipment;
e) lessen or prevent serious threats to an individual’s life, health or safety, or to public health or safety potential threats to the physical safety of any person.
Information Shared with Other Entities
How Long We Retain Your Data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognise and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
Where We Send Your Data
How to Correct Information
How we protect your data
The security of ICT Security Pty Limited’s and Our third party providers’ infrastructure is a critical priority for ICT Security Pty Limited, and We implement safeguards designed to protect Your data, including Personal Information. However, no security system is impenetrable, and due to the inherent nature of the Internet, We cannot guarantee that data, including Personal Information, during transmission through the Internet or while stored on Our systems or otherwise in Our care, is absolutely safe from intrusion or other unauthorized access by others.
ICT Security Pty Limited will retain Personal Information it processes on behalf of Visitors for as long as needed to provide Web site services to Visitors. ICT Security Pty Limited will retain and use this Personal Information as necessary to comply with legal obligations, resolve disputes, and enforce our agreements.
Data breach procedures we have in place
In case of a data breach, ICT Security Pty Limited has several steps that are implemented in order to respond to such events. There is no single method of responding to data breaches as they must be dealt with on a case-by-case basis, where by solutions are adapted depending on the nature of the breach that occurs.
However, there are four key steps that ICT Security Pty Limited considers when responding to a breach or suspected breach:
- Contain the breach
- Assess the risks associated with the breach
- Consider breach notification
- Review the incident and take action to prevent future breaches
Our Policy Towards Children
Access to Personally Identifiable Information
Customers may update their Personal Information by editing their users’ information in the Service. If you’re a Visitor and Your Personal Information changes, or if You no longer desire to receive information about ICT Security Pty Limited’s Service, You may have Your Personal Information updated or removed from ICT Security Pty Limited’s records by emailing firstname.lastname@example.org or by contacting Us by telephone or postal mail at the contact information listed below.
We will respond to your request within 30 days.
What rights you have over your data
You can always opt not to disclose information, even though it may be needed to take advantage of or register for certain features of the Service or other content made available via the Web sites.
If You do not wish to receive email or other mail from Us, message or notify Us at email@example.com. Please note that if You do not want to receive legal notices from Us, such as this Privacy Statement, those legal notices will still govern Your use of the Web sites, and You are responsible for reviewing such legal notices for changes.
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.