All personal information collected is used only for our purposes as outlined below to improve the services offered to you and similar clients.
Security of Information
Our internal network and databases are protected from unauthorised access using current technologies. You should be aware of inherent risks associated with the transmission of information via the Internet. Should you not wish to transmit specific information across the Internet, we provide alternative ways of providing information. For example, you are able to print forms and post them to us, or communicate with us by telephone.
E-mails and Electronic Forms
We will record your e-mail address only if you send us a message. Your personal information will only be used for the purposes for which you have provided it. Your e-mail address will not be added to a mailing list, unless you have provided it to us in order to subscribe to a mailing list we offer.
Where you choose to send us a completed electronic form that includes your personal details, we do collect personally identifiable information, such as name, address and email address and other contact or request details.
The information collected by email or electronic forms will be used only for the purpose for which you provided it, and we will not disclose it without your consent, except where authorised or required by law.
When you browse this web site, the web server records your visit and logs the following information:
- the user’s server address
- the user’s top level domain name (for example .com, .gov, .au, .uk etc)
- the date and time of visit to the site
- the pages accessed and documents viewed
- the previous site visited, and
- the type of browser used.
The data listed above is collected for the following purposes:
- web site and system administration, including monitoring to prevent security breaches
- enhancement of the web site to our clients’ needs and
research and development.
No attempt is made to identify users or their browsing activities, except in the unlikely event that a law enforcement or other government agency exercises a legal authority to inspect ISP logs (eg, by warrant, subpoena, or notice to produce).