Last Updated: October 21, 2025

Effective Date: October 21, 2025


About This Privacy Policy

CyberSmart360 Pty Ltd (ABN [to be assigned]) (“CyberSmart360,” “we,” “us,” or “our”) is committed to protecting your privacy and handling your personal information responsibly and in accordance with applicable laws.

This Privacy Policy explains how we collect, use, disclose, store, and protect your personal information when you use our cybersecurity assessment platform, including our website, web applications, mobile applications (iOS and Android), Progressive Web App, and related services (collectively, the “Service” or “Platform”).

Applicable Laws

This Privacy Policy is designed to comply with:

For Australian Users:

  • Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs)
  • Privacy and Other Legislation Amendment Act 2024 (Cth)
  • Notifiable Data Breaches (NDB) scheme
  • Australian Consumer Law

For European Union Users:

  • General Data Protection Regulation (GDPR) (EU) 2016/679
  • National implementations of GDPR in EU member states
  • UK GDPR (for UK users)

Our Commitment

We are committed to:

  • Transparency about how we handle your information
  • Giving you control over your personal information
  • Protecting your information with appropriate security measures
  • Complying with all applicable privacy and data protection laws
  • Respecting your privacy rights and responding promptly to your requests

1. Information We Collect

1.1 Information You Provide Directly

Account Registration Information:

  • Full name
  • Email address
  • Phone number (optional)
  • Job title and department
  • Organization name
  • Business address
  • ABN/ACN (Australian businesses) or equivalent business registration number
  • Password (stored in encrypted form)

Billing and Payment Information:

  • Credit card details (processed and stored by Stripe, not by us)
  • Billing address
  • Tax identification numbers (where applicable)
  • Purchase history and transaction records

Profile Information:

  • Profile photo (optional)
  • User preferences and settings
  • Language preferences
  • Notification preferences
  • Time zone settings

Assessment and Compliance Data:

  • Framework assessment responses
  • Cybersecurity policies and procedures
  • Evidence files and documentation
  • Remediation plans and progress
  • Audit trails and compliance records
  • Risk analysis and scoring data

Support and Communications:

  • Support ticket content and communications
  • Feedback, suggestions, and feature requests
  • Survey responses
  • Community forum posts
  • Training and webinar registrations

1.2 Information Collected Automatically

Usage and Analytics Data:

  • IP addresses
  • Device information (type, operating system, browser)
  • Mobile device identifiers
  • Pages visited and features used
  • Time and date of access
  • Clickstream data and navigation patterns
  • Session duration and frequency
  • Referral sources and exit pages

Technical Information:

  • Log files and error reports
  • Performance metrics
  • API usage statistics
  • Integration activity logs
  • Framework Plugin usage data
  • Application crash reports

Location Information:

  • General geographic location based on IP address
  • Precise location (only if you explicitly grant permission for mobile apps)

Cookies and Similar Technologies:

  • Session cookies for authentication
  • Preference cookies for settings
  • Analytics cookies for platform improvement
  • Security cookies for fraud prevention
  • Marketing cookies (with your consent)

1.3 Information from Third-Party Sources

Integration Partners:
When you connect third-party services to your account, we may receive:

  • Microsoft 365: User lists, license information, security policy data
  • Amazon Web Services: IAM policies, security groups, CloudTrail logs
  • Google Cloud Platform: IAM configuration, security settings, audit logs
  • Active Directory/LDAP: User directory information, group memberships
  • Azure AD: User profiles, authentication logs, conditional access policies
  • Zoho CRM: Contact information, account details
  • Xero: Billing information, invoice data

Authentication Providers:

  • Auth0: Authentication tokens, login history, MFA status
  • Single Sign-On providers: Identity verification data

Publicly Available Information:

  • Business registration details
  • Company information from public databases
  • Industry and sector classifications

1.4 Sensitive Information

Under Australian privacy law and GDPR, certain types of information are considered “sensitive” or “special category” and receive additional protections.

We generally do NOT collect sensitive information such as:

  • Racial or ethnic origin
  • Political opinions or associations
  • Religious or philosophical beliefs
  • Trade union membership
  • Genetic or biometric data
  • Health information
  • Sexual orientation

However, assessment content you submit may inadvertently contain sensitive information. You are responsible for ensuring you have appropriate legal basis to process any sensitive information included in your User Content.

If you include sensitive information in your assessments or communications with us, you explicitly consent to our processing of that information solely for the purpose of providing the Service.


2. How We Use Your Information

2.1 Primary Purposes (Australian Privacy Law)

Under Australian privacy law, we collect and use your personal information for the following primary purposes:

Service Provision:

  • Creating and managing your account
  • Providing access to the Platform and its features
  • Processing framework assessments
  • Generating reports and recommendations
  • Enabling integrations with third-party services
  • Providing AI-powered analysis and remediation guidance
  • Synchronizing data across web and mobile platforms
  • Delivering offline functionality

Billing and Payments:

  • Processing subscription payments
  • Generating invoices and receipts
  • Managing subscription upgrades/downgrades
  • Handling refunds and disputes
  • Tax compliance and reporting

Customer Support:

  • Responding to support inquiries
  • Troubleshooting technical issues
  • Providing training and onboarding
  • Delivering customer success services

Platform Improvement and Analytics:

  • Analyzing usage patterns to improve features
  • Identifying and fixing bugs
  • Developing new Framework Plugins
  • Optimizing performance and user experience
  • Conducting research and development

Security and Fraud Prevention:

  • Detecting and preventing unauthorized access
  • Monitoring for suspicious activity
  • Investigating security incidents
  • Maintaining audit logs for compliance
  • Enforcing our Terms of Use

Legal and Compliance:

  • Complying with legal obligations
  • Responding to lawful requests from authorities
  • Protecting our legal rights
  • Enforcing our agreements
  • Meeting regulatory requirements

2.2 Secondary Purposes (Related to Primary Purposes)

We may use your information for related secondary purposes that you would reasonably expect:

Communications:

  • Sending service-related notifications
  • Providing updates about your assessments
  • Notifying you of account or security issues
  • Sharing important changes to our services or policies

Product Development:

  • Testing new features with beta users
  • Gathering feedback on existing features
  • Improving AI algorithms and recommendations

Quality Assurance:

  • Training support staff
  • Quality monitoring of customer interactions
  • Internal audits and compliance reviews

2.3 Marketing and Promotional Uses (With Consent)

With your explicit consent, we may use your information for:

  • Sending marketing emails about new features and services
  • Providing educational content and webinars
  • Offering special promotions or upgrades
  • Conducting surveys and research
  • Sharing industry news and best practices

You can opt-out of marketing communications at any time by:

We never sell your personal information to third parties for marketing purposes.

2.4 Automated Decision-Making (APP 1 & GDPR Requirements)

AI-Powered Features:
Our Platform uses artificial intelligence and machine learning for:

  • Risk analysis and prioritization
  • Remediation recommendations
  • Predictive compliance insights
  • Anomaly detection
  • Behavioral analytics

Human Oversight:

  • AI recommendations are guidance only, not final decisions
  • You maintain full control over compliance decisions
  • Critical decisions require human review
  • You can challenge or request explanation of AI outputs

GDPR Right to Object:
EU users have the right not to be subject to decisions based solely on automated processing that produce legal effects or similarly significantly affect you. Contact privacy@cybersmart360.com.au to exercise this right.

2.5 Legal Bases for Processing (GDPR)

For EU/EEA/UK users, we process your personal data based on the following legal grounds:

Contract Performance (GDPR Article 6(1)(b)):

  • Providing the Service under our Terms of Use
  • Processing payments and managing subscriptions
  • Delivering customer support

Legitimate Interests (GDPR Article 6(1)(f)):

  • Platform security and fraud prevention
  • Service improvement and development
  • Internal analytics and business intelligence
  • Direct marketing (where consent not required)

Legal Obligations (GDPR Article 6(1)(c)):

  • Complying with legal and regulatory requirements
  • Responding to lawful requests from authorities
  • Tax and accounting obligations

Consent (GDPR Article 6(1)(a)):

  • Marketing communications
  • Optional analytics cookies
  • Processing special category data you voluntarily provide

Vital Interests (GDPR Article 6(1)(d)):

  • Protecting life or physical safety in emergency situations

You may withdraw consent at any time by contacting privacy@cybersmart360.com.au.


3. How We Share Your Information

3.1 We Do Not Sell Your Personal Information

We do not sell, rent, or trade your personal information to third parties for their marketing purposes.

3.2 Service Providers and Sub-Processors

We share information with trusted third-party service providers who assist us in operating the Platform:

Infrastructure and Hosting:

  • Digital Ocean: Primary cloud infrastructure hosting (data centers in Australia and other regions)
  • Amazon Web Services (AWS): Disaster recovery and backup services

Authentication and Security:

  • Auth0 (Okta): Identity and access management, OAuth 2.0 authentication

Payment Processing:

  • Stripe, Inc.: Payment processing, subscription billing, fraud detection

Business Systems:

  • Zoho Corporation: Customer relationship management (CRM)
  • Xero Limited: Accounting and invoicing

Communications:

  • Email service providers: Transactional and marketing email delivery
  • SMS providers: Multi-factor authentication and notifications

Analytics and Monitoring:

  • Analytics platforms: Usage analytics and platform performance monitoring (anonymized where possible)

Support and Collaboration:

  • Support ticketing systems: Customer support management
  • Video conferencing platforms: Training and customer success calls

Complete sub-processor list: Available at cybersmart360.com.au/sub-processors

Sub-Processor Requirements:
All service providers must:

  • Process data only according to our instructions
  • Implement appropriate security measures
  • Comply with applicable privacy and data protection laws
  • Have data processing agreements in place
  • Notify us of any sub-processor changes (30 days’ notice to customers)

3.3 Business Transfers

If CyberSmart360 is involved in a merger, acquisition, asset sale, or bankruptcy:

  • Your information may be transferred to the successor entity
  • We will notify you via email and prominent notice on our website
  • The successor entity must honor this Privacy Policy
  • You may have the right to delete your account before the transfer

3.4 Legal Requirements and Protection of Rights

We may disclose your information when required by law or to protect our rights:

Legal Obligations:

  • Complying with court orders, subpoenas, or legal process
  • Responding to lawful requests from government authorities
  • Meeting regulatory reporting requirements
  • Cooperating with law enforcement investigations

Protection of Rights:

  • Enforcing our Terms of Use and other agreements
  • Protecting against fraud, security threats, or illegal activity
  • Defending legal claims or litigation
  • Protecting the safety and rights of our users and the public

Transparency: Where legally permitted, we will notify you before disclosing your information to authorities.

3.5 With Your Consent

We may share information with third parties when you explicitly authorize us to do so:

  • Integrations you enable with third-party services
  • Sharing reports or assessments with specified recipients
  • Participating in partner programs or promotions
  • Authorized representatives or consultants you designate

3.6 Aggregated and Anonymized Data

We may share aggregated, anonymized, or de-identified data that cannot reasonably identify you:

  • Industry benchmarking and comparative analytics
  • Research and development
  • Marketing materials and case studies
  • Public reports on cybersecurity trends

This data is not considered “personal information” under Australian or EU law.


4. International Data Transfers

4.1 Data Storage Locations

Primary Data Storage:

  • Australian customers: Data stored in Digital Ocean data centers in Australia
  • EU customers: Data stored in Digital Ocean data centers in the EU (upon request)
  • Other regions: Data stored in nearest Digital Ocean region

Backup and Disaster Recovery:

  • Encrypted backups maintained in AWS data centers
  • Multi-region replication for Enterprise customers

4.2 Australian to International Transfers

APP 8 Compliance: When we transfer your personal information outside Australia, we take reasonable steps to ensure the recipient complies with the APPs.

Safeguards:

  • Binding contractual obligations requiring recipient to protect your information
  • Verification that destination country has substantially similar privacy protections
  • Your explicit consent for transfers (where required)

4.3 EU to Third Country Transfers (GDPR)

For EU/EEA/UK users, we ensure appropriate safeguards for international transfers:

Transfer Mechanisms:

1. Adequacy Decisions:

  • We monitor EU Commission adequacy decisions
  • Currently Australia does not have an adequacy decision; we rely on other mechanisms

2. Standard Contractual Clauses (SCCs):

  • We use EU Commission-approved Standard Contractual Clauses
  • SCCs are incorporated into agreements with all sub-processors
  • SCCs provide legally binding data protection obligations

3. Supplementary Measures:

  • Encryption in transit (TLS 1.3) and at rest (AES-256-GCM, ChaCha20-Poly1305)
  • Per-tenant encryption with isolated keys
  • Hardware Security Module (HSM) integration
  • Access controls and authentication requirements
  • Regular security audits and penetration testing
  • Transfer Impact Assessments (TIAs) conducted

4. Consent:

  • Where SCCs are not available, we obtain your explicit consent
  • You may withdraw consent at any time

Data Localization Options:

  • EU customers may request data storage within EU regions
  • Enterprise customers receive data residency guarantees

Transparency:


5. Data Security

5.1 Security Measures (APP 11 Compliance)

We implement comprehensive technical and organizational measures to protect your personal information:

Technical Measures:

Encryption:

  • TLS 1.3 with perfect forward secrecy for data in transit
  • AES-256-GCM and ChaCha20-Poly1305 encryption for data at rest
  • Per-tenant encryption with isolated keys
  • Hardware Security Module (HSM) integration for key management
  • Automated key rotation every 30 days

Access Controls:

  • Multi-factor authentication (MFA) mandatory for all users
  • Role-based access control (RBAC)
  • Principle of least privilege
  • Hardware token support (YubiKey) for administrative accounts
  • Single Sign-On (SSO) with SAML and Active Directory integration

Network Security:

  • Zero-trust architecture
  • Firewall and intrusion detection systems
  • DDoS protection
  • Penetration testing and vulnerability scanning
  • Security information and event management (SIEM)

Application Security:

  • Secure coding practices
  • Regular security code reviews
  • Dependency scanning and updates
  • SQL injection and XSS protection
  • OWASP Top 10 compliance

Infrastructure Security:

  • Database-per-tenant isolation
  • Immutable audit logs with cryptographic signing
  • Automated backup and disaster recovery
  • Multi-region redundancy
  • 99.9% uptime SLA (Enterprise tier)

Organizational Measures:

Policies and Procedures:

  • Information security policies and standards
  • Data handling and classification procedures
  • Incident response and breach notification plans
  • Business continuity and disaster recovery procedures

Personnel Security:

  • Background checks for employees with data access
  • Confidentiality and non-disclosure agreements
  • Privacy and security training (mandatory)
  • Access provisioning and de-provisioning procedures
  • Segregation of duties

Vendor Management:

  • Due diligence on all sub-processors
  • Data processing agreements with security requirements
  • Regular vendor security assessments
  • Incident notification obligations

Monitoring and Auditing:

  • 24/7 security monitoring
  • Real-time threat detection and response
  • Regular internal and external security audits
  • SOC 2 Type 1 certification (in progress)
  • Annual penetration testing

5.2 Your Security Responsibilities

You are responsible for:

  • Maintaining the confidentiality of your account credentials
  • Enabling multi-factor authentication
  • Using strong, unique passwords
  • Not sharing account access with unauthorized individuals
  • Promptly reporting suspected security incidents
  • Keeping your contact information current
  • Securing devices used to access the Service

5.3 Limitations

No Security is Absolute: While we implement industry-leading security measures, no system is completely secure. Internet-based systems are vulnerable to attacks despite our best efforts.

Third-Party Security: We are not responsible for the security practices of third-party services you integrate with the Platform.


6. Data Retention

6.1 Retention Principles

We retain personal information only for as long as necessary to fulfill the purposes for which it was collected, comply with legal obligations, resolve disputes, and enforce our agreements.

6.2 Retention Periods

Active Account Data:

  • Retained while your account is active
  • Profile and authentication data retained until account deletion

Assessment and Compliance Data:

  • Retained for 7 years after account closure to meet audit and compliance requirements
  • Enterprise customers may specify custom retention periods

Billing and Transaction Data:

  • Retained for 7 years to comply with Australian tax and accounting laws
  • Payment card data retained by Stripe according to PCI DSS requirements

Support and Communications:

  • Support tickets retained for 3 years
  • Chat logs retained for 2 years
  • Email communications retained according to business needs

Logs and Security Data:

  • System logs retained for 12 months
  • Security incident logs retained for 7 years
  • Audit trails retained for 7 years (immutable)

Backup Data:

  • Encrypted backups retained for 90 days
  • Disaster recovery backups retained according to Enterprise SLA

Marketing Data:

  • Marketing lists retained until you opt-out or account deletion
  • Analytics data (anonymized) may be retained indefinitely

6.3 Deletion Process

Upon account termination or deletion request:

30-Day Export Period:

  • You can export your data for 30 days after termination
  • Access available through account dashboard or by request

90-Day Deletion:

  • Personal information deleted within 90 days
  • Encrypted backups purged according to retention schedule

Exceptions:

  • Information retained if required by law (e.g., tax records, audit trails)
  • Aggregated, anonymized data may be retained indefinitely
  • Information necessary for legal claims or disputes

Verification:

  • We can provide confirmation of deletion upon request
  • Records maintained of deletion requests for compliance purposes

7. Your Privacy Rights

7.1 Australian Privacy Rights (APPs)

Right to Access (APP 12):
You may request access to your personal information we hold. We will provide access within 30 days unless a lawful exception applies.

Right to Correction (APP 13):
You may request correction of inaccurate or incomplete personal information. We will correct information within 30 days or provide reasons for refusal.

Right to Opt-Out:

  • Opt-out of marketing communications (any time)
  • Object to processing for direct marketing purposes
  • Opt-out of certain data sharing

Right to Make Complaints:
You may lodge complaints with:

7.2 GDPR Rights (EU/EEA/UK Users)

Right to Access (Article 15):

  • Confirmation of whether we process your personal data
  • Access to your personal data
  • Information about processing purposes, categories, recipients, and retention
  • Copy of data undergoing processing

Right to Rectification (Article 16):

  • Correct inaccurate personal data
  • Complete incomplete personal data

Right to Erasure / “Right to be Forgotten” (Article 17):

  • Request deletion of your personal data when:
    • No longer necessary for original purpose
    • You withdraw consent
    • You object and no overriding legitimate grounds exist
    • Data processed unlawfully
    • Required by legal obligation

Right to Restriction of Processing (Article 18):

  • Restrict processing when:
    • Accuracy is contested
    • Processing is unlawful but you oppose deletion
    • We no longer need the data but you need it for legal claims
    • You object to processing pending verification

Right to Data Portability (Article 20):

  • Receive your personal data in structured, commonly used, machine-readable format
  • Transmit data to another controller where technically feasible

Right to Object (Article 21):

  • Object to processing based on legitimate interests
  • Object to direct marketing (absolute right)
  • Object to profiling

Right Not to be Subject to Automated Decision-Making (Article 22):

  • Not subject to decisions based solely on automated processing with legal or significant effects
  • Right to human intervention and explanation

Right to Withdraw Consent (Article 7(3)):

  • Withdraw consent at any time where processing is based on consent
  • Withdrawal does not affect lawfulness of processing before withdrawal

Right to Lodge Complaint with Supervisory Authority (Article 77):

7.3 How to Exercise Your Rights

Self-Service Options:

  • Account dashboard: Update profile, preferences, and settings
  • Export data: Download your assessments and reports
  • Delete account: Initiate account deletion process

Email Requests:
Send requests to: privacy@cybersmart360.com.au

Include in Your Request:

  • Your name and contact information
  • Description of your request
  • Specific data or processing you’re inquiring about
  • Account verification information

Response Timeframes:

  • Australian requests: 30 days
  • GDPR requests: 1 month (extendable by 2 months for complex requests)
  • We will acknowledge receipt within 5 business days

Verification:
We may request additional information to verify your identity before fulfilling requests.

Free of Charge:
Requests are generally processed free of charge. We may charge reasonable fees for manifestly unfounded, excessive, or repetitive requests.

Limitations:
We may refuse requests where:

  • Legal obligations require us to retain information
  • Information is necessary for legal claims
  • Overriding legitimate grounds exist
  • Required by law

8. Cookies and Tracking Technologies

8.1 What Are Cookies?

Cookies are small text files stored on your device when you visit websites. They help websites remember information about your visit.

8.2 Types of Cookies We Use

Strictly Necessary Cookies (No Consent Required):

  • Authentication and session management
  • Security and fraud prevention
  • Load balancing and performance
  • Core platform functionality

Functional Cookies:

  • User preferences and settings
  • Language selection
  • Notification preferences
  • UI customization

Analytics Cookies (With Consent):

  • Usage statistics and patterns
  • Feature adoption and engagement
  • Error tracking and debugging
  • Performance monitoring

Marketing Cookies (With Consent):

  • Advertising campaign effectiveness
  • Remarketing and retargeting
  • Social media integration
  • Third-party analytics

8.3 Similar Technologies

Local Storage:

  • Storing application data for offline functionality
  • Caching for improved performance
  • Progressive Web App functionality

Web Beacons / Pixels:

  • Email open tracking (marketing emails only)
  • Page view analytics
  • Conversion tracking

Mobile Device Identifiers:

  • Device-specific identifiers for mobile apps
  • Push notification tokens
  • Crash reporting identifiers

8.4 Managing Cookies

Browser Controls:

  • Most browsers allow you to refuse or delete cookies
  • Settings vary by browser (Chrome, Firefox, Safari, Edge)
  • Blocking strictly necessary cookies may affect functionality

Cookie Consent Manager:

  • Accessible via our cookie banner and privacy settings
  • Granular control over cookie categories
  • Withdraw consent at any time

Do Not Track:

  • We respect Do Not Track browser signals
  • When enabled, we disable non-essential tracking

Mobile App Settings:

  • Control permissions in device settings
  • Limit ad tracking in iOS/Android settings
  • Opt-out of analytics in app preferences

8.5 Third-Party Cookies

We use services that may set their own cookies:

  • Google Analytics (if enabled)
  • Social media platforms (if you interact with embedded content)
  • Payment processors (Stripe)
  • Authentication providers (Auth0)

These third parties have their own privacy policies.


9. Children’s Privacy

9.1 Age Restrictions

The Service is designed for business use and not intended for children under 18 years of age.

We do not knowingly collect personal information from children under 18.

9.2 Parental Consent

If we become aware that we have collected personal information from a child under 18 without parental consent, we will take steps to delete that information promptly.

9.3 Stronger Protections for Children (Privacy Act 2024 Reforms)

Australian privacy law reforms introduce enhanced protections for children’s personal information. We have implemented additional safeguards consistent with these reforms.

9.4 Reporting

If you believe a child under 18 has provided personal information to us, please contact privacy@cybersmart360.com.au immediately.


10. Data Breach Notification

10.1 Australian Notifiable Data Breaches Scheme

What is a Notifiable Data Breach?
Under the Privacy Act, an “eligible data breach” occurs when:

  • Unauthorized access, disclosure, or loss of personal information occurs
  • The breach is likely to result in serious harm to affected individuals
  • Remedial action has not prevented the likelihood of serious harm

Our Obligations:

  • Assess suspected breaches within 30 days
  • Notify OAIC within 72 hours of determining an eligible data breach
  • Notify affected individuals as soon as practicable
  • Prepare a statement containing required information

What We Will Tell You:

  • Description of the breach
  • Types of information involved
  • Recommendations for steps you should take
  • Contact information for inquiries

10.2 GDPR Personal Data Breach Notification

Notification to Supervisory Authority:

  • Within 72 hours of becoming aware of a breach
  • Description of nature, categories, and approximate numbers affected
  • Contact point for more information
  • Likely consequences and measures taken

Notification to Data Subjects:

  • Without undue delay if breach poses high risk
  • Clear and plain language description
  • Name and contact details of Data Protection Officer
  • Likely consequences of breach
  • Measures taken or proposed

Documentation:

  • All breaches documented whether notifiable or not
  • Facts, effects, and remedial action recorded

10.3 Security Incident Response

Our Process:

  1. Detection: 24/7 monitoring detects potential incidents
  2. Assessment: Security team assesses severity and impact
  3. Containment: Immediate action to contain and mitigate
  4. Investigation: Forensic analysis to determine scope
  5. Notification: Notifications sent per legal requirements
  6. Remediation: Long-term fixes and improvements
  7. Review: Post-incident review and lessons learned

Your Actions:
If you suspect unauthorized access to your account:

  1. Change your password immediately
  2. Enable MFA if not already active
  3. Review account activity logs
  4. Contact security@cybersmart360.com.au

11. Changes to This Privacy Policy

11.1 Right to Modify

We may update this Privacy Policy from time to time to reflect changes in:

  • Our information practices
  • Legal or regulatory requirements
  • Platform features and functionality
  • Business operations

11.2 Notice of Changes

Material Changes:

  • Email notification to registered email address
  • Prominent notice on Platform
  • At least 30 days’ notice before effective date
  • Summary of key changes provided

Non-Material Changes:

  • Updated “Last Updated” date
  • Notice in account dashboard
  • Available in version history

11.3 Your Options

If you do not agree with changes:

  • You may delete your account before changes take effect
  • Contact privacy@cybersmart360.com.au with concerns
  • For GDPR users, you may withdraw consent or object to processing

Continued use of the Service after the effective date constitutes acceptance of the updated Privacy Policy.

11.4 Version History

Previous versions available upon request at privacy@cybersmart360.com.au.


12. Contact Information and Complaints

12.1 Privacy Contact Details

CyberSmart360 Pty Ltd
ABN: [To be assigned]

Privacy Officer / Data Protection Officer:
Email: privacy@cybersmart360.com.au
Phone: 1300 CYBER 360

Postal Address:
[Physical Address]
Northern Territory, Australia

Office Hours: Monday-Friday, 9 AM – 5 PM ACST

12.2 GDPR-Specific Contacts

EU Representative: [If appointed under GDPR Article 27]
UK Representative: [If appointed under UK GDPR]

12.3 Making a Privacy Complaint

Step 1: Contact Us

  • Email privacy@cybersmart360.com.au with details of your complaint
  • Include your name, contact information, and description of issue
  • Provide any relevant documentation

Step 2: Our Investigation

  • We will acknowledge receipt within 5 business days
  • Conduct investigation within 30 days
  • Provide written response with outcome and reasons

Step 3: External Complaints

Australian Users:

Office of the Australian Information Commissioner (OAIC)
Website: www.oaic.gov.au
Phone: 1300 363 992
Email: enquiries@oaic.gov.au
Online: www.oaic.gov.au/privacy/privacy-complaints

European Union Users:

Contact your local supervisory authority:

UK Users:

Information Commissioner’s Office (ICO)
Website: www.ico.org.uk
Phone: 0303 123 1113
Online: ico.org.uk/make-a-complaint


13. Additional Information

13.1 Privacy by Design and Default

We implement privacy by design principles:

  • Data minimization (collect only what’s necessary)
  • Purpose limitation (use only for specified purposes)
  • Storage limitation (retain only as long as needed)
  • Accuracy (maintain accurate, up-to-date information)
  • Integrity and confidentiality (appropriate security measures)

Default settings prioritize privacy protection.

13.2 Data Protection Impact Assessments (DPIAs)

We conduct DPIAs for processing activities likely to result in high risk to privacy, including:

  • Large-scale processing of sensitive data
  • Systematic monitoring
  • Automated decision-making with legal effects
  • New technologies with privacy implications

DPIA summaries available upon request for Enterprise customers.

13.3 Transparency Reports

We publish annual transparency reports disclosing:

  • Number and types of data access requests received from authorities
  • Number of data breach notifications
  • Privacy complaints and resolutions
  • Security incidents and responses

Available at: cybersmart360.com.au/transparency

13.4 Certifications and Compliance

Current:

  • ISO/IEC 27001 preparation underway
  • SOC 2 Type 1 audit in progress
  • OWASP compliance
  • PCI DSS Level 1 (via Stripe)

Planned:

  • SOC 2 Type 2 certification
  • ISO/IEC 27001 certification
  • Privacy Shield alternative certification (when available)

13.5 Privacy Training

All employees with access to personal information receive:

  • Mandatory privacy and data protection training
  • Regular security awareness training
  • Role-specific compliance training
  • Annual refresher courses

14. Definitions

Personal Information / Personal Data: Information or opinion about an identified individual or an individual who is reasonably identifiable.

Sensitive Information / Special Category Data: Personal information revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, genetic data, biometric data, health data, sex life, or sexual orientation.

Processing: Any operation performed on personal information, including collection, recording, organization, storage, adaptation, alteration, retrieval, consultation, use, disclosure, dissemination, restriction, erasure, or destruction.

Controller: Entity determining purposes and means of processing personal data.

Processor: Entity processing personal data on behalf of a controller.

Data Subject: Individual to whom personal data relates.

Consent: Freely given, specific, informed, and unambiguous indication of agreement to processing of personal data.

Supervisory Authority: Independent public authority responsible for monitoring GDPR compliance.


15. Acknowledgment

By using the Service, you acknowledge that you have read and understood this Privacy Policy and agree to our collection, use, and disclosure of your personal information as described.

If you have questions or concerns about this Privacy Policy or our privacy practices, please contact privacy@cybersmart360.com.au.


Last Updated: October 21, 2025
Version: 1.0

Privacy Policy History: Available upon request at privacy@cybersmart360.com.au