Privacy and Security Policy WaterOutlook Limited (the company) collects information to enable usage of our services. The information we collect and how we use it is detailed in this policy. The company takes privacy seriously. Where personal information is shared with the company it is held securely in accordance with the Privacy Act 2020. get in touch 1. Personal Information The company collects personal information from clients and others to enable their use of its website and application. This information includes, but is not limited to the following: A user’s name and email address, and optionally phone number, for the purposes of account setup or provided by the person provisioning the account.Data entered by a user while using the company’s website or application.Images uploaded by the user while using the company’s website or application.The date and time at which the user performed data entry.The user’s location when performing data entry where access has been allowed.Settings or cookies stored on the user’s device to store the user’s preferences. This data will be viewable by other users with appropriate permissions on the WaterOutlook website. When in transit between the user’s web browser, mobile device, or computer and the WaterOutlook website, all data is secured using HTTPS. Any access to data via API also requires the use of HTTPS. This information may be stored by the company on both computer systems owned and operated by the company and on infrastructure as a service it procures from trusted third-party providers. Users can view data they have entered in WaterOutlook at any time using the website or application. The company stores this data indefinitely, including and audit history of any changes made to the data. 2. Analytics The company collects analytics information from a user’s web browser/mobile device/computer to allow it to diagnose and improve its service. This information includes, but is not limited to the following: The type of device being used.The operating system type and version.The web browser type and version.Physical attributes of the device such as the screen resolution and form factor.TLS certificate chain, protocol version and cipher information.The user’s IP address.Application version, and the identity it is running as where applicable.A unique identifier specific to the user’s device or computer.Actions performed when using the website or application.Errors or crashes encountered when using the website or application.The date and time at which the website or application is used. This information may be stored by the company on both computer systems owned and operated by it and on infrastructure as a service it procures from trusted third-party providers, or in some cases using trusted third-party systems. 3. Third Party Access In some circumstances third parties may have access to the user’s data. These circumstances include, but are not limited to the following: An authorised person requests the company’s enable automated transfer of the data to another party.An authorised person enables automated transfer of the data to another party.An authorised person requests the company to create API keys for access of the data by another party.An authorised person creates API keys for access of the data by another party.An authorised person requests the company to provide specific data to a third party.An authorised person provides data to a third party.Where required to ensure the safety of a person.Where an infrastructure as a service provider requires access for diagnostics or troubleshooting purposes.As required by law.