Terms and Conditions

General information:

Welcome to our Privacy Policy page.

When you use our website, products, and services, you trust us with your information. This Privacy Policy is meant to help you understand what data we collect, why we collect it, and what we do with it.

When you share information with us, we can make our products and services even better. E.g., we can show you more relevant ways to address cyber risks, improve our ability to answer your queries and help you connect with other companies to make collaboration with our alliance partners quicker and easier.

As you use our products and services, we want you to be clear in how we use your information and the ways in which you can protect your privacy. This is important, and we hope you will take time to read this carefully. Remember, you can find controls to manage your information and protect your privacy and security and you can provide feedback.

Right to access, correct and delete data and to object to data processing:

Our clients have the right to access, correct and delete their own personal data, and to object to the processing of such data, by addressing a written request, at any time to us at:

enquiries@totalcyber.com.au

We make every effort to put in place suitable precautions to safeguard the security and privacy of our clients’ Personally Identifiable Information (PII), and to prevent it from being altered, corrupted, destroyed or accessed by unauthorised third parties.

However, totalCyber does not control each and every risk related to the use of the internet, and therefore warns its clients of the potential risks involved in the functioning and use of the internet.

Our website, web portal, products, tools, and solutions may include links to other websites or other internet sources. totalCyber cannot control these websites and external sources, we cannot be held responsible for the provision or display of these web sites and external sources, and may not be held liable for the content, advertising, products, services, or any other material available on and/or from these web sites or external products, tools, solutions, and their ability to access your personally identifiable data (PII).

Management of personal data:

You can view or edit your PII and any data online for many of our products and services. You can also make choices about our collection and use of your data. How you can access or control your PII will depend on which services you use.

Information We Collect:

Our products, tools, and solutions collect data to operate effectively and provide our clients and our alliance partners an optimised user experience. You may provide some of this data directly, such as when you create a personal account. We get some of it by recording how you interact with our services, for example, by using technologies like cookies, and receiving error reports or usage data from software running on your device. We may also obtain data from third parties (including our alliance partners). For example, we supplement the data we collect by purchasing relevant data from third parties. The data we collect on you may depend on the products, services, and features you use.

How We Use Your Information:

Our web site uses the data we collect for the following purposes:

  • to help you improve your cyber risk resilience and your ability to react to a cyber threat and/or cyber breach;
  • to operate our business and provide (including improving and personalising) the products, tools, and services we offer;
  • to send you communications, including promotional communications;
  • to display advertising;
  • to conduct research so we can improve our offerings;

In carrying out these tasks, we combine the data we collect through the various websites, products, tools, and services you use to give you a more seamless, consistent, and personalised experience. However, to enhance privacy, we have built in technological and procedural safeguards designed to prevent certain data combinations, such as when we store the data we collect from you when you are unauthenticated (not signed in) separately from any account information that directly identifies you, such as your name, email address or phone number.