Privacy Policy

Scope

This Privacy Policy describes how Catalyst IT Australia collects, uses, discloses, stores and gives access to Personal Information in accordance with the Privacy Act 1988 (the “Act”). In particular it sets out:

  1. From whom Catalyst collects Personal Information;
  2. What Personal Information Catalyst collects;
  3. How Catalyst collects Personal Information;
  4. Why Catalyst collects Personal Information;
  5. How Catalyst uses Personal Information;
  6. How Personal Information can be accessed and corrected; and
  7. What happens in the event of a Privacy Breach.

Any questions about this Privacy Policy may be directed to:

The Privacy Officer

PO Box 1480, Deewhy NSW 2099

email to: privacy.officer@catalyst-au.net

From Whom Catalyst Collects Personal Information

Catalyst may collect Personal Information from:

  1. Catalyst’s clients
  2. Members of Catalyst’s staff
  3. Visitors to Catalyst’s premises or websites

What Personal Information Catalyst Collects

The Personal Information that Catalyst collects may include your name, email address, physical address, telephone number, image, billing information, Client Information and any other information supplied by you to Catalyst in the course of your interaction with us.

How Catalyst Collects Personal Information

Catalyst may collect Personal Information about you in the following ways:

  1. When you provide information directly to us, whether in person, over the phone, via email or the postal system, via SMS message or other means of communication;
  2. When you use our services;
  3. When Personal Information is supplied to us by a third-party;
  4. When you visit our website we may collect your Client Information via a Data Collection Tool; and
  5. When you visit our premises we may collect your image (and in exceptional cases where necessary for security purposes, sound recordings) via CCTV cameras.

Why Catalyst Collects Personal Information

Catalyst collects Personal Information for the purposes of:

  1. Providing services to you;
  2. Administering our business; and
  3. Ensuring the physical and digital security of you, our clients, visitors, staff and our premises.

How Catalyst Uses Personal Information

Catalyst uses Personal Information to effect the above purposes.

  1. The circumstances in which Catalyst may disclose Personal Information include:
    1. Where you consent to the disclosure;
    2. Where the disclosure is required to effect the above purposes; or
    3. Where the disclosure is required by law.
  2. Catalyst stores Personal Information:
    1. In our IT or physical infrastructure for as long as is reasonably necessary to effect the above purposes; and
    2. In the case of CCTV Images or sound recordings, in our IT infrastructure for no longer than three (3) months (except where necessary).
  3. Personal Information may be subject to the following security measures:
    1. User authentication and authorisation;
    2. Network and at-rest encryption;
    3. Patching and vulnerability management; and
    4. Physical security protocols.

How Personal Information Can Be Accessed and Corrected

You may access and submit corrections to your Personal Information by contacting us directly by any means set out at clause 1.2.

What Happens in the Event of a Privacy Breach

Please see the provisions for Notifiable Data Breaches in the Catalyst Information Security Policy. All Notifiable Data Breaches will be handled according to those provisions.

In the event of a Privacy Breach, Catalyst will:

  1. Notify the affected individuals and organisations, including (if appropriate) law enforcement organisations;
  2. Attempt to mitigate the extent and consequences of the breach;
  3. Attempt to remedy the situation, as appropriate in the circumstances; and
  4. Review the breach and Catalyst’s processes and procedures with a view to minimising the risk of a similar breach occurring in the future.

Review

This policy is reviewed at least annually and more frequently if required. All changes to the policy are reviewed by the CISO and approved at the quarterly Management meetings. This policy is available on the Catalyst internal wiki and on the Catalyst IT Australia website.