10 Privacy Principles
Austco Communication Systems Pty Ltd and its related entities. (“The Company”) is committed to maintaining the accuracy, confidentiality, and security of your personal information. As part of this commitment, the following Ten Privacy Principles govern our actions as they relate to the use of customer information.The principles have been built upon the values set by International Standards Codes for the Protection of Personal Information and Personal Information Protection and Electronic Documents disclosures.
Principle 1 – Accountability
The company is responsible for maintaining and protecting the personal information under its control. The company has designated an individual or individuals who is/are accountable for compliance with the Ten Privacy Principles.
Principle 2 – Identifying Purposes
The purposes for which personal information is collected will be identified before or at the time the information is collected.
Principle 3 – Consent
Knowledge and consent are required for the collection, use or disclosure of personal information except where required or permitted by law.
Principle 4 – Limiting Collection
The personal information collected must be limited to those details necessary for the purposes identified by The Company.
Principle 5 – Limiting Use, Disclosure and Retention
Personal information may only be used or disclosed for the purpose for which it was collected unless you have otherwise consented, or when it is required or permitted by law. Personal information may only be retained for the period of time required to fulfil the purpose for which it was collected or as required by law.
Principle 6 – Accuracy
Personal information must be maintained in as accurate, complete and up-todate form as is necessary to fulfil the purposes for which it is to be used.
Principle 7 – Safeguarding Customer Information
Personal information must be protected by security safeguards that are appropriate to the sensitivity level of the information.
Principle 8 – Openness
The company will make information available to our customers concerning the policies and practices that apply to the management of their personal information.
Principle 9 – Customer Access
Upon request, a customer shall be informed of the existence, use and disclosure of their personal information, and shall be given access to it. Customers may verify the accuracy and completeness of their personal information, and may request that it be amended, if appropriate.
Principle 10 – Handling Customer Complaints and Suggestions
What Information is Collected?
At The Company, we gather and use personal information to provide you with the merchant services you have requested and to offer you additional products and services we believe you might be interested in. Providing us with your personal information is always your choice. Most of the information we collect comes to us directly from you, and only with your consent. For example, when you request products or enrol for a service by telephone, online, or in person, we will ask you to provide the information that enables us to complete your request or to provide you with better service. The types of personal information we may ask for depends on the nature of your request. Personal information that is essential for completing an application or credit application for merchant services typically includes name, home address, home telephone number, title, social insurance number, date of birth and bankruptcy history of the individual(s) entering into the merchant agreement and other owners, partners, officers or directors of the merchant. We may also request additional information to help us contact you, provide you with advice about our services and information about other products and services that we believe would interest you. When you visit The Company website, information is not collected that could identify you personally unless you choose to provide it voluntarily. You are welcome to browse the Web site at any time anonymously and privately without revealing any personal or financial information about yourself. For purposes of maintaining quality service, calls to our customer service lines may be recorded. A recorded message given prior to your call being answered will let you know if your call may be the subject of our random call recording quality assurance program.
Types of Information we collect
The type of information you will be asked to provide will vary according to your activity or request.
- Applying for merchant services
- Applying for other products and services
- Customer service
- Changing your merchant services
- Browsing The Company web site
Personal information is information that refers to you specifically. With your consent, we may gather personal information from you in person, over the telephone or by corresponding with you via mail, facsimile, the Internet, or from referrals by third parties such as your financial institution. The type of information we usually collect and maintain in your customer file may include your:
- Name/ Business Name
- Mailing Address
- Location Addresses
- E-mail Address
- Web Address
- Telephone Number
- Signing Officers Information, including name, title, home mailing address, home
- phone number and date of birth)
- Social Insurance Number
- Credit History
- Name(s) of Owner(s), Officer(s) and Director(s)
- Business Activity
- Industry Type
- Financial Status
- Financial Institution Information
The choice to provide us with personal information is always yours. However, your decision to withhold particular details may limit our ability to provide you with merchant services. If we are unable to accommodate your request based on the information that has been provided to us, we may ask for additional details in order to identify other ways to be of assistance. In some instances, The Company may also maintain a file containing contact history that is used for customer inquiry purposes.
At the company, we routinely collect anonymous/non-personal information. Anonymous/non-personal information is information that we do not associate with or trace back to a specific individual or business entity. For example, our web servers collect some anonymous/non-personal information automatically when you visit The Company web site. Gathered electronically, this information may include the pages you visited, the type of web browser you are using, the level of encryption your browser supports and your Internet Protocol address. The anonymous/non-personal information collected may be used for research and analytical purposes and occasionally for security investigations. To help us better understand our markets, we may also gather information for analytical purposes by conducting customer surveys, and by extracting demographic information from existing files.
How your information is used
- We use personal information to communicate with you, process applications and ultimately to provide you with the services you have requested.
- We use anonymous/non-personal information to improve our products and services.
We use your personal information to communicate with you, process applications and effectively provide the services you have requested. We use the personal information you have provided to us to communicate with you and safeguard your interests. We will keep you informed about your merchant account activities, send you important notices, and respond to any special needs or enquiries you may have. With your consent, we may also send you information about other products and services in which we believe you may be interested. We only use personal information for the purposes that we have disclosed to you. If for any reason your information is required to fulfil a different purpose, we will obtain your consent before we proceed.
The anonymous/non-personal information gathered from The Company web site is used primarily for technical, research and analytical purposes like evaluating the various sections of the web site. This information does not include any personal information and it is only retained until its intended purpose is fulfilled. It is our goal to continuously improve our service offerings to you. Therefore, we use anonymous/non-personal information collected from surveys, from public archives and by extracting information from existing files to better understand our customers’ interests, priorities, and satisfaction levels
When Information May be Disclosed to Outside Parties
We are obliged to keep your personal information confidential except under the following special circumstances:
- When authorized by you
- When required by law
- When permitted by law
Our merchant agreement and related agreements outline the terms and conditions associated with services provided by us. In general, they establish the rights and obligations of the parties as they relate to the provision of our services. With respect to the matter of privacy, the merchant agreement authorizes us to use the personal information to respond to any application for our services and to provide our services to you, as well as in the following ways:
- to determine your financial situation by collecting credit and related financial information from our affiliates, strategic partners, credit agencies, other financial institutions and from references provided by you
- to facilitate the provision of our services by sharing your information with our third party service providers, credit agencies and similar parties
- to investigate potentially fraudulent or questionable activities regarding your merchant account(s) or the use of our services
- to offer you related products and services that might benefit you; and in the course of an actual or potential sale, reorganization, consolidation, merger or amalgamation of our business. In addition we may also collect, use and disclose personal information when required or permitted by law. In some cases, such as when you apply for merchant services over the telephone, your consent to the use and/or disclosure of your information will be obtained verbally. In other cases, your consent may be obtained in writing or electronically, such as through the completion of a credit application.
When Required by Law
The type of information we are legally required to disclose may relate to criminal investigations or government tax reporting requirements. In some instances such as a legal proceeding or court order, we may also be required to disclose certain information to authorities. Only the information specifically requested is disclosed and we take precautions to satisfy ourselves that the authorities that are making the request have legitimate grounds to do so.
When Permitted by Law
There are some situations where we are legally permitted to disclose personal information such as employing reasonable and legal methods to enforce our rights under our merchant agreement, to collect a delinquent account or investigate suspicion of illegal activities.
With whom your information may be shared
With your consent we will share information with suppliers who perform services on our behalf. Unless you authorize us to release it, or release is required or permitted by law, we never sell, lease or trade information about you or your accounts to other parties.
Outside Service Suppliers
At The Company, we sometimes contract outside organizations to perform specialized services such as repair work. Our trusted service suppliers may at times be responsible for processing and handling some of the information we receive from you. When we contract our suppliers to provide specialized services, they are given only the information necessary to perform those services. Additionally, they are prohibited from storing, analyzing or using that information for purposes other than to carry out the service they have been contracted to provide. In fact, our suppliers are bound by strict contractual obligations that have been designed to protect the privacy and security of your information. Furthermore, as part of our contract agreements, our suppliers and their employees are required to protect your information in a manner that is consistent with the privacy policies and practices that we have established.
How We Safeguard Your Information
We use state-of-the-art technologies and maintain current security standards to ensure that your personal information is protected against unauthorized access, disclosure, inappropriate alteration or misuse. All safety and security measures are also appropriate to the sensitivity level of your information.
Electronic customer files are kept in a highly secured environment with restricted access. Paper-based files are stored in locked filing cabinets. Access is also restricted.
We manage our server environment appropriately and our firewall infrastructure is strictly adhered to. Our security practices are reviewed on a regular basis and we routinely employ current technologies to ensure that the confidentiality and privacy of your information is not compromised. The Company web site uses Secure Socket Layer (SSL) and 128 bit encryption technologies to enhance security when you visit the secured areas of these sites. SSL is the industry standard tool for protecting and maintaining the security of message transmissions over the Internet. When you access your accounts or send information from secured sites, encryption will scramble your data into an unreadable format to inhibit unauthorized access by others. To safeguard against unauthorized access to your accounts, you are required to “sign-on” using a user id and a password to certain secured areas of The Company web site. Both user id and password are encrypted when sent over the Internet. If you are unable to provide the correct password, you will not be able to access these sections. When you call our customer service centre you will be required to verify your identity by providing some personally identifying information as well as your merchant number.
How You Can Protect Your Information
We do our utmost to protect and safeguard your personal and financial information. We believe there are measures you should take as well. The following is a list of things you can do to protect yourself against fraud and uninvited intrusion.
Passwords are necessary to identify you and authenticate your permission to access your merchant accounts online. The passwords you use are encrypted. Encryption is presently the most effective way to achieve data security. Just as it is important for us to employ strict procedures to safeguard your information, you also should take precautions in handling your passwords. When selecting a password, we suggest that you use a combination of letters and numbers and do not use words that can be easily associated with you such as the name of a family member, a pet or the street on which you live. We also suggest that you change your password regularly.
You should not share personal information with others unless you clearly understand the purpose of their request and you know who you are dealing with.
Your Online Security
To make sure your connection to the protected areas of The Company web site is secure, look for either a ‘closed lock’ or an ‘unbroken key’ icon located at the bottom right hand side of your browser’s task bar. You may also check the Address bar to determine if SSL (Secure Socket Layer) is active by looking at the beginning of the address. If it starts with “https” rather than the standard “http”, then SSL is operating.
Accessing and Amending Your Information
At The Company, decisions are made based on the information we have. Therefore, it is important that your personal information is accurate and complete. As a customer, you have the right to access, verify and amend the information held in your personal and financial files.
Accessing Your Information
You may access and verify any of your information by calling our customer service centre at www.austco.com.
Amending Your Information
To help us keep your personal information up-to-date, we encourage you to amend inaccuracies and make corrections as often as necessary. Despite our efforts, errors sometimes do occur. Should you identify any incorrect or out-of- date information in your file(s), we will make the proper changes. Where appropriate, we will communicate these changes to other parties who may have unintentionally received incorrect information from us.
To Make a Change
To make a change to the personal contact information contained in your file, you may do so using our contact page to request a change in your personal contact information. In each case, you will be required to verify your identity by providing some personally identifying information.
A cookie is a small text file containing a unique identification number that a web site sends to your computer’s web browser. While you visit a particular site, a cookie may be used to track the activities of your browser as well as provide you with a consistent, more efficient experience. There are two common types of cookies: persistent and non-persistent. Persistent cookies are stored on your computer’s hard drive where they remain resident until they are either deleted or they reach a predetermined expiration date. Persistent cookies are most commonly used to provide visitors with a customized experience by recording preferences such as how a visitor prefers to have web pages displayed. Additionally, cookies are commonly used to gather statistical information such as the average time spent on a particular page. This kind of information is valuable for several reasons, including providing insight on how to improve the design, content and navigation of a web site. Non-persistent cookies do not permanently record data and they are not stored on your computer’s hard drive. Rather, non-persistent cookies are stored in memory and are only available during an active session. Once a session ends, the cookie disappears. Non-persistent cookies are used primarily for technical reasons such as providing seamless navigation.
Why Were Cookies Created?
The world wide web uses the Hypertext Transfer Protocol (HTTP) to govern how files such as graphics, text and sound are exchanged over the Internet. This protocol treats every action (e.g. mouse click) independently making the nature of the web ‘stateless’. This means that every time you click on a new page for instance, a new connection is established and all previous activity is forgotten.To provide visitors with a more uniform experience, cookies were used originally to maintain relevant information as visitors viewed various pages of a web site. In effect, cookies were created to bring state and consistency to the ‘stateless’ environment of the web.
How Do Cookies Work?
The first time you visit a web site, you may be sent a cookie that contains a unique identification number that can be easily retrieved during future visits. Cookies are used for different purposes such as remembering how you want a home page to look. When you type the web site address in the address bar of your browser, your browser will contact the site you’ve entered and request its home page. The browser will search your hard drive for a cookie that may have been sent during a previous visit. If a cookie is found, the browser will send any information gathered from a previous visit to the web server. If a cookie is not found, then the browser will know you have not visited the site before. On The Company web site, cookies are used to increase robustness and to provide more efficient navigation. Cookies cannot view or retrieve data from other cookies, nor can they capture files and data stored on your computer.
How Cookies are used
Cookies may be used by The Company web site to improve functionality and in some cases, to provide visitors with a customized online experience.
To Improve Functionality
Non-persistent cookies may be used to improve operations and functionality. For example, cookies improve navigation, maintain connectivity and ensure online service sessions are secured. They do not contain personal information and they are not permanently stored for future use.
Persistent cookies may be used as a means of offering visitors a personalized experience.
How Cookies are not used
Web Site Tracking (What sites you go to)
Cookies or other information tracking technologies are not used to follow the surfing behaviour of visitors once they leave The Company web site. Additionally, tracking information that may be gathered during a visit to The Company web site will not be used for promotional purposes.
User IDs and Passwords
For added security, cookies are not used to remember usernames and passwords when accessing highly secured pages on The Company’ Merchant Direct site. You will be required to provide this information each time you log-onto a secure online service page.
Aggregated Analysis Attributable to an Individual Account
The Company does not associate any of the information collected via cookies with your personal information.
Maintaining Personal Information in a Cookie
Cookies cannot be used to gather sensitive information about you or data residing on your computer. These cookies are not designed to identify you personally; rather they are intended to enhance navigation of your session.
What are Your Choices in Relation to Cookies?
Questions, Concerns and Complaints
If you have a question about the privacy policies, please call us at 416-932-2080.If you have a concern or complaint about privacy, confidentiality or the personal information handling practices of The Company, our employees or service suppliers, please contact: Privacy Officer Austco (in your designated country).
Other Web Sites
Effective starting: Jan 1, 2017
Austco is committed to keep our products and services running smoothly, quickly, and without distraction. For this to happen, we need help from you, our users. We need you not to misuse or abuse our products and services.
To describe exactly what we mean by “misuse” or “abuse” – and help us identify such transgressions, and react accordingly – we’ve created this Acceptable Use Policy. Under this policy, we reserve the right to remove content that is inconsistent with the spirit of the guidelines, even if it’s something that is not forbidden by the letter of the policy. In other words, if you do something that isn’t listed here verbatim, but it looks or smells like something listed here, we may still remove it.
You’ll see the word “services” a lot throughout this page. That refers to all websites owned or operated by Austco (such as Tacera Pulse.com, and any related websites, sub-domains and pages) as well as any hosted services operated by Austco (such as Tacera Pulse Cloud offerings).
Use your judgment, and let’s be kind to each other so we can keep creating great things. You can find all the legal fine print at the bottom of this page.
Here’s what we won’t allow:
- Compromising the integrity of our systems. This could include probing, scanning, or testing the vulnerability of any system or network that hosts our services.
- Tampering with, reverse-engineering, or hacking our services, circumventing any security or authentication measures, or attempting to gain unauthorized access to the services, related systems, networks, or data
- Modifying, disabling, or compromising the integrity or performance of the services or related systems, network or data
- Deciphering any transmissions to or from the servers running the services
- Overwhelming or attempting to overwhelm our infrastructure by imposing an unreasonably large load on our systems that consume extraordinary resources (CPUs, memory, disk space, bandwidth, etc.), such as:
- Using “robots,” “spiders,” “offline readers,” or other automated systems to sends more request messages to our servers than a human could reasonably send in the same period of time by using a normal browser
- Going far beyond the use parameters for any given service as described in its corresponding documentation
- Consuming an unreasonable amount of storage for music, videos, pornography, etc., in a way that’s unrelated to the purposes for which the services were designed
2. Wrongful activities
- Misrepresentation of yourself, or disguising the origin of any content (including by “spoofing”, “phishing”, manipulating headers or other identifiers, impersonating anyone else, or falsely implying any sponsorship or association with Austco or any third party)
- Using the services to violate the privacy of others, including publishing or posting other people’s private and confidential information without their express permission, or collecting or gathering other people’s personal information (including account names or information) from our services
- Using our services to stalk, harass, or post direct, specific threats of violence against others
- Using the Services for any illegal purpose, or in violation of any laws (including without limitation data, privacy, and export control laws)
- Accessing or searching any part of the services by any means other than our publicly supported interfaces (for example, “scraping”)
- Using meta tags or any other “hidden text” including Austco’s or our suppliers’ product names or trademarks
3. Inappropriate communications
- Using the services to generate or send unsolicited communications, advertising, chain letters, or spam
- Soliciting our users for commercial purposes, unless expressly permitted by Austco
- Disparaging Austco or our partners, vendors, or affiliates
- Promoting or advertising products or services other than your own without appropriate authorization
4. Inappropriate content
Posting, uploading, sharing, submitting, or otherwise providing content that:
- Infringes Austco or a third party’s intellectual property or other rights, including any copyright, trademark, patent, trade secret, moral rights, privacy rights of publicity, or any other intellectual property right or proprietary or contractual right
- You don’t have the right to submit
- Is deceptive, fraudulent, illegal, obscene, defamatory, libelous, threatening, harmful to minors, pornographic (including child pornography, which we will remove and report to law enforcement, including the National Center for Missing and Exploited Children), indecent, harassing, hateful
- Encourages illegal or tortious conduct or that is otherwise inappropriate
- Attacks others based on their race, ethnicity, national origin, religion, sex, gender, sexual orientation, disability, or medical condition
- Contains viruses, bots, worms, scripting exploits, or other similar materials
- Is intended to be inflammatory
- Could otherwise cause damage to Austco or any third party
In this Acceptable Use Policy, the term “content” means: (1) any information, data, text, software, code, scripts, music, sound, photos, graphics, videos, messages, tags, interactive features, or other materials that you post, upload, share, submit, or otherwise provide in any manner to the services and (2) any other materials, content, or data you provide to Austco or use with the Services.
Without affecting any other remedies available to us, Austco may permanently or temporarily terminate or suspend a user’s account or access to the services without notice or liability if Austco (in its sole discretion) determines that a user has violated this Acceptable Use Policy.
End of Life
Austco strives to deliver the most innovative and cost effective products, and therefore will periodically elect to discontinue specific products. Products reach the end of their Product Life Cycle for a number of reasons. These reasons may be due to market demands, technology innovation and development driving changes in the product, or the products simply mature over time and are replaced by functionally richer technology. While this is an established part of the overall product life cycle, Austco recognizes that end-of-life milestones often prompt companies to review the way in which such end-of-sale and end-of-life milestones impact the Austco products in their facilities. With that in mind, we have set out below Austco’s end-of-life policy to help customers better manage their end-of-life transition and to understand the role that Austco can play in helping to migrate to alternative Austco platforms and technology.
The End of Life Policy only applies to End of Life and End of Sale announcements made in all Theaters on or after June 30, 2016 for all Austco product lines. The Policy does not apply to product that is already subject to an End of Life and/or End of Sale announcement.
The general policy guidelines are:
- As a general rule, Austco will provide at least 6 months’ notice of the affected product’s end-of-sale date and/or the last day when the affected product can be ordered. This notice will appear on Austco.com on the product end-of-sale and end-of-life page. and we encourage you to visit this site regularly as it contains useful information regarding Austco’s end-of-life program.
- Access to Austco’s Technical Assistance Center (TAC) will be available 24 hours a day, seven days a week for a period of 5 years from the end-of-sale date for hardware and operating system software issues and for a period of at least 4 years from the end-of-sale date for application software issues.
- Spares or replacement parts for hardware will be available for a period of 5 years from the end-of-sale date. We will provide spares and replacement parts in accordance with our Return Materials Authorization (RMA) process.
- Software support will be as follows:
- For the first year following the end-of-sale date, we will provide bug fixes, maintenance releases, work arounds, or patches for critical bugs reported via the TAC or Austco Customer Support site.
- After the first year and for Operating System SW -where available- we will provide bug fixes, maintenance releases, workarounds or patches for a period of 4 years for operating system software. Bear in mind that it may be necessary to use software upgrade release to correct a reported problem.
- After the first year and for Application SW -where available – we will provide bug fixes, maintenance releases, workarounds or patches for a period of 3 years for application software. Bear in mind that it may be necessary to use software upgrade release to correct a reported problem.
- You will need to ensure that you have a current and fully paid support contract with Austco. Please contact your Support Account Manager regarding fees payable during the end-of-life period so that we can support you right through the end-of-life transition period.
- Below are guidelines that should be followed to ensure that you receive effective support for the affected products within your network:
- For hardware or software that is not covered under a service contract, customers may add the product(s) to a current contract or purchase a new contract until 12 months after the end-of-sale date.
- Service contracts that have not been renewed or have lapsed after 12 months of end-of-sale date are not re-newable.
- Renewal of your service contract will generally be available until the last year of support, but will not extend beyond the last date of support.
|Milestone||>= -6 mos||Day 0||1 Year||2 Year||3 Year||4 Year||5 Year|
|End-of-Sale Notice Period||End-of-sale date|
|Operating System Software maintenance support||See 4(a)||See 4(b)||above|
|Add or attach new service contracts|
|Renew service contracts – for HW & Operating System SW|
|Hardware Repair or Replacement|
|Customer Service and Support of HW & Operating System SW (TAC access & support)|
|Application Software maintenance support||See 4(a)||See 4(c)||above|
|Renew service contracts – for Application SW|
|Customer Service and Support of Application SW
(TAC access & support)
End-of-Life Cycle: A process that guides the final business operations associated with the product life cycle. The end-of-life process consists of a series of technical and business milestones and activities that, once completed, make a product obsolete. Once obsolete, the product is not sold, manufactured, improved, repaired, maintained, or supported.
End-of-Sale date:: The last date to order the product through Austco point-of-sale mechanisms. The product is no longer for sale.
End-of-Life: The last day that a product will be supported by Austco.
Hardware: The physical product and its physical components.
Operating System/Firmware Software: Austco operating system or firmware software that runs on Austco hardware
Application software: Austco software that requires the presence of some non-Austco operating system software.
Software Maintenance support: The time period that Austco may release any software maintenance releases or bug fixes to the software product. After this date, Austco Engineering will no longer develop, repair, maintain, or test the product software.