×

Menu.

Home About Services Privacy Contact

Privacy

C Q Private Investigators aims to protect the privacy of our operatives, clients, internet site visitors or anyone seeking our advice or services for any lawful purpose.
Depending on your situation, you may not protected against legal privilege or process of law. We, as licensed investigators, must & do comply with the National Privacy Principles and the Commonwealth Privacy Act. We work under Queensland State laws including, the Judges Rules, Evidence Act, Invasion of Privacy Act, and the Security Providers Act & Regulations.
All verbal briefings, email messages or attachments sent or given to us for any lawful purpose will not have their information disclosed to anyone who is not connected with our firm or the allocated case. Information obtained by us will be held in the strictest of confidence, electronically and verbally. Any information supplied will be only used for the purpose for which it was intended by the sender. At the completion of every job, we retain a hard copy of our running logs and invoice.
Unless requested by the Client, we retain video, audio or photo files for 7 days only. All files are destroyed 7 days the account is finalised unless instructed to retain them by the Client.
We will not disclose to anyone, information about our clients or the nature of their business unless it is with the explicit authority by request in writing by an authorised representative.
We maintain statistical information relating to the operation of our website and our internet visitors. The information retrieved from a visitor’s computer can be blocked by them by the use of suitably configured firewalls and other software and hardware methods. The information we gather is retained by us and is used only by us for the purpose of website management and development.
We collect and store information during the course of our business including emails and documents we are given. All information is secured in keeping with Section 4.1 of the National Privacy Principles relating to securing and management of personal information. Hard copies are kept under lock and key in a secure file storage cabinet. Electronic copies once received are stored in stand alone computers, not connected to the internet. They are transferred onto USB sticks and once secure, the computer based copy is wiped.
We are aware of the risk of hacking, Virus, Trojans, web bugs or physical intervention with our computer systems. Because of these risks we maintain several firewalls, the latest anti-virus software and attack tracking systems, both physical and electronic. Sensitive information about individuals is encrypted. Information that is incidentally or routinely collected and stored by hosting machines is subject to legal protection and obligation imposed on the owner of the hosting machines and we accept in good faith that the organisations providing hosting services to us protect the privacy of individuals about who information may reside on their machines.
All or any of our commitments expressed above are relinquished where we are required to cooperate with a lawful process of a law enforcement agency duly authorised by law to access such information and information, or are required to relinquish such commitment under legal process or subpoena.


Privacy Statement

C Q Private Investigators aims to protect the privacy of our operatives, clients, internet site visitors or anyone seeking our advice or services for any lawful purpose.
Depending on your situation, you may not protected against legal privilege or process of law. We, as licensed investigators, must & do comply with the National Privacy Principles and the Commonwealth Privacy Act. We work under Queensland State laws including, the Judges Rules, Evidence Act, Invasion of Privacy Act, and the Security Providers Act & Regulations.
All verbal briefings, email messages or attachments sent or given to us for any lawful purpose will not have their information disclosed to anyone who is not connected with our firm or the allocated case. Information obtained by us will be held in the strictest of confidence, electronically and verbally. Any information supplied will be only used for the purpose for which it was intended by the sender. At the completion of every job, we retain a hard copy of our running logs and invoice.
Unless requested by the Client, we retain video, audio or photo files for 7 days only. All files are destroyed 7 days the account is finalised unless instructed to retain them by the Client.
We will not disclose to anyone, information about our clients or the nature of their business unless it is with the explicit authority by request in writing by an authorised representative.
We maintain statistical information relating to the operation of our website and our internet visitors. The information retrieved from a visitor’s computer can be blocked by them by the use of suitably configured firewalls and other software and hardware methods. The information we gather is retained by us and is used only by us for the purpose of website management and development.
We collect and store information during the course of our business including emails and documents we are given. All information is secured in keeping with Section 4.1 of the National Privacy Principles relating to securing and management of personal information. Hard copies are kept under lock and key in a secure file storage cabinet. Electronic copies once received are stored in stand alone computers, not connected to the internet. They are transferred onto USB sticks and once secure, the computer based copy is wiped.
We are aware of the risk of hacking, Virus, Trojans, web bugs or physical intervention with our computer systems. Because of these risks we maintain several firewalls, the latest anti-virus software and attack tracking systems, both physical and electronic. Sensitive information about individuals is encrypted. Information that is incidentally or routinely collected and stored by hosting machines is subject to legal protection and obligation imposed on the owner of the hosting machines and we accept in good faith that the organisations providing hosting services to us protect the privacy of individuals about who information may reside on their machines.
All or any of our commitments expressed above are relinquished where we are required to cooperate with a lawful process of a law enforcement agency duly authorised by law to access such information and information, or are required to relinquish such commitment under legal process or subpoena.