Global IT Technologies respects the privacy of personal
information and recognises the need for protection &
appropriate management of personal information that you
share with us.
When you look at our web site, our Internet
Service provider makes a record of your visit and logs
information for statistical purposes. A cookie may be
placed on your computer & the information received
is used to improve the efficiency of customer service
on our site. Most browsers have the option to refuse a
cookie.
We collect personal information from various sources such
as contests, survey or site registration, promotions,
messages received, meetings with representatives of companies,
enrolling students, directly from people, business affiliates
and mailing lists. We may use this information for promotional
& marketing purposes with the offer of special deals,
newsletters, new products and other 3rd party products
which we believe our users will find beneficial. At the
time of receiving these offers you will be given the option
to choose whether you would like to receive such mailing
and, at any time, you can also request that your information
not be used for such purposes by sending an email request
to info@gitt.com.au.
Global IT Technologies takes reasonable and appropriate
steps to protect your personal information from unauthorised
access or disclosure however no security system is a 100%
secure so Global IT Technologies cannot give an absolute
assurance that your personal information will be secure
at all times.
Global IT Technologies does not usually
need to transfer personal information to third parties
but should the need arise Global IT Technologies will
make every reasonable effort to obtain the consent of
the individual.
An individual can access their personal information by
contacting Global IT Technologies’s Privacy Officer
& if this information is incorrect the individual
may request it to be corrected and Global IT Technologies,
where possible, will comply with this request.
Global IT Technologies is entitled to deny access to personal
information where it is used in confidential or commercially
sensitive areas, where the privacy of other may be affected
or where the law denies such access.