Acknowledgment of Privacy Policy
ALL OF ABOVE SHOULD BE EMAILED TO ADMIN@XYSTON.COM.AU AND SHOULDN’T BE STALLED ON ANYTHING DUE TO MEDICAL DISCLOSURE AND RELATED PRIVACY ACTS.
ABN: 84 641 527 433
Effective Date: Wednesday, 16 October 2024
This Privacy Policy governs the collection, use, disclosure, storage, and protection of personal and sensitive
information by Xyston Pty Ltd (referred to as “the Company,” “we,” or “us”). As a service provider registered
under the National Disability Insurance Scheme (NDIS) framework, the Company complies with the Privacy
Act 1988 (Cth) and the Australian Privacy Principles (APPs).
By accessing our services, platforms, or website, you agree to the terms of this Privacy Policy. If you do not
agree with these terms, please cease using our services. This Policy is binding on participants, authorised
representatives, employees, contractors, and any third parties engaged with the Company.
1. Collection of Personal and Sensitive Information
1.1 Types of Information Collected
We collect and process personal information relevant to the provision of NDIS services and for compliance with
legal, regulatory, and operational obligations. The following categories of personal information may be
collected:
• Identifying Data: Information necessary to establish identity and facilitate service delivery, including but
not limited to:
o Full name
o Contact information (e.g., phone number, email address, physical address)
o Date of birth
o NDIS number and other government-issued identifiers
• Health and Medical Information: Records essential for individual care planning, service provision, and
compliance with NDIS obligations, including:
o Health conditions, diagnoses, and disabilities
o Treatment history, medications, and therapy plans
o Medical and psychological assessments
• Behavioural and Incident Data: Information related to the management of participant behaviours and
safety, such as:
o Behaviour support plans and incident reports
o Risk assessments and safety management strategies
o Records of behavioural escalations and staff interventions
• Service History and Preferences: Data collected to monitor service quality and participant satisfaction,
including:
o Appointment history and interaction records
o Service preferences and specific participant requests
o Progress notes and feedback from support staff
All personal information collected is relevant, accurate, and limited to what is necessary for the delivery of
services, in accordance with the principle of data minimisation under the APPs.2
1.2 Sources of Information
The personal information we collect may be sourced from:
• The Participant or their Authorised Representative: This may include the participant themselves, a
legal guardian, family member, or another representative authorised to act on the participant’s behalf.
• Healthcare Professionals or Third-Party Service Providers: Information may be obtained from
medical professionals, allied health practitioners, or other service providers involved in the participant’s
care or service delivery.
• Regulatory or Government Authorities: Where required by law, information may be collected from
agencies such as the NDIS Commission, the Department of Health, or law enforcement bodies to
comply with statutory obligations.
The Company will always endeavour to collect information directly from the participant or their authorised
representative unless it is unreasonable or impractical to do so. Where information is collected from third parties,
we will take reasonable steps to notify the participant of the collection and purpose, unless otherwise required
by law.
1.3 Impact of Refusal to Provide Information
Participants are required to provide accurate and complete personal information to ensure the effective delivery
of services. Failure to provide the necessary information may impair the Company’s ability to provide services
and may result in:
• Service Limitations: The inability to offer certain services or deliver them effectively.
• Suspension or Termination of Services: Where essential information required to meet regulatory,
safety, or service obligations is withheld or incomplete, the Company may suspend or terminate the
provision of services, in accordance with our service agreements.
Participants acknowledge that withholding or refusing to provide information may compromise safety or
violate NDIS compliance requirements. In such cases, the Company shall not be liable for any adverse
consequences arising from the failure to provide requested information.
1.4 Accuracy, Updates, and Participant Responsibility
Participants or their authorised representatives are responsible for:
• Ensuring the accuracy and completeness of personal information provided to the Company.
• Notifying the Company promptly of any changes in their information, such as updated contact details,
health conditions, or service requirements.
The Company reserves the right to periodically verify the accuracy of information provided to maintain data
integrity and ensure the ongoing delivery of services. Failure to update information may result in service
disruptions for which the Company is not liable.
1.5 Legal Basis for Collection and Consent Requirements
Personal information is collected and processed under the following legal bases:
• Participant Consent: Where services require personal information for care plans, behavioural support,
or participant interactions, the participant or their authorised representative must provide informed
consent.3
• Legal Obligations: The Company may collect, use, or disclose personal information without consent
where required by law or to comply with regulatory obligations, including NDIS Commission reporting
requirements and mandatory reporting laws.
Where consent is required, participants may withdraw consent at any time by providing written notice. However,
participants acknowledge that withdrawal of consent may impact the Company’s ability to provide services, and
the Company reserves the right to terminate services where continued service provision is not feasible
without necessary information.
1.6 Indemnity and Liability for Non-Disclosure or Inaccurate Information
By engaging with the Company, participants or their authorised representatives agree to indemnify and hold
Xyston Pty Ltd harmless from any liabilities, claims, or damages arising from:
• Failure to disclose essential information necessary for the delivery of services.
• Provision of inaccurate or incomplete information, resulting in service disruptions, safety risks, or
regulatory non-compliance.
• Consequences arising from the lawful collection, use, or disclosure of personal information as
outlined in this policy.
The Company shall not be held responsible for any adverse outcomes resulting from the participant’s failure to
provide accurate and timely information necessary for service delivery or compliance with NDIS obligations.
1.7 Privacy Safeguards for Third-Party Data Sharing
The Company will take reasonable steps to ensure third-party providers comply with privacy obligations when
personal information is shared with healthcare professionals, allied health providers, or other service providers
involved in the participant’s care. However:
• The Company cannot guarantee the privacy practices or data security measures of third-party
providers.
• Participants acknowledge and agree that the Company shall not be liable for any breaches, misuse,
or unauthorised disclosures of personal information by third parties who lawfully receive such
information.
Participants are encouraged to review the privacy policies of any third-party providers engaged in their care to
understand how their personal information is managed.
1.8 Amendments and Updates to the Policy
This Collection of Personal and Sensitive Information Policy may be amended from time to time to reflect
changes in legal requirements, NDIS guidelines, or operational practices. Participants will be notified of
significant changes via email, website notice, or other appropriate channels. Continued use of services after
such amendments constitutes acceptance of the revised policy.
Participants may request a copy of the latest version of the policy at any time. Failure to seek clarification of
amendments does not invalidate the participant’s agreement to the terms of this policy.
2. Use and Disclosure of Information
2.1 Purpose of Use
We collect and use personal and sensitive information strictly for the purposes necessary to deliver services and
fulfil legal, regulatory, and operational obligations. The Company limits the use of personal data to what is
reasonably necessary, aligned with the principle of purpose limitation. Specifically, the personal information
collected will be used to:4
• Deliver and coordinate NDIS services:
o Develop and implement individualised care plans, behaviour management strategies, and
support services tailored to the participant’s needs.
o Monitor participant progress and ensure the effectiveness of provided services.
• Develop and maintain behaviour support plans and risk management strategies:
o Ensure participant safety and minimise the risk of harm to the participant, staff, and the
community.
• Meet legal and regulatory obligations, including:
o Incident reporting to the NDIS Quality and Safeguards Commission.
o Mandatory notifications to government agencies, law enforcement, or healthcare providers,
as required by law.
o Ensuring compliance with privacy laws, including the Privacy Act 1988 (Cth) and Australian
Privacy Principles (APPs).
• Improve service delivery and operational efficiency by:
o Conducting internal reviews, audits, and quality assessments.
o Analysing trends to improve participant outcomes and operational practices.
We do not use personal information for any purpose beyond what is reasonably necessary for service delivery
and legal compliance without obtaining informed consent from the participant or their authorised representative,
unless required or authorised by law.
2.2 Disclosure to Third Parties
We may disclose personal and sensitive information to authorised third parties as required to fulfil the purposes
outlined above. All disclosures are made with appropriate confidentiality measures and in compliance with
legal and contractual obligations. Specifically, the Company may disclose personal information to:
• Healthcare Providers, Support Coordinators, and NDIS Representatives:
o To coordinate and manage participant care and service delivery.
o To obtain assessments, recommendations, or reports essential for service planning.
• Third-Party Service Providers (e.g., IT providers, cloud storage services, or data processors):
o These providers assist with the secure management of personal data and operational
processes.
o All third-party providers are engaged under confidentiality agreements that require
compliance with the Company’s privacy and security obligations.
• Government Agencies, Law Enforcement, and Regulatory Authorities:
o Where required by law, personal information may be disclosed to the NDIS Commission,
Office of the Australian Information Commissioner (OAIC), or law enforcement agencies
for compliance or enforcement purposes.
o Disclosures to law enforcement are limited to situations where necessary to prevent harm,
investigate criminal activity, or fulfil mandatory reporting obligations.
• Legal Advisors and Insurers:
o In cases of dispute resolution or legal claims, personal information may be disclosed to the
Company’s legal advisors or insurers to ensure compliance and protection of Company
interests.5
2.3 Limitations on Disclosure
We are committed to protecting the privacy of personal information. Accordingly:
• Personal information will not be disclosed to unauthorised third parties without the express
consent of the participant or their authorised representative, unless required by law.
• Where disclosures are required by law, the Company will notify the participant or their authorised
representative, unless prohibited by law or operational necessity (e.g., criminal investigations).
• Disclosures for marketing or commercial purposes are strictly prohibited unless explicit, informed
consent is obtained from the participant.
2.4 Confidentiality Safeguards with Third Parties
The Company takes all reasonable steps to ensure that third-party providers comply with privacy and data
protection obligations. This includes:
• Due diligence checks on all external providers before engagement.
• Requiring third-party providers to adhere to strict confidentiality agreements aligned with the Privacy
Act 1988 (Cth) and APPs.
• Monitoring and auditing the data management practices of third-party providers to ensure continued
compliance.
While the Company takes reasonable steps to protect data, participants acknowledge that Xyston Pty Ltd is not
liable for privacy breaches or misuse of personal data by third parties acting outside the scope of their
agreements or legal obligations.
2.5 Disclosures without Consent
The Company may disclose personal information without obtaining prior consent in circumstances where:
• Disclosure is required by law, including compliance with NDIS Commission obligations or law
enforcement investigations.
• Immediate disclosure is necessary to prevent or mitigate a serious threat to the health, safety, or well-
being of the participant, staff, or the public.
• Disclosures are required under mandatory reporting laws (e.g., reporting abuse, neglect, or criminal
activities involving participants).
In such cases, the Company will act in accordance with relevant legal obligations and take all reasonable steps to
limit the scope of the disclosure to what is necessary.
2.6 Participant Rights Regarding Use and Disclosure
Participants or their authorised representatives have the right to:
• Request a record of all third parties to whom their personal information has been disclosed.
• Withdraw consent for non-essential disclosures by providing written notice, subject to the
Company’s ability to provide services effectively and comply with legal requirements.
• Challenge or restrict certain disclosures, where legally permissible, by submitting a written request to
the Company’s Privacy Officer.6
Participants acknowledge that withdrawal of consent or restriction on disclosures may limit the scope or
availability of services. In such cases, the Company will not be liable for any disruption to services or negative
outcomes resulting from the participant’s decision.
2.7 Indemnity for Disclosures Made in Good Faith
Participants agree to indemnify and hold harmless Xyston Pty Ltd, its employees, management, and affiliates
against any claims, damages, or liabilities arising from:
• Lawful disclosures made in good faith to comply with legal obligations or prevent harm.
• Disclosures made to third-party providers under the scope of service delivery agreements.
• Participant actions or requests that result in restricted disclosures affecting service delivery or
outcomes.
The Company’s liability for any unauthorised disclosures shall be limited to those resulting from gross
negligence or wilful misconduct on the part of the Company or its employees.
3. External Links and Third-Party Content
3.1 External Links and Limited Control
Our website, platforms, and communications may contain links to external websites or third-party platforms that
are not operated, maintained, or controlled by Xyston Pty Ltd (“the Company”). These links are provided for
convenience and informational purposes only and do not constitute an endorsement or recommendation of
the third-party content, services, or products.
The Company exercises no control over the availability, functionality, security, or content of external websites
or platforms linked through our services. Users access such third-party websites at their own discretion and
risk.
3.2 Disclaimer of Liability for Third-Party Content
We expressly disclaim all responsibility for:
• The content, accuracy, or relevance of information on external sites.
• Privacy practices employed by third parties, including their use of cookies, tracking technologies, or
data collection practices.
• Security measures implemented (or not implemented) by external websites, including potential data
breaches, malware, or other cyber risks.
The Company shall not be liable for any loss, damages, or disruptions (whether direct, indirect, or
consequential) arising from or related to the use of, reliance upon, or interactions with external links or third-party
platforms.
3.3 No Responsibility for Transactions with Third Parties
The Company is not involved in any transactions, agreements, or interactions conducted between users and
third-party websites accessed via our platforms. Any such arrangements are solely between the user and the
third party. Users are responsible for conducting their own due diligence before engaging with third parties and
are encouraged to read and understand the third parties’ privacy policies and terms of service.
3.4 Security and Privacy Risks of Third-Party Links7
Users are advised that third-party platforms may employ cookies, tracking pixels, or other technologies that
collect personal information. These practices are governed by the third party’s privacy policy and are beyond
the control of Xyston Pty Ltd.
• We encourage users to review the privacy policies and security practices of any third-party
website they visit before providing personal information.
• Xyston Pty Ltd does not warrant or guarantee the security, functionality, or reliability of any external
site accessed through our platforms.
3.5 Indemnity for Third-Party Risks
By accessing third-party websites or content through links provided on our platforms, users agree to:
• Release and indemnify Xyston Pty Ltd from any claims, liabilities, or damages arising from
interactions with third-party platforms, including but not limited to financial losses, security breaches,
or misuse of personal information.
• Assume full responsibility for any risks or consequences resulting from engaging with third-party
services or providing personal information to external platforms.
3.6 Notification of Broken or Compromised Links
While we strive to provide accurate and functional links, the Company is not liable for broken, outdated, or
compromised links. Users who encounter such issues are encouraged to notify the Company immediately to
allow us to investigate and remove any inappropriate or non-functional links.
4. Cookies, Tracking Technologies, and Analytics
4.1 Use of Cookies and Tracking Technologies
Xyston Pty Ltd (“the Company”) employs cookies, tracking pixels, beacons, and other similar technologies
across its website and platforms to enhance performance, personalise user experience, and analyse site usage.
These tools assist us in delivering high-quality services and maintaining the functionality of our online platforms.
Specifically, the Company uses cookies and tracking technologies for the following purposes:
• Website Functionality and Performance:
o Ensure essential website features function correctly (e.g., login management, page loading).
o Improve the speed, performance, and responsiveness of the website.
• Personalised User Experience:
o Customise content and services based on user preferences and behaviours.
o Recognise returning visitors and provide relevant recommendations.
• Analytics and Usage Tracking:
o Monitor website traffic and usage patterns to identify trends and improve our services.
o Collect anonymous data through tools such as Google Analytics, which track visitor numbers,
duration of visits, and interactions with specific pages.
o Evaluate marketing efforts by measuring engagement with email campaigns or advertisements.
The data collected via these technologies may include IP addresses, browser types, device information, and
referral sources. However, all data collected is anonymised or aggregated to ensure it cannot be used to
identify individual users unless users provide explicit consent otherwise.8
4.2 Types of Cookies Used
Our website may use the following categories of cookies:
• Essential Cookies:
Required for basic website functionality. Disabling these cookies may affect the website’s core features,
such as secure login or session management.
• Performance and Analytics Cookies:
Collect anonymised data about website performance and visitor behaviour to optimise user experience.
• Personalisation Cookies:
Store user preferences and settings to deliver tailored content and improve service delivery.
• Third-Party Cookies:
Set by external services (e.g., Google Analytics, social media plugins) to track interactions with
embedded content or advertisements. These third-party services operate under their own privacy
policies, and the Company is not responsible for their data handling practices.
4.3 Managing Cookies and User Consent
Users have the right to manage or disable cookies through their browser settings. This includes the ability to:
• Block or delete specific cookies on their browser.
• Receive notifications before cookies are set, enabling informed decisions about cookie preferences.
• Opt-out of certain tracking technologies by following Do Not Track (DNT) browser settings or using tools
provided by the Network Advertising Initiative (NAI) or Google’s opt-out mechanisms for analytics.
Disabling cookies or limiting their use may restrict the functionality of certain features on our website. Users
acknowledge that disabling essential cookies may impair the quality or availability of services provided through
our online platforms.
4.4 Use of Third-Party Analytics Services
The Company uses Google Analytics and similar third-party tools to track, monitor, and analyse website usage.
These services collect anonymised or aggregated data, including IP addresses, geographical locations, and
device types, which help us evaluate and improve user experience.
• Google Analytics cookies may transmit data to servers located outside Australia, and such transfers
are subject to the privacy policies of the relevant third-party service provider.
• Users may opt-out of Google Analytics tracking by installing the Google Analytics Opt-Out Browser
Add-On or adjusting browser settings.
The Company takes reasonable steps to ensure that all third-party analytics providers comply with applicable
privacy laws. However, we do not control the privacy practices of these third-party providers.
4.5 Consent to Tracking Technologies
By using our website, platforms, or services, users consent to the use of cookies and tracking technologies
as outlined in this policy. If users do not wish to accept cookies, they must adjust their browser settings to block
cookies or discontinue using the website.
For cookies that require explicit user consent under applicable laws, such as cookies used for personalised
advertising, users will be presented with a cookie consent banner upon accessing the website. Users may
choose to accept or reject such cookies at their discretion.9
4.6 Data Protection and Security
The Company ensures that data collected through cookies and tracking technologies is processed securely and
in accordance with this Privacy Policy. Anonymised and aggregated data collected via these technologies is
used only for legitimate purposes, such as improving services and analysing user engagement.
All data transmitted to third-party services (e.g., analytics providers) is managed under confidentiality
agreements where applicable, ensuring compliance with the Privacy Act 1988 (Cth) and Australian Privacy
Principles (APPs).
4.7 Indemnity and Limitation of Liability for Third-Party Cookies
Xyston Pty Ltd disclaims responsibility for any loss, damage, or data breach arising from the use of cookies or
tracking technologies employed by third-party providers embedded on our website (e.g., analytics providers,
social media platforms). Users agree to indemnify and hold the Company harmless against any claims
resulting from their interaction with third-party cookies or tracking technologies.
5. Security and Data Protection Measures
5.1 Commitment to Data Security
Xyston Pty Ltd (“the Company”) is committed to safeguarding all personal and sensitive information by
implementing robust security protocols and industry best practices. Our security measures are designed to
protect information from unauthorised access, alteration, disclosure, or destruction. These protocols apply to
both electronic and physical records stored by the Company.
5.2 Key Security Measures Implemented
We employ the following measures to ensure the confidentiality, integrity, and availability of personal data:
• Data Encryption (At Rest and In Transit):
o Personal data is encrypted using industry-standard encryption algorithms to protect it while
being transmitted and when stored on our servers.
o Encryption protects data from interception during transmission over networks, including emails,
internal systems, and cloud services.
• Access Control Protocols:
o Role-based access controls (RBAC) ensure that only authorised personnel have access to
specific categories of personal and sensitive information.
o Regular audits are conducted to review access rights and detect potential vulnerabilities.
o Access is immediately revoked for departing employees or personnel with changed
responsibilities to ensure continued data security.
• Multi-Factor Authentication (MFA):
o Sensitive data and administrative systems are protected by multi-factor authentication (MFA),
requiring multiple forms of verification (e.g., password and mobile authentication code).
o MFA mitigates the risk of unauthorised access, even if login credentials are compromised.
• Network and System Security:
o Firewalls, intrusion detection systems (IDS), and antivirus programs are deployed to monitor
network traffic and prevent unauthorised access or attacks.
o Regular vulnerability assessments and penetration tests are conducted to identify and
mitigate potential threats.
o All data systems and software undergo regular updates and patch management to address
known security vulnerabilities.
• Physical Security Measures:
o Physical access to data storage facilities is restricted to authorised personnel only, with
security surveillance and access logs maintained.
o Hard copies of sensitive information are stored in secure locations and disposed of through
secure shredding services when no longer required.
5.3 Employee Training and Awareness
All employees, contractors, and affiliates undergo mandatory privacy and security training to ensure they
understand their obligations under the Privacy Act 1988 (Cth) and the Company’s internal data protection
policies.
• Employees are required to immediately report any suspected security breaches or vulnerabilities.
• Disciplinary action, including termination, may result from non-compliance with data security protocols
or unauthorised access to personal information.
5.4 Data Anonymisation and Pseudonymisation
Where practical, personal data may be anonymised or pseudonymised to minimise risks in the event of a data
breach. Anonymised data cannot be traced back to an individual and is used for analytics and service
improvements without compromising privacy.
5.5 Third-Party Data Security Obligations
The Company takes reasonable steps to ensure that third-party service providers engaged for data storage,
processing, or other operational services comply with strict data protection standards.
• All third-party providers are subject to confidentiality agreements and must comply with the Privacy
Act 1988 (Cth) and other relevant privacy laws.
• Where personal data is stored on third-party servers or cloud platforms, the Company ensures that
such providers employ state-of-the-art encryption and access controls.
However, while we undertake due diligence in engaging third-party providers, the Company is not liable for
unauthorised breaches or misuse of data by third parties acting outside the scope of their agreements.
5.6 Data Retention and Secure Disposal
The Company retains personal and sensitive data for the duration required by law or for operational purposes, in
accordance with our Data Retention and Disposal Policy.
When data is no longer required, it is securely destroyed or anonymised to prevent unauthorised access or use.
Physical records are shredded and digital records are permanently deleted using industry-approved data
destruction techniques.
5.7 Monitoring, Audits, and Incident Response
To ensure continuous data security, the Company conducts:
• Regular security audits and vulnerability assessments.
• Real-time monitoring of systems and networks to detect suspicious activity.
• Penetration tests to simulate cyber-attacks and identify security weaknesses.
In the event of suspicious activity, an immediate investigation is launched, and appropriate containment actions
are taken to mitigate risks.
5.8 Limitation of Liability for Data Breaches
Despite implementing comprehensive security measures, the Company acknowledges that absolute data
security cannot be guaranteed due to the inherent risks associated with digital technologies and unforeseen
events (e.g., cyber-attacks, force majeure).
Participants acknowledge and agree that:
• The Company is not liable for any unauthorised access, data breach, or data loss resulting from
factors beyond its control, such as sophisticated hacking attempts or malicious third-party actions.
• Force majeure events (including natural disasters, cyber-attacks, and infrastructure failures) may
impact data security despite best efforts, and the Company disclaims liability for such incidents.
5.9 Participant Responsibilities for Security
Participants and users of the Company’s services also have a responsibility to protect their personal data by:
• Using strong passwords and not sharing login credentials.
• Enabling two-factor authentication (2FA) where applicable.
• Immediately reporting any suspicious activity or potential security issues to the Company’s Privacy
Officer.
5.10 Indemnification for Security Breaches Beyond Company Control
Participants and users agree to indemnify and hold harmless Xyston Pty Ltd, its management, employees,
and affiliates from any claims, damages, or liabilities arising from:
• User negligence in securing their accounts, passwords, or devices.
• Third-party security breaches occurring beyond the Company’s control (e.g., breaches involving
external service providers).
• Force majeure events or circumstances where the Company has acted reasonably to safeguard data.
6. Data Breach Response Plan
6.1 Overview
Xyston Pty Ltd (“the Company”) is committed to safeguarding personal and sensitive information. In the event of
a data breach involving personal information, the Company will respond promptly to contain the breach, mitigate
risks, and comply with all applicable laws, including the Privacy Act 1988 (Cth) and the Notifiable Data
Breaches (NDB) Scheme administered by the Office of the Australian Information Commissioner (OAIC).
6.2 Definition of a Data Breach
A data breach occurs when personal information held by the Company is lost, accessed, disclosed, altered, or
destroyed without authorisation, whether intentionally or accidentally. Examples of data breaches include:
• Cyber-attacks, such as hacking, ransomware, or phishing attacks.
• Theft or loss of devices containing personal information (e.g., laptops, USB drives, or documents).
• Accidental disclosure of information to unauthorised recipients (e.g., emails sent to the wrong person).
• Human error or system malfunctions resulting in unauthorised access.
6.3 Immediate Response to a Data Breach
If a data breach is identified or suspected, the following steps will be initiated immediately:
1. Identification and Containment:
o Identify the nature and extent of the breach.
o Contain the breach to prevent further unauthorised access, disclosure, or damage (e.g.,
disable compromised systems, revoke access rights, secure physical records).
2. Preliminary Assessment:
o Assess the scope of the breach, including the type of personal data involved.
o Determine whether the breach poses a risk of serious harm to individuals.
6.4 Notification Requirements under the NDB Scheme
If the data breach is assessed to likely result in serious harm to individuals, the Company will notify:
• Affected individuals:
o Notification will be provided through email, phone, or written communication, detailing the
nature of the breach, the information involved, and the actions being taken.
o Affected individuals will receive guidance on steps they can take to protect themselves (e.g.,
updating passwords, monitoring accounts).
• Office of the Australian Information Commissioner (OAIC):
o Notification will be provided within 72 hours of becoming aware of the breach, including a
description of the breach, the type of personal data affected, and steps taken to mitigate risks.
If there are legal or operational reasons preventing immediate notification, the Company will notify as soon as
practicable.
6.5 Remediation and Containment Actions
Following containment, the Company will implement measures to remediate the breach and prevent recurrence.
These actions may include:
• Patching vulnerabilities in systems or software.
• Enhancing encryption protocols and security configurations.
• Conducting a root-cause analysis to determine how the breach occurred.
• Retraining employees on data handling and privacy procedures.
The Company will also update internal policies and procedures as necessary to improve security and prevent
future breaches.
6.6 Engagement with Authorities and Legal Advisors
Where the data breach involves criminal activity or significant regulatory implications, the Company will:
• Engage with law enforcement authorities to assist in investigations.
• Consult with legal advisors to ensure compliance with privacy obligations and mitigate legal risks.
The Company may also seek guidance from the OAIC on breach handling, where appropriate.
6.7 Monitoring and Follow-Up
The Company will monitor its systems and operations for any further risks following the breach. A post-breach
review will be conducted to assess the effectiveness of the containment and remediation actions.
The findings will be used to strengthen policies, procedures, and security controls to prevent future
breaches.
6.8 Limitation of Liability and Indemnity
While the Company implements robust security measures, absolute data security cannot be guaranteed.
Xyston Pty Ltd disclaims liability for any losses or damages resulting from:
• Cyber-attacks or other unauthorised actions by third parties beyond the Company’s control.
• Force majeure events, including natural disasters and infrastructure failures.
• Actions or negligence of third-party providers engaged in good faith by the Company.
Participants and users agree to indemnify and hold harmless Xyston Pty Ltd, its officers, employees, and
affiliates from any claims or liabilities arising from third-party breaches or other factors beyond the Company’s
reasonable control.
6.9 Reporting Responsibilities of Employees and Participants
All employees, contractors, and participants must immediately report any suspected or confirmed data
breaches to the Company’s Privacy Officer.
Participants and users are also responsible for monitoring their accounts and taking appropriate steps to protect
their information following a breach, including updating passwords or security settings as recommended by the
Company.
6.10 Record-Keeping and Compliance
The Company will maintain detailed records of:
• All data breaches, including assessments, notifications, and remediation efforts.
• Internal reports documenting the cause of the breach and corrective actions taken.
These records will be retained for auditing purposes and to ensure ongoing compliance with the Privacy Act
1988 (Cth) and the NDB Scheme.
7. Data Retention and Disposal
7.1 Retention Policy
Xyston Pty Ltd (“the Company”) retains personal and sensitive information for only as long as necessary to meet
legal, regulatory, operational, and service delivery obligations. Our retention periods are determined in
accordance with the Privacy Act 1988 (Cth), NDIS Commission Guidelines, and other applicable laws.
The following retention periods apply:
• Health and Medical Records:
Retained for a minimum of seven (7) years following the termination of services or the participant’s last
interaction with the Company, unless a longer period is required by law (e.g., for minors, records must
be kept until seven years after the individual turns 18).
• Incident Reports and Behavioural Data:
Retained in accordance with NDIS guidelines and operational requirements to ensure compliance,
accountability, and participant safety. This data may be kept longer if required for legal, auditing, or
investigative purposes.
• Service Delivery Records (e.g., participant preferences, appointment history):
Retained for seven (7) years following service termination unless required longer for auditing or legal
purposes.
• Employee and Contractor Records:
Retained for a minimum period consistent with employment law requirements and Company policies,
typically seven (7) years after employment ceases.
7.2 Secure Disposal of Information
The Company is committed to securely disposing of personal and sensitive information once it is no longer
required. Secure disposal ensures that data is permanently destroyed or anonymised, reducing the risk of
unauthorised access, misuse, or disclosure.
Methods of Disposal
• Digital Data:
o All electronic records and files are deleted using secure deletion methods to ensure they
cannot be recovered (e.g., software-based data erasure tools).
o Cloud storage providers are required to comply with secure deletion protocols when
managing the Company’s data.
• Physical Records:
o Hard copies of personal information (e.g., medical records, incident reports) are destroyed
using industrial-grade shredding services.
o Disposal logs are maintained to record the secure destruction of physical records.
• Anonymisation:
o In cases where data may still hold value for research or operational analysis, it will be
anonymised or de-identified so that individuals can no longer be identified.
7.3 Record of Disposal and Auditing
The Company maintains detailed records of all data disposal activities, including:
• Dates of disposal for both physical and digital records.
• Method of disposal (e.g., shredding, secure deletion).
• Third-party service providers involved in secure disposal (e.g., external shredding companies).
These records are subject to internal and external audits to ensure compliance with privacy laws and NDIS
standards.
7.4 Legal and Operational Exceptions
In certain circumstances, the Company may be legally required to retain information beyond the standard
retention periods, including:
• Ongoing legal proceedings or investigations requiring the preservation of records.
• Regulatory audits or reviews initiated by the NDIS Commission or other government bodies.
Where retention is extended beyond the standard period, the Company will take appropriate steps to ensure the
continued security and confidentiality of the data.
7.5 Participant and User Rights
Participants or their authorised representatives may request:
• Information about the status of their records and retention periods applicable to their data.
• Early disposal or deletion of personal information where legally permissible. However, participants
acknowledge that certain records may need to be retained to comply with legal and regulatory
obligations.
If a request for early deletion cannot be accommodated, the Company will provide a written explanation
detailing the reasons.
7.6 Indemnity for Secure Disposal by Third-Party Providers
The Company engages reputable third-party service providers to assist with the secure disposal of physical
and digital records. While the Company undertakes due diligence to ensure compliance with privacy laws, it
disclaims liability for any unauthorised access or misuse resulting from third-party breaches during disposal.
Participants agree to indemnify and hold harmless Xyston Pty Ltd for any claims arising from third-party
actions beyond the Company’s control.
8. Access, Correction, and Portability of Data
8.1 Overview
Xyston Pty Ltd (“the Company”) recognises the rights of participants and authorised representatives to
access, correct, and request the portability of their personal information in compliance with the Privacy Act 1988
(Cth) and relevant NDIS regulations. The Company is committed to ensuring the accuracy and completeness
of personal data and facilitating access and portability requests where practicable.
8.2 Right to Access Personal Information
Participants or their authorised representatives have the right to access the personal information held by the
Company.
• Access Requests: Requests for access must be submitted in writing to the Privacy Officer (contact
details below).
• Response Time: The Company will respond to access requests within a reasonable time frame,
generally within 30 days of receiving the request, unless an extension is required.
• Form of Access: Information may be provided electronically or in hard copy, depending on the
participant’s preference and the format in which the data is available.
The Company may refuse access to certain information in limited circumstances, such as where:
• Access would unreasonably impact the privacy of others.
• Access is prohibited by law, legal proceedings, or government investigation.
• The request is considered vexatious or frivolous.
Where access is denied, the Company will provide a written explanation outlining the reasons for the refusal
and any available alternatives.
8.3 Right to Request Corrections
Participants or their authorised representatives have the right to request corrections to personal information to
ensure that it is accurate, complete, and up to date.
• Correction Requests: Requests to correct information must be submitted in writing to the Privacy
Officer, including evidence supporting the requested changes.
• Response Time: The Company will respond to correction requests within a reasonable period, typically
within 30 days.
• Notification of Changes: Where personal information has been shared with third parties (e.g., NDIS
representatives), the Company will take reasonable steps to notify them of the correction.
If the Company refuses a correction request, a written explanation will be provided, detailing the reasons for
the refusal and the available dispute resolution options.
8.4 Right to Data Portability
Participants or their authorised representatives may request that their personal information be provided in a
structured, machine-readable format to facilitate data portability. This allows the transfer of personal data to
another service provider or organisation, where feasible.
• Portability Requests: Requests for data portability must be submitted in writing to the Privacy Officer.
• Technical Feasibility: The Company will provide the data in a portable format (e.g., CSV, JSON) where
technically feasible and compliant with privacy laws.
• Limitations on Portability: The right to portability applies only to personal data that the participant
provided directly or authorised for collection. Derived data or proprietary formats used for internal
processes may not be portable.
The Company reserves the right to deny requests for portability where the transfer may compromise privacy,
security, or legal obligations.
8.5 Administrative Fees for Access or Portability Requests
The Company reserves the right to charge a reasonable administrative fee for access or portability requests
that require substantial resources to process.
• Participants will be notified in advance of any applicable fees and given the opportunity to proceed or
withdraw their request.
• The Company ensures that fees are reasonable, transparent, and proportionate to the effort required
to fulfil the request.
8.6 Participant Responsibilities and Accuracy
Participants or their authorised representatives are responsible for:
• Ensuring the accuracy and completeness of the personal information provided to the Company.
• Promptly notifying the Company of any changes to their information to ensure records are kept up to
date.
Failure to provide accurate or current information may impair the Company’s ability to deliver services effectively
and comply with regulatory obligations.
8.7 Dispute Resolution for Access and Correction Requests
If participants are dissatisfied with the outcome of an access, correction, or portability request, they may:
1. Submit a complaint through the Company’s internal complaints process.
2. Escalate the complaint to the Office of the Australian Information Commissioner (OAIC) if the
issue remains unresolved.
Contact details for complaints are provided below.
9. Withdrawal of Consent and Service Implications
9.1 Overview
Participants or their authorised representatives have the right to withdraw consent for the collection, use, or
disclosure of their personal information at any time by providing written notice to the Company’s Privacy Officer.
However, the withdrawal of consent may impact the Company’s ability to deliver essential services and meet
regulatory obligations under the NDIS framework and other applicable laws.
9.2 Process for Withdrawing Consent
Participants or their authorised representatives must submit a written request to withdraw consent, which must
specify the scope of the consent being withdrawn (e.g., specific data collection, use, or third-party disclosure).
Upon receiving the withdrawal request:
1. Acknowledgment of Withdrawal: The Company will acknowledge receipt of the request within seven
(7) business days.
2. Assessment of Service Impact: The Company will assess the impact of the withdrawal on service
delivery and compliance obligations.
3. Confirmation of Changes: Participants will receive a written response confirming how the withdrawal of
consent will be implemented and detailing any implications for service delivery.
9.3 Implications of Withdrawal of Consent
The withdrawal of consent may limit or prevent the provision of services, as certain personal information is
essential for:
• Developing care plans, behaviour support plans, or risk assessments.
• Coordinating services with healthcare providers, NDIS representatives, or other third-party service
providers.
• Complying with regulatory and legal obligations, such as mandatory reporting.
Where the Company determines that the withdrawal of consent affects its ability to provide services effectively or
compromises safety and compliance obligations, the Company reserves the right to:
• Suspend or terminate services until the required consent is reinstated or alternate arrangements are
made.
• Discontinue services permanently, where the absence of consent makes it impracticable to deliver
safe and effective services.
9.4 Service Suspension or Termination
If withdrawal of consent leads to suspension or termination of services:
• Participants will receive written notice specifying the reasons for the suspension or termination.
• The Company will assist with the transition to other service providers, where appropriate and
feasible, to minimise disruption to participants.
Participants acknowledge that the Company is not liable for any adverse consequences resulting from the
withdrawal of consent, including service disruption, delays, or reduced access to care.
9.5 Legal and Regulatory Considerations
In certain circumstances, the Company may be legally required to:
• Retain and use personal information, even after consent is withdrawn, for regulatory reporting,
compliance, or dispute resolution purposes.
• Disclose information to government authorities or law enforcement, where legally mandated,
regardless of the participant’s withdrawal of consent.
Participants acknowledge that withdrawal of consent will not affect information previously collected or
disclosed where such actions were undertaken lawfully and with prior consent.
9.6 Indemnity and Limitation of Liability
Participants or their authorised representatives agree to indemnify and hold harmless Xyston Pty Ltd, its
officers, employees, and affiliates from any claims, damages, or liabilities arising from:
• The withdrawal of consent that limits or prevents the Company from providing services.
• Any adverse outcomes or service disruptions resulting from withholding essential information.
The Company disclaims all liability for consequences beyond its control, including regulatory penalties or non-
compliance risks caused by the withdrawal of consent.
9.7 Reinstating Consent
Participants may choose to reinstate consent at any time by submitting a written notice to the Privacy Officer.
The Company will resume services where feasible, subject to operational capacity and regulatory compliance
requirements.
10. Third-Party Providers and Indemnification
10.1 Engagement of Third-Party Providers
Xyston Pty Ltd (“the Company”) engages with third-party service providers to support the delivery of services,
including but not limited to:
• IT and cloud storage providers for secure data management.
• Healthcare professionals and allied health providers involved in participant care.
• External consultants or contractors assisting with service delivery or compliance.
The Company takes reasonable steps to ensure that third-party providers comply with their privacy
obligations under the Privacy Act 1988 (Cth), Australian Privacy Principles (APPs), and other applicable laws.
All third-party providers are required to sign confidentiality agreements and adhere to the Company’s data
handling standards.
10.2 Limitations on Liability for Third-Party Actions
Despite taking reasonable precautions, the Company cannot guarantee the actions, security practices, or
privacy compliance of third-party providers. Once personal information is lawfully disclosed to a third party
under these agreements, the Company disclaims responsibility for any:
• Privacy breaches, unauthorised access, or misuse of data by third-party providers.
• Loss, theft, or compromise of information resulting from the third party’s actions or negligence.
Participants acknowledge that interactions with third-party providers are governed by the respective
provider’s privacy policies, which may differ from the Company’s policies.
10.3 Indemnification Clause
Participants or their authorised representatives agree to indemnify, defend, and hold harmless Xyston Pty
Ltd, its officers, employees, and affiliates from and against any and all claims, liabilities, damages, losses,
or expenses (including legal fees) arising from:
• Privacy breaches or security incidents involving third-party providers acting outside the Company’s
control.
• Actions, omissions, or negligence of third-party providers engaged to assist with service delivery.
• Participant’s direct engagement or interaction with third-party providers without the Company’s
supervision or coordination.
This indemnity applies unless the breach or loss is caused by gross negligence or wilful misconduct on the
part of Xyston Pty Ltd.
10.4 Monitoring and Auditing of Third-Party Providers
The Company conducts regular monitoring and audits of third-party providers to ensure ongoing compliance
with privacy obligations. However, participants acknowledge that:
• Auditing capabilities may be limited by the operational control or jurisdiction of the third-party
provider.
• The Company’s liability for third-party providers is limited to reasonable efforts made to select, engage,
and monitor these providers.
10.5 Third-Party Data Transfers and Storage
Where personal information is transferred to or stored with third-party providers, the Company ensures that:
• Data transfer agreements are in place, including compliance with Standard Contractual Clauses
(SCCs) where required.20
• Third-party providers implement appropriate encryption, access controls, and monitoring systems
to protect data.
However, the Company disclaims liability for data breaches or losses caused by infrastructure failures, cyber-
attacks, or force majeure events affecting third-party systems.
10.6 Notification of Third-Party Privacy Breaches
In the event that a third-party provider experiences a privacy breach involving personal information provided by
the Company:
• The Company will notify affected participants as soon as it becomes aware of the breach, detailing
the nature of the breach and any actions taken.
• The Company will work with the third-party provider to contain the breach and minimise further impact.
• Affected participants will be provided with guidance on how to protect themselves from any potential
harm.
10.7 Participant Responsibilities in Third-Party Interactions
Participants are responsible for:
• Reviewing the privacy policies and terms of service of third-party providers with whom they interact.
• Ensuring that personal information is only disclosed to authorised third parties when necessary.
• Reporting any privacy concerns or suspected breaches involving third-party providers to the
Company’s Privacy Officer.
11. Children’s Privacy
11.1 Overview
Xyston Pty Ltd (“the Company”) provides services to individuals of all ages, including minors under the age of
18, in accordance with the Privacy Act 1988 (Cth) and the National Disability Insurance Scheme (NDIS)
framework. We are committed to safeguarding the privacy of minors by ensuring that their personal information
is collected, stored, and used in compliance with strict privacy and child protection standards.
11.2 Parental or Guardian Consent
For participants under the age of 18, parental or guardian consent is required before personal or sensitive
information is collected, used, or disclosed, except where:
• Emergency care is required to protect the health, safety, or well-being of the child.
• Legal or statutory obligations require the collection or disclosure of information without prior consent
(e.g., mandatory reporting of child abuse or neglect).
The parent or guardian must provide informed consent on behalf of the minor, and the Company will take
reasonable steps to verify the authority of the parent or guardian.
11.3 Collection and Use of Children’s Information
The personal information collected about minors may include:
• Identifying data: Name, date of birth, contact information, and NDIS participant number.21
• Health and medical information: Medical history, diagnoses, treatment plans, and therapy details.
• Behavioural and incident data: Behaviour support plans, incident reports, and risk assessments.
• Service delivery records: Appointments, progress notes, and feedback relevant to the participant’s
care.
This information is used solely to:
• Develop care plans and behaviour support strategies specific to the minor’s needs.
• Coordinate services with healthcare providers, support workers, and the NDIS.
• Ensure the safety and well-being of the minor, both within the Company’s care and in the community.
11.4 Sharing of Children’s Information
The personal information of minors may be shared with:
• Parents or legal guardians, unless the minor has the capacity to make their own privacy decisions in
accordance with relevant laws.
• Healthcare providers, allied health professionals, and NDIS representatives involved in the
participant’s care.
• Government agencies or law enforcement authorities where required by law (e.g., child protection
services or in compliance with mandatory reporting obligations).
The Company will ensure that only authorised personnel and service providers have access to the minor’s
information, and that data is shared in a manner that respects the child’s privacy.
11.5 Minor’s Capacity to Consent
Where a minor has the maturity and understanding to make informed decisions about their personal
information, they may be permitted to:
• Provide their own consent for the collection, use, and disclosure of their personal information.
• Manage their privacy settings and access their personal data directly, subject to relevant laws and the
Company’s assessment of their capacity.
The Company will make these determinations on a case-by-case basis, considering the minor’s age, maturity,
and circumstances.
11.6 Deletion of Unauthorised Information
If the Company becomes aware that personal information of a minor has been collected without the necessary
consent, it will:
1. Investigate the circumstances surrounding the collection of the information.
2. Delete or de-identify the information unless it is required to be retained under legal or regulatory
obligations.
3. Notify the parent, guardian, or the minor (if appropriate) regarding the unauthorised collection and
actions taken.
11.7 Security of Children’s Data22
The Company applies enhanced security measures to protect personal information collected from minors.
These measures include:
• Restricted access to children’s data, limited only to authorised staff and service providers.
• Encryption and secure storage of sensitive information.
• Regular audits and monitoring to ensure compliance with child privacy requirements.
11.8 Indemnity and Limitation of Liability
The Company takes all reasonable steps to ensure the accuracy, security, and proper handling of children’s
personal information. However, participants and their guardians agree to indemnify and hold harmless Xyston
Pty Ltd from any claims, liabilities, or damages arising from:
• Errors or omissions in the information provided by the parent, guardian, or minor.
• Unauthorised disclosure or use of the minor’s personal data by third-party service providers beyond
the Company’s control.
• Actions or negligence of the parent, guardian, or minor in managing their privacy rights or interactions
with external providers.
12. International Data Transfers
12.1 Overview
Xyston Pty Ltd (“the Company”) may transfer and store personal data on servers located outside of Australia
as part of its operations. This includes the use of cloud service providers and third-party vendors with
international infrastructure. The Company ensures that all international data transfers comply with Australian
privacy laws, including the Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs), and that
appropriate safeguards are implemented to protect the privacy and security of personal information.
12.2 Circumstances Requiring International Data Transfers
International data transfers may occur under the following circumstances:
• Cloud-based storage solutions or platforms with data centres outside Australia.
• Third-party service providers engaged to assist with IT support, analytics, or data processing.
• Backups and disaster recovery services hosted on international servers.
• International collaboration with external consultants or healthcare providers involved in the
participant’s care.
12.3 Legal Basis for International Transfers
All international data transfers will be conducted under one of the following legal bases:
• Informed consent from the participant or authorised representative, where required.
• Compliance with contractual obligations (e.g., using third-party providers essential to service
delivery).
• Legal and regulatory requirements, where data must be transferred to international bodies for
compliance or investigation.23
12.4 Safeguards for International Data Transfers
The Company ensures that appropriate safeguards are in place for all data transferred outside Australia,
including:
• Standard Contractual Clauses (SCCs) or equivalent agreements where the receiving country’s privacy
laws are not deemed adequate by Australian standards.
• Data encryption during transfer and storage to prevent unauthorised access.
• Restricted access protocols to ensure only authorised personnel can access personal data.
• Monitoring and auditing of third-party providers to ensure compliance with privacy obligations.
12.5 International Service Providers and Third Parties
The Company only engages reputable service providers that demonstrate compliance with international
privacy frameworks, such as:
• The General Data Protection Regulation (GDPR) in the European Union.
• The California Consumer Privacy Act (CCPA) in the United States (where relevant).
All providers must agree to confidentiality agreements and data protection clauses that align with Australian
privacy laws.
12.6 Participant Rights and Consent for International Transfers
Participants or their authorised representatives will be informed when personal data is transferred internationally.
Where explicit consent is required, participants will have the opportunity to:
• Provide or withhold consent before their data is transferred outside Australia.
• Withdraw consent for international transfers by submitting a written request to the Privacy Officer,
provided that such withdrawal does not compromise the delivery of essential services or regulatory
compliance.
If a participant declines or withdraws consent, the Company will explore alternative solutions. However,
participants acknowledge that certain services may be limited or unavailable without international data
transfer.
12.7 Risk Management for International Transfers
While the Company takes reasonable steps to ensure the security of internationally transferred data, participants
acknowledge that:
• Foreign jurisdictions may have different privacy laws and enforcement mechanisms that are not
identical to Australian privacy standards.
• The Company is not liable for unforeseen events, such as data breaches or cyber-attacks, occurring
within the infrastructure of third-party international service providers, provided that the Company
exercised due diligence in engaging these providers.
12.8 Monitoring and Compliance
The Company will monitor compliance with all international data transfer agreements and conduct periodic
reviews of third-party providers to ensure ongoing adherence to privacy obligations. Any breach or non-
compliance by an international provider will be managed under the Company’s Data Breach Response Plan.24
13. Automated Decision-Making and Profiling
13.1 Overview
Xyston Pty Ltd (“the Company”) is committed to ensuring that all decisions related to participant care and
service delivery are made transparently, with appropriate human oversight and consideration. As part of this
commitment, the Company does not engage in automated decision-making or profiling that could adversely
affect participants’ rights, interests, or access to services.
This policy aligns with the Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs) to ensure fair,
transparent, and accountable decision-making in all areas of service delivery.
13.2 Definition of Automated Decision-Making and Profiling
• Automated Decision-Making refers to decisions made entirely by automated systems or algorithms
without human involvement. Such decisions could include the automated approval, denial, or
modification of services based on pre-set criteria.
• Profiling involves the analysis of personal data to assess specific characteristics, such as behaviour,
preferences, or health conditions, which could influence decisions regarding services or interactions with
participants.
13.3 Use of Technology with Human Oversight
The Company uses technology and data analytics tools to enhance operational efficiency, but all critical
decisions regarding service delivery, care plans, and participant interactions are subject to human review and
discretion. For example:
• Behaviour management strategies, care plans, and support delivery decisions are made by
qualified professionals, not automated systems.
• Risk assessments are based on a combination of human expertise and data insights, with final
decisions approved by responsible staff.
Any data used for service planning is supplementary to professional judgment and does not replace the
human evaluation required for individualised care.
13.4 Assurance of Non-Automated Decisions
Participants are assured that:
• No automated decisions will be made that significantly affect their rights or access to services.
• All decisions affecting participants, including eligibility, service adjustments, and care planning, are
made with the involvement of human professionals.
If technology is used to assist in decision-making (e.g., to generate reports or analyse data trends), the final
decision will always involve qualified staff who understand the participant’s individual needs and circumstances.
13.5 Participant Rights and Transparency
Participants have the right to:
• Request an explanation of how decisions affecting them are made.
• Challenge or appeal decisions if they believe that any automated processes (if used in a
supplementary role) have resulted in unfair or inaccurate outcomes.25
• Access information about the data or criteria used to make service-related decisions.
If a participant believes that a decision has been made incorrectly or unfairly, they may contact the Privacy
Officer to discuss their concerns.
13.6 Monitoring and Policy Review
The Company will monitor all systems and processes that use data analytics or technology to ensure they are
used appropriately and ethically. This policy will be periodically reviewed to ensure compliance with evolving
privacy laws and technological developments.
14. Marketing Communications and Opt-Out
14.1 Overview
Xyston Pty Ltd (“the Company”) may use the contact information provided by participants, authorised
representatives, or other users to communicate essential service updates and send marketing
communications related to the Company’s services, events, and relevant opportunities. All such
communications comply with the Spam Act 2003 (Cth) and the Privacy Act 1988 (Cth).
14.2 Consent to Receive Communications
By providing their contact information (including email addresses, phone numbers, or mailing addresses),
participants and users consent to receive:
• Service-related updates: Notifications relevant to the participant’s care, service delivery, or operational
changes (e.g., policy updates, shifts, or new service offerings).
• Marketing communications: Information about the Company’s events, promotions, or new services
that may be of interest to participants or users.
Consent to receive these communications is voluntary, and participants may choose to opt-out at any time.
14.3 Opt-Out Mechanisms
Participants and users may opt out of receiving marketing communications at any time using one of the following
methods:
• Unsubscribe Link: Each marketing email sent by the Company will contain an unsubscribe link
allowing users to stop further marketing emails.
• Direct Contact: Participants may also contact the Privacy Officer directly to opt out of marketing
communications (contact details below).
The Company will process opt-out requests promptly and ensure that no further marketing communications
are sent to individuals who have opted out.
14.4 Communications Not Subject to Opt-Out
Participants and users acknowledge that certain service-related communications are essential for the delivery
of services and cannot be opted out of. These include:
• Service updates: Changes to care plans, appointments, or operational procedures.
• Mandatory notifications: Communications required under the NDIS framework, including incident
reporting or compliance matters.26
Opting out of marketing communications will not affect the delivery of essential service-related
communications.
14.5 Responsibility for Managing Preferences
Participants are responsible for:
• Keeping their contact information up to date to ensure they receive relevant communications.
• Promptly notifying the Company if they wish to change their communication preferences or opt out of
marketing communications.
14.6 Indemnity and Limitation of Liability
The Company takes reasonable steps to ensure compliance with all applicable laws related to communications.
However, participants and users agree to indemnify and hold harmless Xyston Pty Ltd from any claims,
damages, or liabilities arising from:
• Failure to receive service updates due to incorrect or outdated contact information provided by the
participant.
• Misuse of contact information by third-party providers where the Company exercised reasonable care
in engaging those providers.
15. Complaints and Dispute Resolution
15.1 Overview
Xyston Pty Ltd (“the Company”) is committed to addressing all privacy-related complaints promptly, fairly, and
transparently. We value feedback from participants, authorised representatives, and other stakeholders and aim
to resolve any concerns through internal dispute resolution processes.
If a privacy-related complaint cannot be resolved internally, the complainant has the right to escalate the issue
to external authorities as outlined in this policy.
15.2 Internal Complaints Process
Participants, authorised representatives, or users who have concerns about the collection, use, disclosure, or
handling of personal information are encouraged to contact the Company’s Privacy Officer directly.
• How to Submit a Complaint:
Complaints can be submitted via email, phone, or in writing to the Privacy Officer (contact details
below).
• Acknowledgment of Complaint:
The Company will acknowledge receipt of the complaint within five (5) business days.
• Investigation and Response:
The complaint will be investigated thoroughly, and the Company will provide a formal response within
30 days of receiving the complaint, outlining the outcome and any remedial actions, if necessary.
The Company will work with the complainant to resolve the issue amicably. If additional time is required to
address complex complaints, the complainant will be informed of the delay and provided with a revised timeline.
15.3 Escalation to External Authorities
If the complainant is not satisfied with the outcome of the internal complaint process, they may escalate the
matter to the following external bodies:27
• Office of the Australian Information Commissioner (OAIC):
For complaints related to privacy and data handling practices.
o Website: www.oaic.gov.au
• NDIS Quality and Safeguards Commission:
For complaints related to service delivery, compliance, or participant care under the NDIS
framework.
o Website: www.ndiscommission.gov.au
15.4 Contesting Unfounded or Vexatious Complaints
The Company is committed to handling all complaints professionally. However, if a complaint is determined to be
unfounded, vexatious, or submitted in bad faith, the Company:
• Reserves the right to contest the complaint through appropriate legal or regulatory channels.
• Will provide the complainant with a written explanation outlining the reasons for the determination.
• May decline further communication on the matter if the complaint is deemed frivolous or abusive.
15.5 Participant Rights During Dispute Resolution
Participants have the right to:
• Access information about the status of their complaint during the resolution process.
• Be treated with respect and fairness throughout the complaint process.
• Appeal internal decisions through external bodies if dissatisfied with the outcome.
The Company ensures that participants will not be penalised or treated unfairly for lodging a complaint.
15.6 Continuous Improvement and Policy Review
The Company uses complaints and feedback to improve internal processes and ensure compliance with
privacy obligations. Regular reviews of the complaints handling process will be conducted to maintain high
standards of service and accountability.
15.7 Contact Information for Complaints and Dispute Resolution
For inquiries, complaints, or further assistance regarding privacy or data handling practices, please contact:
Privacy Officer
Xyston Pty Ltd
ABN: 84 641 527 433
Email: admin@xyston.com.au
Phone: 08 9468 1502
Mailing Address:
PO BOX 48, KINGSWAY 6065
Perth, Western Australia
16. Governing Law and Jurisdiction
16.1 Governing Law28
This Privacy Policy and any disputes arising from or related to the collection, use, disclosure, storage, or
handling of personal information are governed by the laws of Western Australia. The Company complies with
relevant privacy legislation, including the Privacy Act 1988 (Cth), the Spam Act 2003 (Cth), and applicable
NDIS regulations.
16.2 Jurisdiction for Dispute Resolution
Participants, authorised representatives, and other stakeholders agree that any disputes, claims, or legal
proceedings relating to the Company’s handling of personal information or services will be:
• Resolved under Australian law.
• Subject to the exclusive jurisdiction of the courts of Perth, Western Australia.
All parties waive any objections to the venue or jurisdiction of these courts on the grounds of inconvenient
forum or any other reason.
16.3 International Use
If the Company’s services or platforms are accessed from locations outside of Australia, participants and users
acknowledge that:
• The laws of Western Australia will apply, regardless of the participant’s location or local jurisdiction.
• They are responsible for complying with local privacy laws, to the extent those laws do not conflict with
Australian law.
16.4 Limitation of Claims
Any legal claims or disputes must be filed within 12 months of the event giving rise to the claim, unless a longer
period is required by law. Failure to initiate legal proceedings within this period will result in the claim being
permanently barred.
16.5 Dispute Resolution and Good Faith Negotiation
Before initiating formal legal proceedings, all parties agree to:
• Attempt to resolve disputes in good faith through mediation or negotiation, where possible.
• Pursue alternative dispute resolution (e.g., mediation) as a first step, unless immediate legal action is
required to protect the rights of any party.
17. Policy Amendments and User Notifications
17.1 Right to Amend the Policy
Xyston Pty Ltd (“the Company”) reserves the right to amend, update, or modify this Privacy Policy at its sole
discretion to reflect:
• Changes in legal or regulatory obligations, including updates to the Privacy Act 1988 (Cth) or NDIS
requirements.
• Operational or technological changes that affect how personal information is collected, used, or
disclosed.
• New business practices, systems, or partnerships that may require updates to the policy.29
Amendments will take effect immediately upon publication, unless otherwise specified in the notice provided to
users.
17.2 Notification of Policy Changes
The Company is committed to ensuring transparency by providing timely notice of significant policy
amendments. When changes are made, participants and users will be notified through the following methods:
• Email notification: Sent to the most recent email address on record.
• Website notice: A public announcement or banner displayed on the Company’s website.
If participants or users do not receive a notice due to outdated contact information or technical issues beyond
the Company’s control, it remains the user’s responsibility to review the updated policy on the Company’s
website.
17.3 Continued Use of Services
By continuing to use the Company’s services or platforms after the publication of amendments, participants
and users:
• Acknowledge and accept the revised terms of the Privacy Policy.
• Agree to be bound by the amended policy, regardless of whether they have reviewed it.
If participants or users do not agree with the amended policy, they must discontinue using the Company’s
services and may contact the Privacy Officer to discuss any concerns.
17.4 User Responsibility to Stay Informed
Participants, authorised representatives, and other users are responsible for:
• Keeping their contact information up to date to ensure they receive policy change notifications.
• Regularly reviewing the Privacy Policy on the Company’s website to stay informed about any
changes.
18. Accessibility and Language Options
18.1 Commitment to Accessibility
Xyston Pty Ltd (“the Company”) is committed to ensuring equal access to information for all participants,
authorised representatives, and users, including those with disabilities or language barriers. We strive to make
this Privacy Policy and all other communications accessible and easy to understand for everyone, in
accordance with the Disability Discrimination Act 1992 (Cth) and other relevant laws and standards.
18.2 Availability of Alternative Formats
Participants or users who require this Privacy Policy in alternative formats can request the following:
• Large print versions for users with vision impairments.
• Screen-reader compatible digital formats (e.g., PDF or HTML) for users with disabilities using
assistive technologies.
• Braille versions (if requested and feasible).30
18.3 Language Translation Options
To ensure participants from non-English speaking backgrounds understand the Company’s privacy practices,
the Privacy Policy can be made available in translated versions upon request. The Company will:
• Engage professional translation services to provide accurate translations.
• Ensure that translated versions align with the original English-language policy to maintain
consistency.
Participants and users are encouraged to contact the Company if they require this policy in a specific language.
18.4 Timely Provision of Accessible Formats and Translations
The Company will take reasonable steps to provide the requested format or translation promptly. If a delay
occurs, participants will be informed of the reason and provided with an estimated delivery time.
18.5 No Additional Costs for Accessible Formats or Translations
The Company will provide alternative formats or translations of this Privacy Policy free of charge to ensure fair
access to all participants and users.
18.7 Indemnity and Limitations on Responsibility
While the Company will make every reasonable effort to provide accessible formats and accurate
translations, participants acknowledge that:
• Translations may introduce minor differences in wording or phrasing, which do not affect the
substance or intent of the original English version.
• The English-language version of this Privacy Policy remains the official and legally binding version
for all purposes.
19. Contact Information
For inquiries, complaints, data access requests, or any other questions related to this Privacy Policy and your
personal information, please contact our Privacy Officer at the details provided below:
Privacy Officer
Xyston Pty Ltd
ABN: 84 641 527 433
Email: admin@xyston.com.au
Phone: 08 9468 1502
Mailing Address:
PO BOX 48, KINGSWAY 6065
Perth, Western Australia
19.1 Response Time for Inquiries
The Company is committed to responding to inquiries and complaints promptly. You can expect:
• Acknowledgment of your inquiry or request within five (5) business days.
• A formal response or resolution within thirty (30) days, unless additional time is required. In such
cases, we will inform you of the delay and provide a revised timeframe.31
19.2 Contact for Escalated Complaints
If you are not satisfied with the resolution provided by the Company, you may escalate your complaint to external
authorities:
• Office of the Australian Information Commissioner (OAIC):
www.oaic.gov.au
• NDIS Quality and Safeguards Commission:
www.ndiscommission.gov.au