How We Collect Your Personal Information
We generally collect your personal information directly from you. For example, we may collect personal information about you when you deal with us over the telephone, send us correspondence (whether by letter, fax or e-mail) or when you have contact with us in person. Generally, the type of personal information we collect about you includes your name, mailing address, telephone number and e-mail address. There may be occasions when we need to source personal information about you from a third party. For example, we may collect personal information from a company for whom you work, other organizations with whom you have any dealings, a credit-reporting agency, and an information service provider or from a publicly maintained record.
Our Disclosure Statement
Akubra collects personal information for the following purposes:
In some circumstances, we collect personal information about you from a third party source. If we collect personal information about you in this way, we will take reasonable steps to contact you and ensure that you are aware of the purposes for which we are collecting your personal information and the organizations to which we might disclose your personal information.
- to provide you with information about Akubra products via e-mail
- to enable Akubra to undertake Credit assessment
- to receive services from you or the organization which employs you
How We Use or Disclose Your Personal Information
We will use and disclose personal information for the primary purpose for which it was collected. We may also use and disclose personal information for purposes related or ancillary to the main reasons we collect it, such as invoicing, reminder notices, provision of information concerning Akubra and other services offered by us. We do not disclose personal information we collect to third parties for the purpose of allowing them to direct market their products and services. We engage third party contractors to perform services for us, which involves the contractor handling personal information we hold. For example, we may engage third party contractors to maintain and monitor our customer and user databases. In these situations, we prohibit the third party contractor from using personal information about you except for the specific purpose for which we supply it.
Other People's Information Which You Provide To Us
Sharing Information within Akubra
Each Akubra entity may disclose personal information to other Akubra entities, which will use and disclose the information only for the purpose for which it was originally collected. The contact details below are applicable to all Akubra entities.
Gaining Access To Information We Hold About You
We will, on request, provide you with access to the personal information we hold about you unless there is an exception, which applies under the Privacy Act such as employee records. Your request to obtain access will be dealt with in a reasonable time. Akubra may recover from you its reasonable cost of providing you with access. If we refuse to provide you with access to the information, we will provide you with reasons for the refusal and inform you of any exceptions relied upon under the Privacy Act.
Keeping Your Personal Information Up-To-Date
We take reasonable steps to ensure that your personal information is accurate, complete, and up-to-date whenever we collect or use it. If any of the personal information we hold about you is inaccurate, incomplete or out-of-date, please contact us immediately and we will take reasonable steps to correct this information or, if necessary, we will discuss alternative action with you.
Security Of Your Personal Information
We protect any personal information that we hold from misuse and loss. We also protect it from unauthorized access, modification and disclosure. Your personal information may be stored either in hard copy documents or as electronic data in Akubra's software or systems. We maintain physical security over our paper and electronic data stores and premises, such as locks and security systems. We also maintain computer and network security; for example, we use firewalls (security measures for the Internet) and other security systems such as user identifiers and passwords to control access to our computer system.