Privacy Policy

1. Introduction

1.1 Purpose of Policy

This Privacy Policy ("Policy") describes how Geopera Pty Ltd ("Geopera," "we," "our," or "us") collects, uses, processes, and discloses your information across our platform, services, websites, and applications (collectively, the "Services"). This Policy is designed to help you understand our privacy practices and your rights regarding your information.

1.2 Scope of Policy

This Policy applies to all users of our Services, including customers, visitors to our website, and users of our platform, regardless of the method of access. By using our Services, you acknowledge that you have read and understand this Policy and agree to the collection, use, and disclosure of your information as described herein.

1.3 Definitions

  • "Personal Information" means any information relating to an identified or identifiable natural person
  • "Processing" means any operation performed on Personal Information
  • "Platform" means our geospatial data processing and analysis platform
  • "User Content" means any data, information, or material you upload or process using our Services

2. Information Collection

2.1 Information You Provide

2.1.1 Account Information

  • Full name and username
  • Email address and contact information
  • Password and security information
  • Profile picture (if provided)
  • Professional and company information
  • Job title and department

2.1.2 Business Information

  • Company name and registration details
  • Business address and contact details
  • Tax information and business identification numbers
  • Industry sector and business type
  • Employee count and organizational structure

2.1.3 Payment Information

  • Credit card or payment account details
  • Billing address
  • Transaction history
  • Invoice preferences
  • Payment methods

2.1.4 Technical Information

  • Project configurations and settings
  • Processing parameters and specifications
  • Custom algorithms and workflows
  • API keys and authentication tokens
  • Integration configurations

2.1.5 Communication Data

  • Support requests and correspondence
  • Feedback and survey responses
  • Platform messages and comments
  • Marketing preferences
  • Technical documentation requests

2.2 Automatically Collected Information

2.2.1 Platform Usage Data

  • API calls and request patterns
  • Processing statistics and metrics
  • Resource utilization data
  • Feature usage statistics
  • Error logs and debugging information
  • Performance monitoring data
  • Session duration and timing

2.2.2 Device Information

  • IP addresses and location data
  • Device type and model
  • Operating system and version
  • Browser type and version
  • Screen resolution and settings
  • Language preferences
  • Time zone settings

2.2.3 Technical Logs

  • Access logs and timestamps
  • Error and crash reports
  • Network performance data
  • Security audit logs
  • Authentication records
  • System configuration data

2.2.4 Cookies and Tracking

  • Essential cookies for platform functionality
  • Performance and analytics cookies
  • Preference cookies
  • Marketing and advertising cookies (if applicable)
  • Session identifiers
  • Device identifiers

2.3 Derived and Generated Data

2.3.1 Analytics Data

  • Usage patterns and trends
  • Performance metrics and benchmarks
  • Resource utilization statistics
  • Process optimization data
  • System health metrics

2.3.2 Processed Results

  • Processing output and results
  • Generated reports and analytics
  • Derived datasets and products
  • Aggregated statistics
  • Performance benchmarks

2.3.3 Business Intelligence

  • Usage trends and patterns
  • Customer behavior analytics
  • Platform performance metrics
  • Feature adoption rates
  • Service utilization data

3. Use of Information

3.1 Primary Uses

3.1.1 Service Provision

  • Account creation and management
  • Processing and executing requests
  • Delivering platform functionality
  • Managing user access and permissions
  • Providing technical support
  • Facilitating communications

3.1.2 Platform Operations

  • Monitoring system performance
  • Ensuring platform security
  • Managing resource allocation
  • Optimizing service delivery
  • Maintaining service quality
  • Troubleshooting issues

3.1.3 Business Operations

  • Processing payments and transactions
  • Managing customer relationships
  • Providing customer support
  • Sending service notifications
  • Maintaining business records
  • Conducting business analytics

3.1.4 Legal and Compliance

  • Fulfilling legal obligations
  • Maintaining security records
  • Preventing fraud and abuse
  • Enforcing platform policies
  • Managing disputes
  • Protecting legal rights

3.2 Platform Enhancement

3.2.1 Service Improvement

  • Developing new features
  • Optimizing existing functionality
  • Improving user experience
  • Enhancing platform performance
  • Debugging and testing
  • Implementing user feedback

3.2.2 Technical Development

  • Algorithm optimization
  • Processing chain improvements
  • Infrastructure scaling
  • Performance optimization
  • Security enhancements
  • Feature development

3.2.3 Research and Development

  • Product development
  • Market research
  • Technical research
  • Performance analysis
  • Usage pattern analysis
  • Trend analysis

4. Data Sharing and Disclosure

4.1 Service Providers

4.1.1 Technical Providers

  • Cloud infrastructure providers
  • Content delivery networks
  • Domain name services
  • Security service providers
  • Monitoring services
  • Backup services

4.1.2 Business Services

  • Payment processors
  • Analytics providers
  • Customer support tools
  • Communication services
  • Marketing services
  • Professional services

4.1.3 Data Processors

  • Data storage providers
  • Processing services
  • Analytics services
  • Reporting tools
  • Backup services
  • Security services

4.2 Legal and Corporate

4.2.1 Legal Requirements

  • Court orders and subpoenas
  • Regulatory requirements
  • Government requests
  • Law enforcement requests
  • Legal proceedings
  • Regulatory investigations

4.2.2 Corporate Transactions

  • Mergers and acquisitions
  • Asset sales
  • Corporate restructuring
  • Due diligence
  • Business transfers
  • Joint ventures

4.2.3 Rights Protection

  • Fraud prevention
  • Terms enforcement
  • Rights protection
  • Dispute resolution
  • Security incidents
  • Policy violations

5. Data Security

5.1 Security Measures

  • Encryption in transit and at rest
  • Access control systems
  • Authentication requirements
  • Security monitoring
  • Intrusion detection
  • Vulnerability management

5.2 Operational Security

  • Regular security assessments
  • Employee access controls
  • Security training
  • Incident response procedures
  • Disaster recovery plans
  • Business continuity measures

5.3 Technical Security

  • Firewall protection
  • Network security
  • System monitoring
  • Backup systems
  • Patch management
  • Security testing

6. Your Rights

6.1 Access Rights

  • Right to access personal data
  • Right to data portability
  • Right to know processing purposes
  • Right to know recipients
  • Right to know retention periods
  • Right to know data sources

6.2 Control Rights

  • Right to correction
  • Right to deletion
  • Right to restriction
  • Right to objection
  • Right to withdraw consent
  • Right to data portability

6.3 Additional Rights

  • Right to complain
  • Right to object to marketing
  • Right to human intervention
  • Right to be informed
  • Right to data portability
  • Right to non-discrimination

7. Data Retention

7.1 Retention Periods

  • Account activity period
  • Legal requirement period
  • Business necessity period
  • Technical requirement period
  • Security requirement period
  • Compliance requirement period

7.2 Retention Factors

  • Legal obligations
  • Business purposes
  • Technical requirements
  • Security needs
  • User requests
  • Regulatory requirements

7.3 Data Deletion

  • Account deletion process
  • Data removal procedures
  • Backup retention
  • Archive management
  • System cleanup
  • Data destruction

8. International Data Transfers

8.1 Transfer Mechanisms

  • Standard contractual clauses
  • Adequacy decisions
  • Privacy Shield (if applicable)
  • Binding corporate rules
  • Consent mechanisms
  • Legal frameworks

8.2 Transfer Safeguards

  • Data protection agreements
  • Security measures
  • Access controls
  • Transfer monitoring
  • Compliance checks
  • Risk assessments

8.3 Transfer Locations

  • Data center locations
  • Processing locations
  • Storage locations
  • Backup locations
  • Service provider locations
  • Corporate locations

9. Children's Privacy

  • Age restrictions
  • Parental consent requirements
  • Data collection limitations
  • Use restrictions
  • Deletion requirements
  • Special protections

10. Changes to This Policy

10.1 Update Procedures

  • Regular review process
  • Change notification methods
  • User communication
  • Implementation timeline
  • Documentation updates
  • Version control

10.2 Material Changes

  • Notification requirements
  • Consent requirements
  • Implementation process
  • User rights
  • Transition period
  • Documentation

11. Contact Information

11.1 Contact Details

Geopera Pty Ltd

Email: [email protected]

12. Additional Information

12.1 Governing Law

This Policy is governed by the laws of Australia, without regard to its conflict of law provisions.

12.2 Language

This Policy is originally written in English. Any translations are provided for convenience only.