Supporters of Cancer (SOC) and its fully owned assets (www.supportersofcancer.com.au) firmly commit to privacy in accordance with the Privacy Amendment Act 2000.
Please note that if at any time Supporters of Cancer (SOC) is required by law to release information about you or your organisation, Supporters of Cancer (SOC) must and is obliged to, cooperate fully under its legal duty.
In summary, 'personal information' is information or an opinion relating to an individual, which can be used to identify that individual.
What information does Supporters of Cancer (SOC) collect about you?
We keep your name and contact details on your file. Other information, such as maintenance requests are recorded on computer.
Why do we collect your information?
Information we collect helps us to keep up-to-date details about your housing so that we can assist you in the best possible way. We also use non-identifying information to better plan for future needs.
Who else sees your information?
Your information can only be seen by the professionals in this service involved in assisting you. Supporters of Cancer (SOC) will not sell, rent, trade or otherwise supply to third parties any personal information obtained from you unless you consent. Otherwise, we only release information about you if you agree or if required by law.
What say do you have in what happens to your information?
You have a say in what happens to your information. We rely on the information you give us to help provide the right assistance for you. If you decide not to share some of your information, or restrict access to your records, this is your right but it may affect our ability to provide you with the best possible services. Talk to us if you wish to change or cancel your consent.
Can you access your information?
Yes, you have a right to request access to your information and to ask for it to be corrected if necessary.
How will Supporters of Cancer (SOC) keep your information secure?
Supporters of Cancer (SOC) takes reasonable steps and has security measures designed to protect against the loss, misuse and/or alteration of the personal information under its control. We employ a number of means to protect information including:
(a) External and internal physical premises security;
(b) restricted access to personal information;
(c) Maintaining technology products to prevent unauthorised computer access via networks (i.e. logical security), for example firewalls, password protection and data encryption; and
(d) Regular reviewing and testing of our technology in order to improve the level of security.
Additionally, we take reasonable steps that when we no longer require this information, it is our practice to securely destroy/delete it from our systems or alternatively, store it securely.