Privacy

Source Security Systems does not use or disclose your personal information collected to any third party without firstly gaining your consent, or where it is requested by law.

We respect the confidentiality of the information you provide to us. As such, any personal information that we collect will only be used for the purpose for which it has been provided to us.

Users should be aware that there are inherent risks transmitting information across the Internet.

To make sure your personal information is accurate, complete and up-to-date, please contact us if any of the details you have provided change. Further, if you believe that the information we have about you is not accurate, complete of up-to-date, contact us and we will correct the information.

When you visit our website our web server automatically records the name of your internet service provider, the website from which you visit us, the websites you actually visit and the date and length of your visit.

Source Security Systems may use cookies and active components to follow the preferences of our visitors and optimize our website accordingly. You can reset your browser either to notify you when you receive a cookie, or to refuse to accept cookies. Please note that certain areas of most sites may not function properly if you reject a cookie. Additional personal data is only stored if volunteered by you.

When you register via login on the websiste you will receive e-mail communications from us in the future. You may contact us to have your name removed from our distribution lists. This can be done via replying to marketing@sourcesecuritysystems.com.au with "No Marketing" in the subject line.

Source Security Systems uses security measures in order to protect the data we have under our control against manipulation, loss, destruction, access by unauthorized persons or against unauthorized disclosure. We are committed to keeping secure the data you provide us and we will take all reasonable precautions to protect your personally identifiable information from loss, misuse or alteration.Our security procedures are continually enhanced as new technology becomes available.


Categories