Privacy Policy

This is a static web based document.  Please contact us for our latest official version.

Definitions
“We” or “Us” refers to Computer Services & Technologies Pty Ltd
“You” refers to you the client, either as an individual or company

How we handle personal information
We manage your personal information in accordance with the new APP’s and as outlined in this document.

For your protection, our staff have signed confidentiality agreements requiring them not to disclose any of your personal information which they may potentially become exposed to during the course of them providing products and/or services to you.

Collection of personal information, anonymity and rule for sensitive information.
When we collect personal information from you, we will only collect what is necessary for us to be able to conduct business with you. The information we collect may vary according to how we do business with you. We will not collect any personal information not required for this purpose.

If you are prepared to do business with us only on the basis of anonymity, we will not be able to conduct business with you.

Use and Disclosure of personal information
The personal information we collect from you may be used for one or more of the following:

  1. providing products and/or services to you
  2. invoicing and/or processing payment(s) for products and/or services we provided to you
  3. creating a profile within our Helpdesk System to enable you to raise support requests with us and to enable us to provide support services to you

We will not disclose any personal information to anyone outside of our organisation, unless it is required:

  • to enable us to provide products and/or services to you
  • in order to deliver a large scale project initiated by you
  • by Australian or foreign law enforcement authorities due to legal or criminal proceedings, an investigation by police or any other government authority;
  • in any other way as authorised by you.

If you engage us to provide support services for you or your company’s computer systems, you acknowledge that we may potentially be exposed to personal information stored on those systems during the course of this engagement. However, we will not disclose this personal information to anyone outside of your company or anyone within our company not associated with providing support services to you.

In the event where we are engaged by you as part of a larger project involving several product and/or service providers, the nature of your project may require us to access and/or share certain personal information with those product and/or service providers. By engaging us in such a project, you acknowledge that this may be required and if so, we will only access and/or share information for the sole purpose of completing our part of your project.

Phone Calls
Please note that calls made to and from our company may be recorded for quality assurance and training purposes.

How we ensure personal information is accurate, complete and up-to-date
To ensure your personal information is accurate and up-to-date, we will only collect information directly from you or a third party who is authorised by you to provide your information to us.

We will not obtain or use information from any 3rd party with whom you or we have no business association.

During the course of conducting business with you, if you make us aware that some of your personal information has changed or is incorrect, we will take all reasonable steps to ensure all our records are updated as soon as possible.

How we protect personal Information
We utilise a number of security mechanisms – both physical and logical – to ensure your personal information is protected from unauthorised access. If you have any of your computer systems located in our computer room, these measures may also apply to you.

The measures include (but are not limited to) the following:

  • Network Firewalls
  • Password-protected computer systems
  • Updated Anti-Virus software
  • Fully patched Operating Systems
  • Restricting access to personal information to authorised staff only
  • Lockable filing cabinets (for paper-based records)
  • Alarmed and CCTV monitored premises and computer room.

Should you cease doing business with us, we may need to retain some information for historical and/or legal purposes. Any information not required for these purposes will be deleted and/or destroyed. If you have any of your computer systems located in our computer room, it is your responsibility to arrange the collection of these systems at a mutually convenient time under our supervision.

Inspecting your personal information
Should you wish to inspect the personal information we hold about you, you must submit a written request to our Privacy Officer, no less than 10 working days prior to your preferred inspection date. Due to the nature of our business, it is possible that your preferred inspection date may not be suitable. Should this be the case, we will advise you and arrange a different date with you.

You must attend our office in person and provide a form of government-issued photo ID before you can inspect your records, as our Privacy Officer must be able to verify your identity. Acceptable forms of Photo ID include Drivers Licence, Security Licence or Passport.

Photo ID issued by employers, educational institutions and the like are not acceptable.

Details on how to contact our Privacy Officer are provided at the end of this document.

Transborder dataflows
Due to the nature of our business, some of our computer system applications are provided by vendors who are based outside of Australia. There may be times where we may require a vendor to assist with resolving certain performance and/or operational issues with a specific system and need to provide them with access to the application and/or data repository concerned (e.g. database) for the sole purpose of correcting such issues. If required, these repositories may be transferred to the vendor’s support facilities located overseas in order to conduct more thorough analysis and carry out corrective action. Where this occurs, any personal information contained within those repositories will not be used for any unauthorised purpose other than to resolve the issues with the system concerned. We do not authorise any of our vendors to use or disclose personal information in any unauthorised manner.

Other considerations
Whenever you disclose personal information, regardless of the mechanism which you use to provide it, from surface mail to email, there is always a certain amount of risk that your information may find its way into unauthorised hands. As we live in a connected world, a lot of this information is delivered using Internet-based mechanisms including, but not limited to, email and online storage repositories. Such mechanisms are also widely accessible in public areas such as Internet Cafes and Restaurants. You should always bear in mind that whenever you send personal information to us using any Internet-based mechanism, traces of that information may remain on servers during transmission across the Internet, or in the case of a public place, become intercepted. If this occurs, it increases the risk that your personal information may be accessed by unauthorised people if they compromise such servers or intercept publically accessible connections on which you made the transmission. These possibilities are beyond our control and we are not responsible for any personal information that is accessed, lost, or in any way compromised as a result. You are responsible for taking whatever reasonable precautions are necessary to prevent this from occurring.

Records Inspection, Enquiries and Complaints Handling Process
Should you wish to inspect the personal information we hold about you, have any questions about our policy, or wish to lodge a complaint, please send your request to us in writing, addressed to our Privacy Officer.

Post:
The Privacy Officer
Computer Services & Technologies Pty Ltd
PO Box 59, Concord West NSW 2138

Phone: (02) 9715 2162

Email: privacy@cstech.com.au

Document Version: February 2014

This is a static web based document.  Please contact us for our latest official version.