Update and access of personal information
If you wish to make any changes to your personal information, please contact us. We will generally rely on you to assist us in informing us if the information we hold about you is inaccurate or incomplete.
You may request access to the personal information we hold about you by contacting us. We will respond to your request within a reasonable period. We will give access in the manner you have requested if it is reasonable to do so. We may charge you a fee to access the information. The fee will not be excessive and will not apply to the making of the request.
We may deny you access to your personal information in certain circumstances, for example, if required or authorised by or under an Australian law or a court/tribunal order, or it would be likely to prejudice enforcement related activities by an enforcement body. In relation to credit eligibility information, the exceptions may differ.
If we decide not to give you access, we will provide reasons for the refusal and information on how you can complain about the refusal.
Additional things we have to do to correct your credit information
If you ask us to correct credit information, we will help you with this in the following way.
Helping you manage corrections
Whether we made the mistake or someone else made it, we are required to help you ask for the information to be corrected. So we can do this, we might need to talk to others. However, the most efficient way for you to make a correction request is to send it to the organisation that made the mistake.
Where we correct information
If we are able to correct the information, we will let you know within five business days of deciding to do this. We will also let the relevant th...
... middle of paper ...
...nd further information
If you have a complaint about how we handle your personal information, we want to hear from you. You are always welcome to contact us.
You can let us know about your complaint or feedback by contacting us at:
The [Chief Executive Officer]
Zagga Market Pty Ltd
Email: [insert email]
Telephone: [insert number]
By giving us as much information as possible, you will help us resolve things faster. And if you have any supporting documentation, please have it handy when you raise your concern. Most complaints are resolved quickly and you should hear from us within five business days.
If you are dissatisfied with our response, you may make a complaint to the OAIC which can be contacted on either www.oaic.gov.au or 1300 363 992.
You may request further information about the way we manage your personal information by contacting us.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- OPPORTUNITIES FOR ENGAGING LOW-INCOME, VULNERABLE POPULATIONS IN HEALTH CARE: Opportunities for Engaging Low-Income, Vulnerable Populations in Health Care: A Systematic Review of Homeless Persons’ Access to and Use of Information Technologies The purpose of the research was to determine and figure out if homeless individuals have access to information technology and if so, are they fully utilizing it. The researchers were guided by three main research questions. The first was “What is the prevalence of access to and use of information technology (Internet, mobile phones, texting etc) by homeless populations”.... [tags: economics, politics]
1273 words (3.6 pages)
- Confidentiality Confidentiality is defined as the protection of personal information. It means keeping a client’s information between the health care providers and the client. Every single patient has the right to privacy regarding their personal information from being released to anyone outside of their health care providers. Health care providers have a legal and ethical responsibility to protect all information regarding patients by not disclosing their information to anyone without their written consent from the patient.... [tags: Health care, Health care provider, Patient]
908 words (2.6 pages)
- “A survey conducted by the Evans D. Donaldson Institute found that six out of ten Americans” have had a ‘personal experience’ with adoption (Dudley 1). With such a high percentage, it is important for one to understand the issues entwined with open and closed adoptions. In the United States today, closed adoptions are associated with secrecy and shame, leading to long-term emotional problems for children and parents. The basic idea of open adoptions allows the child to know his or her birth parents' identities.... [tags: Adoption]
1607 words (4.6 pages)
- There are four domains of vulnerabilities that may cause information/data security breaches. Information Security Governance, People, Processes and Technology are it. Hacking, stealing and copying information are the examples of breaches that takes place at times. According to the information security governance, success is often less, due to inability to value the the organisation 's information and data. This creates the discussion on the needs for security and the resources to be assigned to this.... [tags: Information security, Computer security, Security]
734 words (2.1 pages)
- The issue of the collection of big data and how it impacts privacy of the individual is a prevalent concern to many. Many use big data including the government, business, and scientists. It can be argued that there are many benefits of big data, but there are many concerns about its use as well. To start, it is important to know what big data is and what the sources of it are. Big data is simply put, data of a very large size. It goes beyond conventional data and is capable of reaching beyond traditional structured databases.... [tags: Technology, database]
955 words (2.7 pages)
- Introduction Information Technology has been the one of the most evolved forms of communication for the last century. It never gets old and continues to amaze us on how much more we can communicate with one another and intertwine into other users lives. The business world has benefited immensely with the exploration of making daily task simpler and reaching more users. Information Technology is a catch 22, it brings forth so much beauty with its innovative ways but, causes so much pain to the traditional relationships once used by humans.... [tags: Computer, Personal computer, ENIAC]
1302 words (3.7 pages)
- Electronic Break-Ins As technology becomes more integrated into our everyday lives, it becomes necessary to take precautions when dealing with sensitive information and technology. The Internet is a prominent tool in today’s society, and will be used against people for many years to come. As technology grows larger, it increases the impact a malicious attack can have. Cybercrime is a special category of criminal acts that are typically executed through the utilization of computer and network technologies.... [tags: internet security, cybercrime]
952 words (2.7 pages)
- At the completion of Year 10 students should know how to: Tips and Resources for parents: ________________________________________ Apply personal security protocols Students should be able to identify and independently apply strategies to protect the rights, identity, privacy and emotional safety of others when using ICT. They will also understand the correct etiquette for different communication tools when collaborating with local and global communities. This will include: • Understanding the possible consequences of posting personal information on social networking sites.... [tags: Information security, Security, 2016]
1067 words (3 pages)
- The premise of this paper is to provide three types of sensitive information and the information involved within each situation. Note three types of sensitive information involved with each situation. Subsequently, I will also provide three ways each information item can be misused or harmed. For each of these, I will provide at least one likely finding that can be used to include in a risk analysis report for the organization. Lastly, I have provided answers to the questions at the end of the table.... [tags: Risk management, Risk, Management, Security]
1568 words (4.5 pages)
- Information Theft The world grows continually smaller. Each passing day interconnectivity amongst personal computers becomes increasingly normative. These electronic bridges are at the foundation of the networks of networks which comprise the Internet, which was initially a concept developed as a means by which both communication and vast archives of information could be preserved in the event of a nuclear war. The design was simple: a system of information exchange which was indestructible in its redundancy.... [tags: Internet Net World Wide Web Media]
1027 words (2.9 pages)