Updated 1 October 2024
Service: The service that is provided by Felcorp Support
Client : A client of Felcorp Support that may be an individual or corporate entity
Supplier: A 3rd party supplier of Felcorp Support that is not involved in the management or operation of Felcorp Support
This Data Protection Policy outlines our approach to safeguarding data, defines our responsibilities, and provides the framework through which our data protection standards are maintained.
Felcorp Support adheres to both Australian Privacy Principles Act 1988 (Act) and GDPR compliance measures. In any case in which there are discrepancies between GDPR and the Act, we will abide by the latter.
This policy applies to all employees and suppliers who handle Felcorp’s data and any customer information, whether electronic or physical. It encompasses data stored or transmitted in any format.
This policy is designed for all employees, clients and suppliers of Felcorp Support who utilise our service or access our stored data in the normal course of business.
Felcorp adheres to the following data protection principles:
To protect data, Felcorp implements the following security measures:
The Australian Privacy Principles (APPs) contained within the Privacy Act 1988 (Cth) set out standards, rights, and obligations in respect to how personal information should be handled. Key points include:
To ensure compliance with the General Data Protection Regulation (GDPR), Felcorp adheres to the following standards:
All personnel are responsible for adhering to Australian Privacy Principles Act (1988) and GDPR compliance standards.
This Data Protection Policy is reviewed annually and updated as necessary to reflect changes in legislation, business practices, and technological advancements.
Data will be collected or received as part of the normal operations of Felcorp Support service as outlined in our Engagement Letter. This may include personal financial data, banking data, contact information and other privileged information generally accepted to be reasonably required within a professional services capacity.
Collecting of data is exclusively limited to the following applications:
Data collection must be lawful, direct and necessary. Felcorp must only:
Effective management, including the secure storage of Client data is an important and integral part of efficient service operations. Consideration should be given to the type, frequency, volume and flow of data being collected, and these factors will inform the selection of appropriate organisation, transmission and storage methods. Data is to be appropriately protected during transmission and at rest. Felcorp must in the collection of data only:
Access of data must be limited to approved personnel i.e the dedicated staff member working with the Client and the relevant Felcorp management team (company directors, assigned team manager, HR manager and IT manager). In regards to the software environment whether internal or external, Felcorp must:
The day to day handling of data must be used in a way that is line with the delivery of the Service while ensuring the confidential data is:
Confidential data collected, generated and transformed by Felcorp held within Felcorp controlled software environments (Felcorp App) should be archived within 3 months of non-use of data. As data is globally held on the Felcorp App and not held anywhere else, the Client has the required user privileges to delete data when necessary and is strongly encouraged to delete temporary work-in-progress data on the Felcorp App and transfer data to the Client's own cloud software system at their earliest convenience.
Upon the termination of the agreement with the Client, it is our policy to dispose of all data stored from our systems within 60 days of the initial date of termination. During this period, we will securely transfer all personal data back to the client through electronic means, ensuring the data is encrypted and transmitted via secure channels. This process guarantees that clients have a complete copy of their data before it is permanently erased from our systems and is no longer accessible.
A data breach occurs when personal information or intellectual property held by Felcorp Support is subject to unauthorised access, disclosure, modification, or is lost. Data breaches can occur in a number of ways, including but not limited to:
All Felcorp Support personnel who are aware of, informed of, or suspect a data breach must inform Felcorp Management and IT team immediately. The IT team must then assess the suspected breach to determine whether or not a breach has in fact occurred. If a data breach has, in fact, occurred, then the IT team will manage the breach according to the steps outlined in the Data Breach Response Plan.
In accordance with OAIC recommendations, the following steps will be taken in response to a verified Data Breach.
(a) Contain the breach as soon as possible. Containment is ensuring that the breach itself is stopped. How a breach is stopped would depend on the particular instance but can include:
(i) The suspension of compromised accounts;
(ii) Removal of malware, where identified;
(iii) Temporary platform downtime if necessary;
(iv) Recovering any lost data, if possible;
(v) Repairing unauthorised modification of data, if possible;
(vi) Restoring access to the platform when able.
(b) Assess the risks involved and the repercussions on respective stakeholders. The following may be considered in assessing the stakeholder risks:
(i) The type of information involved;
(ii) Establish the cause and the extent of the breach;
(iii) Assess the risk of harm to affected persons;
(iv) Assess the risk of other harms: reputational damage;
(v) Notify Management and Affected Individuals where appropriate;
(vi) Management must be notified of breaches as and when they occur, whether or not the breach is an eligible breach under the Notifiable Data Breach Scheme;
(vii) Felcorp Support Pty is an APP 11 entity under the Privacy Act 1988 (Cth) and is and must, therefore, comply with its obligations under the Notifiable Data Breach Scheme;
(viii) Data Breaches that are not eligible under the Notifiable Data Breach Scheme need not be reported and may be addressed internally.
Where an eligible breach has occurred, Felcorp must inform affected users through at least one of the following methods:
Email Security (DMARC, SPF, DKIM, TLS, Threat Intelligence Database)
Emails can contain malicious content and malware. In order to reduce phishing, spam and improve deliverability of Felcorp emails we employ:
All felcorp.com.au conforms with DMARC policy and has a strict policy setting where the DKIM and SPF domain must exactly match the domain of the Header From address. This prevents impersonation attacks and email spoofing attempts,
All felcorp.com.au emails have SPF authentication. This ensures that emails from felcorp.com.au are verified email servers of Felcorp Support personnel only,
All felcorp.com.au emails have DKIM evaluation successfully passed. This ensures that there is protection against emails being intercepted during transit between incoming and outgoing mail servers,
All felcorp.com.au emails have successful TLS encryption ensuring that outgoing and incoming mail servers must be sent over a Transport Layer Security (TLS) encrypted connection which prevents emails from being intercepted by cybercriminals.
Felcorp.com.au is not listed on any threat intelligence database such as spam, phishing or low reputation senders.
Felcorp employs on all computer devices the following BitDefender policies:
All Felcorp devices that access internet are protected through BitDefender’s built in VPN internet facility.
Felcorp management are altered and can remotely access Felcorp devices alerting to any suspicious activity, unauthorised software or potential cybercrime threats.
BitDefender secures all internal and external information ports and automatically scans new information for threats.
Felcorp management has the ability to enforce specific IT policies remotely to ensure adherence to solely our approved internet connections, website blacklisting and disable of USB ports.
Felcorp employs LastPass as a scale password management system to:
Felcorp manages internal information on Dropbox with all client information held on the Felcorp App for transparency:
Logging in to any work accounts for personal devices such as mobile phones, tablets or laptops, is only allowed when in the office and during work hours. Felcorp does not recommend accessing any data from personal devices unless in certain circumstances.
Employees are required to follow these steps:
For any questions or concerns regarding this Data Protection Policy, please contact us at:
Email: service@felcorp.com.au
Phone: + 61 2 9669 9375
Address: 37/453 Bourke St, Surry Hills NSW 2010
Felcorp Support is an independent outsourcing staff supplier. All staff are employees of Felcorp Support and are not affiliated or in partnership with any other business outside the Felcorp Group. We do not have any professional services licences or registrations and never purport to have any of these professional registrations.