Security Policy

Security Policy main image Security Policy image

Delzani is committed to providing you with a high level of customer service. This includes protecting and maintaining the privacy, accuracy and security of your personal information. We are bound by and will abide by the National Privacy Principles in the Privacy Act (Cth) 1988. This is in addition to our existing obligations under the Privacy Act.

Security

Delzani takes reasonable steps to ensure that your personal information is secure. We have robust systems and procedures in place to protect your privacy whenever we collect, store and use or disclose personal information. We are continually upgrading these systems and reviewing our procedures to ensure the highest standards of security are used to protect your personal information.

We take all reasonable steps to keep secure any information which we hold about you. Personal information may be stored both electronically on our computer system, and in hard-copy form. Firewalls, 2048 Bit v3 SSL encryption, passwords, anti-virus software and email filters act to protect all our electronic information.

We do not store credit card information, we securely submit credit card information to our bank for processing.

How to access and amend personal information

If you wish to obtain a copy of our data privacy policy, access the personal information we hold about you or your personal information is inaccurate, incomplete outdated or to unsubscribe, please direct any queries regarding your privacy rights via email 

The release of information is subject to some exceptions such as information relating to existing or any anticipated legal proceedings, together with exceptions provided by the Privacy Act. Our objective is to respond to any request within a reasonable timeframe and no later than 30 days.

How your information may be shared

Except for the purposes outlined in the Delzani Privacy Policy, we never sell or disclose your personal information. However, we may release personal information under the following circumstances:

  • when requested by the courts or laws (for example, a subpoena) or regulation or is requested by a government agency;
  • where we deem a company or an individual may be engaged in fraudulent activity or other deceptive practices that a governmental agency should be made aware of; and/or to appropriate persons, where your communication suggests possible harm to others.