Privacy and Cybersecurity Policy
PRIVACY AND CYBERSECURITY POLICY Agsensio Pty Ltd trading as Zetifi
By using this website, using our products, or interacting with us, you consent to the practices described in this policy.
In complying with APP, organisations must ensure transparency, purpose limitation, consent, and data security in collecting and managing the Personally Identifiable Information (PII) data of our stakeholders. Our policies and procedures specifically align to the Australian Privacy Principles (APP) including:
- the collection, use and disclosure of personal information.
- an organisation or agency’s governance and accountability
- integrity and correction of personal information
- the rights of individuals to access their personal information
With your consent and cooperation, we may request and collect the following types of personal information:
- Identity and Communication: name and contact information, including mail and email addresses.
- GeoSpatial: location data, including geographic coordinates and movement patterns for customers using our Zetifi products.
- Identity and Communication: name, job title, contact information, including email address.
- Licenses and qualifications to ensure you are safe to work with us.
- Identification and Verification: to ensure that the contractor is qualified and authorized to provide the services. Collecting PII data, such as government-issued identification and contact details, is crucial for proper identification and verification.
- Legal and Regulatory Compliance: Tax File Numbers, ABN.
- Health and Safety: emergency contact information and any information relevant to on-site safety.
- Identity and Communication: name, job title, date of birth and contact information, including mail and email addresses.
- Employment Relationship: employee’s name, contact details, tax file number (TFN), tax information, and employment history.
- Identity, history, and qualifications: Documents to verify the employee’s identity, work rights, qualifications, and is some special cases police checks.
- Payroll and Benefits: bank details for payment, Salary sacrificing, Superannuation details.
- Performance Management: work hours, projects completed, performance evaluations, and feedback is important for managing employee performance, providing constructive feedback, and recognizing achievements.
- Training and Development: PII data may be collected to identify training needs and opportunities for professional development. This helps us to enhance our workforce’s skills and capabilities.
- Health and Safety: emergency contact details, health-related information which may be necessary to address medical conditions or accommodate special needs.
- Business Partners:
- Business Relationship: PII data is collected to establish, manage, and nurture business relationships. This includes Identification of business opportunities, collaborations, and growth areas. e.g., details like partner’s name(s), stakeholders, contact information, title, and affiliation to support collaboration.
- Contractual Agreements: gathering PII data in order to formalise contract agreements including outlining roles, responsibilities, and expectations.
- Record Keeping and Performance Evaluation: partner data collection enables evaluation of contributions, outcomes, and partnership effectiveness for informed decision-making.
- Marketing and Promotion: promotional material, updates, and information dissemination.
- Legal and Regulatory Compliance: to meet legal obligations such as tax reporting and contractual requirements.
- Risk Assessment and Due Diligence: assessing credibility, reputation, and financial stability of potential partners.
- Website users:
- We do not gather PII through our website. As is common with online platforms, we may collect data about your site usage, communication interactions, browser type, operating system, and Internet service provider domain.
Use of Personal Information
We collect and utilize personal information for the following purposes:
- Enhancing our products and services based on your preferences and needs.
- Internal record keeping.
- Sending promotional emails regarding new products and special offers.
- Direct marketing initiatives.
- Conducting market research through telephone, email, fax, or mail.
- Personalising the website content to align with your interests.
Disclosure of Personal Information
We may share personal information under the following circumstances:
- Providing services to customers and contractors.
- Disclosing information to credit reporting agencies and legal authorities when customers fail to meet payment obligations.
- Complying with legal obligations by sharing data with courts, regulatory authorities, and law enforcement officers.
- Collaborating with third parties, including agents and subcontractors, who assist in information dissemination, product offering, services, or direct marketing.
In the event of business control change or assets transfer, we reserve the right to share user databases, including personal and non-personal information, with potential purchasers.
You can manage the collection and use of your personal information in the following ways:
- Opting out of direct marketing activities through provided checkboxes on our website forms.
- Changing your mind about personal information usage for direct marketing by emailing us at firstname.lastname@example.org.
- We will not distribute, sell, or lease your personal information to external parties without your consent, except if required by law.
You can request information we hold about you under the Privacy Act 1988 (Cth) by writing to us at 1/1 Riedell Street, Wagga Wagga, NSW Australia, or emailing email@example.com. We aim to respond promptly. If your information is incorrect, incomplete, or irrelevant, we will rectify it.
If you suspect a breach of the Australian Privacy Principles, email us at firstname.lastname@example.org with complaint details. We will investigate and provide outcomes, remedies, and further actions taken.
Storage and Security
We employ physical, electronic, and managerial measures to secure your information and guard it against unauthorized access, modification, disclosure, and loss.
While we take precautions, data transmission over the Internet is not entirely secure. We cannot guarantee absolute security but strive to protect your data.
Cookies & Web Beacons
Cookies and web beacons may be used on our site. Cookies store preferences but do not disclose personal data. When personal data is provided, it may be linked to cookie data.
Links to Other Websites
We link to external websites but are not responsible for their privacy practices.
This policy may change periodically. Continuing to use our website means accepting amendments.
Questions or clarifications? Reach out to us anytime; we are here to help!
Legal Disclaimer: Cybersecurity Protection and Customer Responsibility
Dear Valued Customers and Stakeholders,
At Zetifi, we are committed to safeguarding the security and integrity of our systems and the data entrusted to us by our valued customers and stakeholders. We want to assure you that we are taking diligent steps to protect your information including implementing ISO 27001, an international standard for the implementation of enterprise-wide Information Security Management System (ISMS), an organized approach to maintaining confidentiality, integrity, and availability (CIA) in an organization.
However, it is important to acknowledge the dynamic and evolving nature of cyber threats. While we have implemented comprehensive cybersecurity measures, we cannot provide an absolute guarantee that our defences will be impervious to all cyberattacks.
Our team is dedicated to maintaining a robust security posture, which includes continuous monitoring, vulnerability assessments, and the adoption of industry codes and, best practices to thwart potential threats. We have implemented stringent access controls, encryption protocols, and regular staff training to foster a secure environment.
Despite these efforts, the nature of cybersecurity means that risks can never be completely eliminated. Cybercriminals are persistent and innovative, constantly devising new ways to breach defences. This is why we strongly recommend that our customers and stakeholders take proactive steps to protect their own IT systems and data.
We encourage you to:
Secure your accounts with Passphrases and Multi-factor authentication.
Secure your devices with regular updates, and backups.
Secure your email and social media identity
Stay secure online by using secure Wi-Fi and routers, and recognising scams.
Implement Strong Firewalls: Deploy and maintain robust firewalls to prevent unauthorised access and intrusion attempts.
Train Staff to raise CyberSec awareness: Provide cybersecurity training to your employees to enhance their awareness of potential threats and the steps to take in case of an incident.
Adopt Industry Standard Protective Measures: Stay informed about the latest cybersecurity practices and implement those that are relevant to your systems and operations. We recommend you follow the:
The Australian Cyber Security Centre (ACSC),, they lead the Australian Government’s efforts to improve cyber security. Their role is to help make Australia the most secure place to connect online.
eSafety Commissioner, Online Safety Codes that will be released in 2023 and 2024., can help Australians experiencing online bullying or abuse to take action or make a complaint. They also provide a wide range of online safety programs and resources including advice on the new
Family Friendly Filters,, filters are computer programs designed to limit access to certain types of content on the internet. More information about filters and staying safe online can be obtained from the Office of the eSafety Commissioner.
Follow the ACCC’s Scamwatch which is run by the National Anti-Scam Centre to collect reports about scams to help us warn others and to take action to stop scams. They also provide up-to-date information to help you spot and avoid scams. https://www.scamwatch.gov.au/
While we are committed to doing our part to mitigate cybersecurity risks, we believe that a collaborative effort is essential in combating cyber threats effectively. By taking these proactive steps, you not only enhance your own security but also contribute to the collective resilience against cyberattacks.
Bug Bounties: We understand that security researchers and ethical hackers play a crucial role in helping to identify and address potential vulnerabilities in systems. By working together, we can ensure a safer online environment for all. As such, we want to invite the security community to collaborate with us by reporting security issues they may encounter in our products and services. Please ensure that you adhere to responsible disclosure practices and avoid any actions that could harm our systems or users. You can report any security concerns at email@example.com.
Please be aware that this disclaimer serves as a reminder of the shared responsibility we all bear in maintaining a secure digital landscape. We appreciate your partnership in this endeavour and remain at your service to address any concerns or questions you may have.
Not sure exactly what we’re looking for or just want clarification? We’d be happy to chat with you and clear things up for you. Anytime!