Privacy and Cybersecurity Policy

PRIVACY AND CYBERSECURITY POLICY Agsensio Pty Ltd trading as Zetifi

This privacy policy outlines how Agsensio Pty Ltd, trading as Zetifi (“we,” “our,” or “us”) handles, utilises, and safeguards your personal information. This policy is in line with the Australian Privacy Principles (APP) and is designed to address the concerns and expectations of our stakeholders including customers, contractors, employees, and business partners who sell our products.

By using this website, using our products, or interacting with us, you consent to the practices described in this policy.

Information Collection

In complying with APP, organisations must ensure transparency, purpose limitation, consent, and data security in collecting and managing the Personally Identifiable Information (PII) data of our stakeholders. Our policies and procedures specifically align to the Australian Privacy Principles (APP) including:

  • the collection, use and disclosure of personal information.
  • an organisation or agency’s governance and accountability
  • integrity and correction of personal information
  • the rights of individuals to access their personal information

With your consent and cooperation, we may request and collect the following types of personal information:

  • Customers:
    • Identity and Communication: name and contact information, including mail and email addresses.
    • GeoSpatial: location data, including geographic coordinates and movement patterns for customers using our Zetifi products.
  • Contractors:
    • Identity and Communication: name, job title, contact information, including email address.
    • Licenses and qualifications to ensure you are safe to work with us.
    • Identification and Verification: to ensure that the contractor is qualified and authorized to provide the services. Collecting PII data, such as government-issued identification and contact details, is crucial for proper identification and verification.
    • Legal and Regulatory Compliance: Tax File Numbers, ABN.
    • Health and Safety: emergency contact information and any information relevant to on-site safety.
  • Employees:
    • Identity and Communication: name, job title, date of birth and contact information, including mail and email addresses.
    • Employment Relationship: employee’s name, contact details, tax file number (TFN), tax information, and employment history.
    • Identity, history, and qualifications: Documents to verify the employee’s identity, work rights, qualifications, and is some special cases police checks.
    • Payroll and Benefits: bank details for payment, Salary sacrificing, Superannuation details.
    • Performance Management: work hours, projects completed, performance evaluations, and feedback is important for managing employee performance, providing constructive feedback, and recognizing achievements.
    • Training and Development: PII data may be collected to identify training needs and opportunities for professional development. This helps us to enhance our workforce’s skills and capabilities.
    • Health and Safety: emergency contact details, health-related information which may be necessary to address medical conditions or accommodate special needs.
  • Business Partners:
    • Business Relationship: PII data is collected to establish, manage, and nurture business relationships. This includes Identification of business opportunities, collaborations, and growth areas. e.g., details like partner’s name(s), stakeholders, contact information, title, and affiliation to support collaboration.
    • Contractual Agreements: gathering PII data in order to formalise contract agreements including outlining roles, responsibilities, and expectations.
    • Record Keeping and Performance Evaluation: partner data collection enables evaluation of contributions, outcomes, and partnership effectiveness for informed decision-making.
    • Marketing and Promotion: promotional material, updates, and information dissemination.
    • Legal and Regulatory Compliance: to meet legal obligations such as tax reporting and contractual requirements.
    • Risk Assessment and Due Diligence: assessing credibility, reputation, and financial stability of potential partners.
  • Website users:
    • We do not gather PII through our website. As is common with online platforms, we may collect data about your site usage, communication interactions, browser type, operating system, and Internet service provider domain.

Use of Personal Information

We collect and utilize personal information for the following purposes:

  • Enhancing our products and services based on your preferences and needs.
  • Internal record keeping.
  • Sending promotional emails regarding new products and special offers.
  • Direct marketing initiatives.
  • Conducting market research through telephone, email, fax, or mail.
  • Personalising the website content to align with your interests.

Disclosure of Personal Information

We may share personal information under the following circumstances:

  • Providing services to customers and contractors.
  • Disclosing information to credit reporting agencies and legal authorities when customers fail to meet payment obligations.
  • Complying with legal obligations by sharing data with courts, regulatory authorities, and law enforcement officers.
  • Collaborating with third parties, including agents and subcontractors, who assist in information dissemination, product offering, services, or direct marketing.
  • We may share your PII with trusted merchants for the purpose of processing payments related to your transactions
  • In order to fulfill the orders you place with us, we may share your PII with our suppliers or trusted partners. This includes necessary information to ensure the accurate and timely delivery of products or services you have requested.

Third parties receiving personal information will be obligated to adhere to this Privacy Policy.

In the event of business control change or assets transfer, we reserve the right to share user databases, including personal and non-personal information, with potential purchasers.

Your Control

You can manage the collection and use of your personal information in the following ways:

  • Opting out of direct marketing activities through provided checkboxes on our website forms.
  • Changing your mind about personal information usage for direct marketing by emailing us at hello@zetifi.com.
  • We will not distribute, sell, or lease your personal information to external parties without your consent, except if required by law.

You can request information we hold about you under the Privacy Act 1988 (Cth) by writing to us at 1/1 Riedell Street, Wagga Wagga, NSW Australia, or emailing hello@zetifi.com. We aim to respond promptly. If your information is incorrect, incomplete, or irrelevant, we will rectify it.

Complaints

If you suspect a breach of the Australian Privacy Principles, email us at hello@zetifi.com with complaint details. We will investigate and provide outcomes, remedies, and further actions taken.

Storage and Security

We employ physical, electronic, and managerial measures to secure your information and guard it against unauthorized access, modification, disclosure, and loss.

While we take precautions, data transmission over the Internet is not entirely secure. We cannot guarantee absolute security but strive to protect your data.

Cookies & Web Beacons

Cookies and web beacons may be used on our site. Cookies store preferences but do not disclose personal data. When personal data is provided, it may be linked to cookie data.

Links to Other Websites

We link to external websites but are not responsible for their privacy practices.

Policy Changes

This policy may change periodically. Continuing to use our website means accepting amendments.

Contact Us

Questions or clarifications? Reach out to us anytime; we are here to help!

hello@zetifi.com

 

Dear Valued Customers and Stakeholders,

At Zetifi, we are committed to safeguarding the security and integrity of our systems and the data entrusted to us by our valued customers and stakeholders. We want to assure you that we are taking diligent steps to protect your information including implementing ISO 27001, an international standard for the implementation of enterprise-wide Information Security Management System (ISMS), an organized approach to maintaining confidentiality, integrity, and availability (CIA) in an organization.
However, it is important to acknowledge the dynamic and evolving nature of cyber threats. While we have implemented comprehensive cybersecurity measures, we cannot provide an absolute guarantee that our defences will be impervious to all cyberattacks.

Our team is dedicated to maintaining a robust security posture, which includes continuous monitoring, vulnerability assessments, and the adoption of industry codes and, best practices to thwart potential threats. We have implemented stringent access controls, encryption protocols, and regular staff training to foster a secure environment.

Despite these efforts, the nature of cybersecurity means that risks can never be completely eliminated. Cybercriminals are persistent and innovative, constantly devising new ways to breach defences. This is why we strongly recommend that our customers and stakeholders take proactive steps to protect their own IT systems and data.

We encourage you to:

  1. Secure your accounts with Passphrases and Multi-factor authentication.

  2. Secure your devices with regular updates, and backups.

  3. Secure your email and social media identity

  4. Stay secure online by using secure Wi-Fi and routers, and recognising scams.

  5. Implement Strong Firewalls: Deploy and maintain robust firewalls to prevent unauthorised access and intrusion attempts.

  6. Train Staff to raise CyberSec awareness: Provide cybersecurity training to your employees to enhance their awareness of potential threats and the steps to take in case of an incident.

  7. Adopt Industry Standard Protective Measures: Stay informed about the latest cybersecurity practices and implement those that are relevant to your systems and operations. We recommend you follow the:

    • The Australian Cyber Security Centre (ACSC), , they lead the Australian Government’s efforts to improve cyber security. Their role is to help make Australia the most secure place to connect online.

    • eSafety Commissioner, , can help Australians experiencing online bullying or abuse to take action or make a complaint. They also provide a wide range of online safety programs and resources including advice on the new Online Safety Codes that will be released in 2023 and 2024.

    • Family Friendly Filters, , filters are computer programs designed to limit access to certain types of content on the internet. More information about filters and staying safe online can be obtained from the Office of the eSafety Commissioner.

    • Follow the ACCC’s Scamwatch which is run by the National Anti-Scam Centre to collect reports about scams to help us warn others and to take action to stop scams. They also provide up-to-date information to help you spot and avoid scams.  https://www.scamwatch.gov.au/

While we are committed to doing our part to mitigate cybersecurity risks, we believe that a collaborative effort is essential in combating cyber threats effectively. By taking these proactive steps, you not only enhance your own security but also contribute to the collective resilience against cyberattacks.

Bug Bounties: We understand that security researchers and ethical hackers play a crucial role in helping to identify and address potential vulnerabilities in systems. By working together, we can ensure a safer online environment for all. As such, we want to invite the security community to collaborate with us by reporting security issues they may encounter in our products and services. Please ensure that you adhere to responsible disclosure practices and avoid any actions that could harm our systems or users. You can report any security concerns at security@zetifi.com.

Please be aware that this disclaimer serves as a reminder of the shared responsibility we all bear in maintaining a secure digital landscape. We appreciate your partnership in this endeavour and remain at your service to address any concerns or questions you may have.

Sincerely,

Dan Winson

CEO, Zetifi

Need support?

Not sure exactly what we’re looking for or just want clarification? We’d be happy to chat with you and clear things up for you. Anytime!