Privacy Policy

Services Offered by Techware

Services Offered by Techware

Techware provides the following main service categories:

  • Managed IT Services – including full-management and co-managed models to oversee clients’ networks, systems and operations.
  • Cyber Security – covering Identify (e.g., network audit, dark-web monitoring, compromise assessment), Prevention (user training, encryption, endpoint/email/mobile security, insider threat), Detect & Respond, Recover.
  • Cloud Services – working with platforms such as RingCentral (voice/communications), AWS (hosting/infrastructure), Microsoft Azure, and Microsoft 365 productivity suite.
  • IT Consulting – strategic IT planning, risk assessment, audit, business continuity/disaster recovery, infrastructure management, project management.
  • Industry-specific support – tailored services for sectors such as government, not-for-profit, law firms, medical practices, accountants, manufacturing.

Given this variety of services, Techware will collect and handle a range of personal and business information (clients, staff, subcontractors, etc.). The privacy policy needs to reflect that breadth, comply with applicable Australian privacy laws (e.g., the Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs)), and align with Techware’s brand and operations.

Privacy Policy

This Policy applies to the collection, use, disclosure and management of personal information by Techware Corporation (Australia) Pty Ltd (ABN [insert]), trading as Techware (“we”, “us”, “our”). We are committed to protecting the privacy and security of personal information in compliance with the Privacy Act 1988 (Cth) and the Australian Privacy Principles.

1. Purpose

This Policy is in place to protect our clients’ data, vendor/partner information, staff and contractor personal information, and Techware’s own assets while ensuring compliance with relevant standards and frameworks, and contractual obligations with government and commercial clients.

2. What personal information we collect

We may collect the following types of personal information:

  • For clients / prospective clients: name, company name, contact details (email, telephone, address), job title, service-usage data, billing information.
  • For employees, contractors and subcontractors: name, date of birth, contact details, bank account/payment details, tax/ABN details, employment history, credentials, identity verification information.
  • For vendors/partners: company and contact details, service performance data, payment/billing information.
  • Technical / operational data: system logs, network usage, security event data, IP addresses (when providing managed services or monitoring services), client device information.
  • Sensitive personal information: if required for certain services (eg. background checks, cyber-security incident response) we may collect limited sensitive personal information (such as criminal record checks) only if lawful and necessary.

3. How we collect information

We collect personal information:

  • Directly from you when you engage our services, complete forms (online/offline), subscribe to newsletters, request a consultation, contact our support desk, or apply for employment.
  • Indirectly through our service provision: e.g., when we manage/monitor your IT systems, logs or auditing data include personal identifiers.
  • From third parties: for example, credit reference agencies, publicly available sources, subcontractors/vendors engaged by us, or as part of a client’s network configuration audit.

4. Use of personal information

We use personal information for purposes including:

  • Providing, managing and delivering our IT services, cloud services, cyber security services, consulting and support.
  • Billing and administration.
  • Responding to enquiries, support tickets or complaints.
  • Recruiting and managing staff, contractors and partners.
  • Maintaining internal records and audit/tracking of our service delivery and compliance obligations.
  • Improving our services, conducting research and development, monitoring system performance and security.
  • Complying with legal and regulatory obligations (including reporting obligations, audits, law enforcement).
  • Marketing communications (with your consent where required) about relevant services, events, publications (you may opt out any time).

5. Use of personal information

We may disclose personal information to:

  • Our related companies, subcontractors, service providers (including cloud providers, hosting companies, IT infrastructure vendors) who assist us in service delivery.
  • Third parties in the event of a business sale, merger, reorganisation or acquisition.
  • Government, regulatory or law enforcement bodies when required or authorised by law.
  • Your authorised representatives (for example your authorised agents, auditors).
  • Other entities if we have your consent or where permitted under applicable privacy law.

6. Cross-border disclosure

Given the nature of cloud services and third-party providers, personal information may be stored or processed outside Australia (e.g., in data centres abroad). We will take reasonable steps to ensure that overseas recipients handle the information consistently with this Policy and Australian privacy standards where practicable.

7. Data quality and security

We take reasonable steps to ensure that the personal information we collect is accurate, complete and up-to-date as far as necessary for the purposes it is used.
We maintain appropriate technical, administrative and physical safeguards to protect personal information from unauthorised access, disclosure, misuse, loss or alteration. These measures include encryption, access controls, network monitoring, logging and audit trails, and employee security training.
If we no longer need the personal information (and it is not required to be retained for legal or business purposes) we will securely destroy or de-identify it.

8. Access and correction

You may request access to the personal information we hold about you and request that it be corrected if inaccurate, incomplete or out-of-date. To request access or correction please contact our Privacy Officer (see section 11). We may charge a reasonable fee for providing access, but we will advise you of any cost in advance. We may refuse access in some limited circumstances under the Privacy Act; if so we will provide reasons.

9. Complaints and enquiries

If you believe we have breached your privacy rights or this Policy, you may lodge a complaint with our Privacy Officer. We will acknowledge receipt of your complaint, investigate and take appropriate action. If you are not satisfied with our response, you may refer the matter to the Office of the Australian Information Commissioner (OAIC).

10. Cookies and tracking technologies

When you visit our website (techware.com.au) we may use cookies, web beacons, tracking pixels or similar technologies to collect usage data (such as pages visited, browser type, device, referral source). This helps us analyse and improve our site, marketing, user experience and service delivery. You may disable cookies via your browser settings, noting that some parts of the website may not function as intended.

11. Privacy Officer and contract details

If you have any questions about this Policy, wish to access or correct your personal information, or wish to make a complaint, please contact:
Privacy Officer
Techware Corporation (Australia) Pty Ltd
2/10 Duerdin Street, Clayton VIC 3168 Australia
Email: 
privacy@techware.com.au
Phone: (03) 8542 7333

12. Change to this policy

We may update this Policy from time to time. We will publish the revised version on our website with the “Last updated” date. We encourage you to review this page periodically. By continuing to use our services or website after changes are published, you accept the updated Policy.

13. Retention

We retain personal information for as long as necessary for the purpose it was collected or as required by law, whichever is longer. This includes retaining transactional data, service provision records, audit logs, security event logs, contract records, and employee records as required under employment, tax, audit or corporate law.

14. Specific service-related provisions

Given our service offering, the following additional points apply:

  • For managed IT and cyber-security services, we may collect system logs, audit trails, device metadata, network monitoring data and threat detection data. These collectively may contain identifiers of individuals (e.g., user accounts, IP addresses). We treat such data as personal information when it is reasonably identifiable and handle it in accordance with this Policy.
  • For cloud services and remote support we engage third-party cloud infrastructure providers (e.g., AWS, Azure). We conduct due diligence to ensure the providers operate appropriate security and privacy controls.
  • For consulting, auditing and risk-assessment services we may handle client data and may act as a data-processor under the client’s instructions; in such cases our contract will include confidentiality and data protection obligations.