COMMERCIAL TERMS & CONDITIONS OF SALE
Technology Solutions:
- OCR & Data Activation (document intelligence, extraction, validation)
- Redaction & Privacy Protection (automated compliance, sensitive data masking)
- AI Model Training (data pipelines, fine-tuning, RAG, embeddings)
- AI Integration (workflow automation, system connectivity, human-in-the-loop)
- Custom ERP Development & Implementation (including Odoo)
- Custom Hospital Management Systems (healthcare operations, EMR, compliance)
- Technology Strategy Consulting
- Change Management Consulting
- Ethics Charter Development & Implementation
- Digital Transformation Advisory
- Business Process Optimisation
- Compliance & Regulatory Advisory
- Custom Software Development
- System Integration Services
- Training & Capacity Building
- Project Management
- Technical Support & Maintenance
"TRICORE TECH", "we", "us", "our" means TRICORE TECH (ABN 77 249 933 517).
Each engagement is governed by a Statement of Work that specifies:
- Detailed scope of Services
- Deliverables with acceptance criteria
- Timeline, milestones, and dependencies
- Fees, payment terms, and payment schedule
- Resources and responsibilities (both parties)
- Service-specific terms and limitations
- Assumptions and exclusions
We will:
- Perform Services with reasonable care and skill consistent with industry standards
- Use qualified and experienced personnel
- Adhere to applicable professional standards and best practices
- Provide Services in accordance with agreed timelines (subject to clause 2.4)
- Maintain appropriate insurance coverage
- Comply with all applicable Australian laws and regulations
You agree to:
- Provide accurate, complete, and timely information
- Respond to information requests within agreed timeframes (typically 5 business days)
- Provide necessary system access, credentials, and permissions (where applicable)
- Designate authorised representatives for decision-making and approvals
- Review and approve Deliverables within specified timeframes
- Participate in meetings, workshops, and training sessions as required
- Maintain backup of existing systems before integration or implementation work
- Obtain necessary internal approvals and stakeholder buy-in
- Any changes to agreed scope must be documented in writing and signed by both parties
- Change requests must specify impact on timeline, fees, and resources
- Additional fees apply for scope changes beyond the original SOW
- We reserve the right to decline change requests that materially alter project feasibility
- Emergency changes may be implemented subject to subsequent written confirmation
- Your failure to provide required information, approvals, or access
- Third-party service dependencies or failures beyond our reasonable control
- Force majeure events (see clause 11.1)
- Changes in regulatory requirements or compliance standards
- Your internal organisational changes affecting project continuity
- Suspend work until dependencies are resolved
- Adjust timeline and fees to account for extended engagement
- Terminate the engagement per clause 10.2
- We issue a signed Statement of Work; or
- We commence delivery of Services; or
- We provide written confirmation of acceptance
- Services would violate applicable laws or ethical standards
- Services would require us to compromise our "Beyond Digital. Genuinely Human" values
- Services involve unethical use of AI or data exploitation
- Client provides false or misleading information
- Client engages in conduct endangering our staff or systems
- We are not bound by any terms attached to your purchase orders
- Your terms and conditions are hereby excluded
- These Terms take precedence over any conflicting client terms
- All fees are in Australian Dollars (AUD)
- All fees exclude GST (GST will be added where applicable)
- We will provide valid tax invoices for all charges
- Payment in full prior to project commencement; OR
- 50% deposit on signing, 50% on completion
- 20% deposit on signing
- 30% on completion of key milestone (as defined in SOW)
- 50% on final delivery
- 20% deposit on signing
- Progress payments at milestones (as defined in SOW)
- Final payment on completion and acceptance
- Typical structure: 20% / 30% / 30% / 20%
- Monthly retainer invoiced in advance; OR
- Time & materials at agreed hourly/daily rates
- Expenses billed monthly with supporting documentation
- Monthly or quarterly invoicing in advance
- Minimum commitment period as specified in SOW (typically 12 months)
- Invoices are due within 7 business days of invoice date
- Payment must be received by the due date (not just sent)
- Electronic Funds Transfer (EFT) - preferred method
- Credit card (processing fees may apply)
- Direct Debit (for approved payment plans)
- Other methods as agreed in writing
- Interest accrues at 10% per annum, calculated daily from the due date
- All legal costs and debt collection costs are payable by you
- We may suspend provision of Services immediately
- We may withhold delivery of Deliverables
- We may terminate the engagement (see clause 10.4)
- All outstanding invoices become immediately due and payable
- Minimum invoice value: $5,000 (GST exclusive)
- Subject to credit assessment at our sole discretion
- Requires Direct Debit authority via approved payment processor
- Available for: 12, 18, or 24-month terms
- Invoices $5,000 - $10,000: No upfront payment required
- Invoices over $10,000: 20% upfront payment required
- Monthly payments via Direct Debit only
- First payment due on signing
- Payments continue until balance paid in full
- Databases, GitHub repositories, and software remain TRICORE TECH property until final payment
- Early termination or non-payment results in immediate suspension of access
- Third-party software licences or services purchased for your project
- Significant hardware or infrastructure costs
- Projects where client credit assessment raises concerns
- Reasonable travel expenses (flights, accommodation, meals) for on-site work
- Third-party software licences or subscriptions purchased specifically for your project
- Third-party API costs or cloud infrastructure costs exceeding budgeted amounts
- Specialist subcontractor fees (with prior approval)
- Other out-of-pocket expenses approved in advance
- We may review and adjust fees annually
- 60 days' written notice required for any fee increase
- Increases limited to CPI + 5% per annum unless scope significantly changes
- You must notify us in writing within 7 days of invoice date
- Specify the disputed amount and provide detailed reasons
- You must pay all undisputed amounts by the due date
- Failure to pay undisputed amounts constitutes breach
- Interest continues to accrue on all outstanding amounts
- Providing the requested Services
- Communicating with you about Services
- Billing and payment processing
- Improving our Services and developing new offerings
- Complying with legal obligations
- Marketing our Services (with your consent)
- All Client Data is stored on servers physically located within Australia
- All processing of Client Data occurs within Australian territorial boundaries
- Your explicit written consent; and
- Appropriate safeguards compliant with APP 8
- Unauthorised access, use, or disclosure
- Loss, corruption, or destruction
- Misuse or interference
- Unauthorised modification
- Encryption of data in transit (TLS 1.2+) and at rest (AES-256)
- Multi-factor authentication for system access
- Role-based access controls with principle of least privilege
- Regular security assessments and vulnerability scanning
- Employee confidentiality agreements and security training
- Secure development practices and code review
- Incident response and breach notification procedures
- Regular backups with tested recovery procedures
- We implement additional security controls as required by applicable regulations
- We maintain detailed audit logs of all access and processing
- We conduct regular compliance assessments
- We provide compliance reports as specified in SOW
- We implement automated redaction and de-identification where appropriate
- For the duration of the service engagement
- For such period as required by law or regulation
- As specified in the Statement of Work
- Until you request deletion (subject to legal retention requirements)
- Project data: 7 years after project completion (for potential warranty or dispute purposes)
- Backup data: 90 days in rotating backup systems
- Audit logs: 7 years for compliance purposes
- Access personal information we hold about you
- Request correction of inaccurate or incomplete information
- Request deletion of your personal information (subject to legal requirements)
- Lodge a complaint with the Office of the Australian Information Commissioner (OAIC)
- Opt-out of direct marketing communications
- Request a copy of your data in portable format
- We will notify you within 72 hours of becoming aware
- We will notify the OAIC if required under the Notifiable Data Breaches scheme
- We will take immediate steps to contain and remediate the breach
- We will provide detailed incident reports as required
- Providing the Services specified in the SOW
- Internal quality assurance and improvement purposes
- Creating de-identified insights for service enhancement
- OCR and AI algorithms, models, and training methodologies
- Software platforms, tools, frameworks, and libraries
- Redaction and privacy protection technologies
- ERP modules, templates, and configurations
- Hospital management system components
- Consulting methodologies, frameworks, and templates
- Process improvement tools and assessments
- Ethics charter templates and frameworks
- Project management methodologies
- All improvements, modifications, and derivatives of the above
- Source code, scripts, modules, and APIs
- Database schemas, structures, and migrations
- AI models trained on your data
- Odoo customisations, modules, and apps
- SharePoint integrations and workflows
- User interfaces and front-end components
- Technical documentation and specifications
- Architecture designs and system diagrams
- Full payment of all fees
- Ongoing compliance with these Terms
- Prohibition on reverse engineering, decompiling, or modification without consent
- Prohibition on resale, sub-licensing, or transfer to third parties
- Strategic recommendations and reports created specifically for you
- Change management plans and communication materials
- Ethics charters and policy documents
- Training materials developed specifically for your organisation
- Workshop outputs and documented insights
- Underlying consulting methodologies and frameworks
- Template materials and assessment tools
- Benchmarking data and comparative analyses
- Process models and improvement frameworks
- Transfer, sell, sub-licence, or distribute custom development to third parties
- Modify, adapt, or create derivative works without written consent
- Remove, alter, or obscure proprietary notices or attribution
- Use our IP to develop competing products or services
- Reverse engineer, decompile, or disassemble our technology
- Extract or reuse algorithms, models, or methodologies
- Register any trademarks, domain names, or IP rights confusingly similar to ours
- We will disclose applicable open-source licences
- You agree to comply with all open-source licence terms
- We disclaim all warranties for open-source components
- All tierce software are is subject to tierce proprietary licence
- You own your training data; we process it under licence only
- We own the trained model architecture and methodologies
- You receive a licence to use models trained specifically for you
- Models cannot be transferred, sold, or used to train competing models
- We may retain de-identified model performance metrics for research
- We may use such feedback without restriction or compensation
- You grant us a perpetual, royalty-free licence to implement feedback
- We are under no obligation to implement feedback or maintain confidentiality
- Business strategies, plans, and financial information
- Technical data, algorithms, source code, and methodologies
- Client lists, pricing, and commercial terms
- Trade secrets and proprietary processes
- Information marked or identified as confidential
- Information that would reasonably be considered confidential
- Maintain the confidentiality of the other party's Confidential Information
- Use Confidential Information only for purposes of the engagement
- Not disclose Confidential Information to third parties without prior written consent
- Protect Confidential Information with at least the same degree of care used for its own confidential information (and no less than reasonable care)
- Limit access to employees and contractors with a legitimate need to know
- Ensure employees and contractors are bound by equivalent confidentiality obligations
- Return or destroy Confidential Information upon termination or request
- Is publicly available through no breach of these Terms
- Was lawfully known prior to disclosure and not subject to confidentiality obligations
- Is independently developed without use of or reference to Confidential Information
- Is received from a third party without breach of confidentiality obligations
- Must be disclosed by law, regulation, or court order (with prompt notice to disclosing party)
- We acknowledge the sensitive nature of patient information and legal privilege
- We implement additional safeguards for protected health information (PHI)
- We respect legal professional privilege and attorney-client privilege
- We will not disclose privileged information except as required by law
- Staff working on privileged matters sign additional confidentiality agreements
- 5 years after termination of the engagement for commercial information
- Indefinitely for trade secrets that retain their confidential nature
- Indefinitely for personal information subject to Privacy Act requirements
- Immediate termination of the engagement
- Injunctive relief to prevent further disclosure
- Liability for damages caused by the breach
- Reputational harm remedies
- Delivery of physical items to you, your agent, or nominated location
- Provision of access credentials for software, systems, or databases
- Sending of electronic deliverables (reports, documents) via email
- Commencement of training or go-live for implemented systems
- All invoices related to the specific engagement are paid in full; AND
- All amounts owing to TRICORE TECH (on any invoice, for any engagement) are paid in full
Software and Code:
- All custom development, source code, and compiled applications
- OCR and AI solutions, models, and algorithms
- Integration connectors and API implementations
- User interfaces and front-end applications
- Mobile applications and edge deployments
- Software instances and databases
- Hospital management system databases
- GitHub repositories and version control systems
- Azure, AWS, or cloud infrastructure provisioned for your use
- Any hosted environments or platforms
- Strategy documents and recommendations (until paid)
- Change management plans and materials
- Ethics charters and policy frameworks
- Training materials and documentation
- Technical specifications and architecture designs
- Suspend or revoke access to all software, systems, databases, and platforms
- Suspend provision of all Services (including support and maintenance)
- Retain possession of all physical and electronic Deliverables
- Enter your premises (with reasonable notice) to recover physical items
- Exercise all rights under the Personal Property Securities Act 2009 (Cth)
- Cancel software licences and access credentials
- Remove custom code from production environments
- You hold Deliverables as bailee only
- You must store Deliverables separately and identifiably
- You must not sell, dispose of, encumber, or deal with Deliverables
- You must maintain insurance for the full replacement value
- You must notify us immediately of any loss, damage, or seizure
- You acknowledge our superior title and right to repossess
- TRICORE TECH reserves the right to register a security interest under the Personal Property Securities Act 2009 (Cth) over any Deliverables supplied on credit.
- You waive your right to receive notice of registration or verification statements under the PPSA.
You agree to sign any documents necessary to perfect our security interest. - Registration costs are payable by you.
You must not register any security interest that would rank ahead of ours
- Licences are conditional upon payment
- Non-payment constitutes automatic suspension of licence rights
- You must immediately cease all use upon suspension
- Continued use after suspension constitutes copyright infringement
- We may implement technical measures to enforce suspension
- We have the authority and right to provide the Services
- Services will be performed with reasonable care and skill consistent with industry standards
- Services will substantially comply with specifications in the Statement of Work
- We will comply with all applicable Australian federal and state laws
- We have appropriate insurance coverage for our business operations
- Our staff and contractors have appropriate qualifications and experience
- Accuracy is not guaranteed: OCR accuracy depends on source document quality, format, language, and content type
- Typical accuracy ranges: 70-95% for clean typed documents; 60-85% for scanned documents; 50-80% for handwritten text
- Quoted accuracy rates are estimates based on controlled testing conditions
- Real-world performance may vary significantly based on your specific documents
- AI systems can produce errors, including misreads, hallucinations, and unexpected outputs
- Human validation is essential for critical applications, legal documents, medical records, and financial data
- We strongly recommend implementing human-in-the-loop review for all mission-critical extractions
- Not suitable for: Safety-critical decisions, life-critical applications, or legally binding determinations without human verification
- No redaction system is 100% accurate - automated detection may miss sensitive data or over-redact
- You remain ultimately responsible for compliance with privacy laws and regulations
- Human review is recommended before releasing redacted documents externally
- We implement industry-standard detection but cannot guarantee detection of all sensitive data
- New data patterns not in training data may not be detected
- You must validate redaction outputs against your specific compliance requirements
- Permanent redaction cannot be undone - ensure thorough review before applying
- Model performance depends on data quality - garbage in, garbage out
- Training data biases will be reflected in model outputs
- Models may not generalise well to data significantly different from training data
- Ongoing monitoring and retraining are essential for production deployments
- Models can degrade over time as real-world data distributions shift
- We provide best-effort training but cannot guarantee specific accuracy levels
- Production deployment responsibility remains with you
- AI outputs require validation before use in business-critical decisions
- Integration depends on third-party APIs which may change or become unavailable
- System performance depends on your infrastructure, data quality, and network connectivity
- We are not responsible for third-party system downtime, bugs, or changes
- Guardrails and validation are essential and must be maintained by you
- Custom software may contain bugs despite thorough testing
- User acceptance testing (UAT) is your responsibility before go-live
- Data migration accuracy depends on source data quality and completeness
- You must maintain backups of all systems before migration or updates
- We are not responsible for data loss caused by your failure to maintain backups
- Production deployment occurs only after your explicit written approval
- Healthcare systems require additional validation and compliance testing by you
- Recommendations are based on information you provide and assumptions stated in reports
- Implementation success depends on your organisational commitment and change capacity
- We provide advice only - you remain responsible for all business decisions
- Outcomes are not guaranteed - recommendations do not ensure specific results
- External factors beyond our control may affect implementation success
- You must validate recommendations against your specific context and risk tolerance
- Our warranty applies only to the version of software/systems delivered and tested
- Upgrades to new versions constitute new services requiring separate agreement and fees
- We are not responsible for impacts of software updates on custom development unless separately contracted
- You must test all updates in non-production environments before applying to production
- Third-party software updates may introduce breaking changes or incompatibilities
- We may issue security patches which you must apply promptly
- Failure to apply security patches may void warranties and support agreements
- Third-party software, platforms, or services
- Systems, data, or infrastructure not under our direct control
- Internet connectivity, cloud service availability, or network performance
- API availability, rate limits, or changes by third-party providers
- Results that depend on factors outside our reasonable control
- Warranties of merchantability or fitness for particular purpose
- Warranties of non-infringement
- Warranties of uninterrupted or error-free operation
- Warranties of compatibility with all systems or data formats
- Warranties of specific performance levels or outcomes
- For Services: Re-supplying the Services or paying the reasonable cost of having Services supplied again
- For Goods: Replacing goods, repairing goods, or paying the reasonable cost of replacement or repair
- With our prior written consent (at our sole discretion); or
- By providing written notice at least 14 days before scheduled commencement; or
- By paying applicable cancellation fees as specified below
- Forfeit of deposit (typically 20-50% of total project value)
- Reimbursement of any costs already incurred (third-party licences, travel bookings)
- 40% of total project value (minimum)
- Plus all costs incurred to date
- 60% of total project value
- Plus all costs incurred to date
- 100% of total project value (no cancellation permitted at this stage)
- Payment for all time incurred to date
- Plus one month's notice period fees
- One month's fees as cancellation penalty
- Plus all fees through the minimum commitment period
- Any invoice remains unpaid for more than 7 days after the due date
- You breach any material term of these Terms
- You provide false, misleading, or incomplete information
- You engage in conduct that endangers our staff, systems, or reputation
- You fail to provide required cooperation, access, or approvals
- Continued performance would violate our ethical standards or legal obligations
- You use Services for unlawful or unethical purposes
- Any invoice remains unpaid for 30 days or more after the due date
- You become insolvent, enter administration, or commence bankruptcy proceedings
- You materially breach these Terms and fail to remedy within 7 days of written notice
- You engage in fraudulent, unlawful, or unethical conduct
- Continued performance becomes illegal or impossible
- You violate confidentiality, IP, or data security obligations
- Either party may terminate by providing 60 days' written notice
- You remain liable for all Services provided up to the termination date
- You must pay for all non-cancellable commitments made on your behalf
- No refund for pre-paid Services, setup fees, or development costs
- Minimum commitment periods must be satisfied before termination
- All outstanding invoices become immediately due and payable
- We will deliver all completed Deliverables (subject to payment)
- You must immediately cease using any TRICORE TECH IP, systems, or software
- We may suspend or terminate access to databases, platforms, and cloud environments
- We may remove custom code from production systems (with reasonable notice)
- You must return or destroy all Confidential Information within 14 days
- Each party releases the other from future obligations (except surviving clauses)
- Accrued rights, obligations, and causes of action survive termination
- Clause 4 (Fees and Payment) - for amounts owing
- Clause 5 (Privacy and Data Protection)
- Clause 6 (Intellectual Property)
- Clause 7 (Confidentiality)
- Clause 11 (Liability and Indemnification)
- Clause 14 (Credit Assessment) - for credit reporting obligations
- Clause 16 (Dispute Resolution)
- Clause 17 (General Provisions)
- All fees paid for Services already provided are non-refundable
- Deposits, setup fees, and advance payments are non-refundable in all circumstances
- No refunds for Services you choose not to use, access, or implement
- No refunds for project delays caused by you
- No refunds if you terminate for convenience
- We will provide reasonable transition assistance (at standard hourly rates)
- We will export your data in commonly used formats (CSV, JSON, SQL dump)
- We will provide documentation for systems we've implemented
- We will cooperate with your new service provider (subject to confidentiality)
- Transition assistance must be requested within 30 days of termination
- Natural disasters, pandemics, acts of God, extreme weather
- Government actions, laws, regulations, war, terrorism, civil unrest
- Internet, telecommunications, or power failures (affecting third-party infrastructure)
- Cyberattacks, data breaches, or denial-of-service attacks (affecting third parties)
- Supplier failures, material shortages, or supply chain disruptions
- Labour disputes, strikes, or industrial action (not involving our own employees)
- The fees paid by you to TRICORE TECH in the 12 months preceding the claim; OR
- $50,000;
- Whichever is LESS
- Loss of profits, revenue, or business opportunities
- Loss of anticipated savings or business
- Loss of data (except as required by Australian Consumer Law and subject to clause 11.8)
- Loss of goodwill or reputation
- Business interruption or downtime
- Cost of substitute goods or services
- Damages arising from third-party claims
- Damages caused by: Your failure to follow recommendations, instructions, or documentation; your misuse of Deliverables, Services, or systems; third-party systems, software, services, or actions; force majeure events (clause 11.1); your violation of these Terms or applicable laws, acts or omissions of your employees, contractors, or agents
- Consumer guarantees under the Competition and Consumer Act 2010 (Cth)
- Personal injury or death caused by our negligence
- Liability for misleading or deceptive conduct
- Liability for breach of essential terms that cannot be limited
- Fraud, wilful misconduct, or gross negligence by TRICORE TECH
- Breach of confidentiality obligations (clause 7)
- Breach of privacy obligations (clause 5)
- Infringement of third-party intellectual property rights (clause 11.6)
- Your breach of these Terms or any applicable laws or regulations
- Content, accuracy, legality, or completeness of Client Data you provide
- Your use, misuse, or inability to use Deliverables or Services
- Your violation of third-party rights (including intellectual property rights, privacy rights, or confidentiality obligations)
- Claims by your employees, contractors, customers, or other third parties related to Services
- Your failure to obtain necessary consents, approvals, or authorisations
- Your implementation or deployment of Deliverables in production environments
- Business decisions made based on our recommendations or advice
- Modifications you make to Deliverables without our authorisation
- Your failure to comply with third-party licence terms
- You notify us promptly in writing of any claim
- You give us sole control of the defence and settlement
- You provide reasonable assistance in the defence
- The infringement was not caused by your modifications or misuse
- The infringement was not caused by combination with non-TRICORE TECH systems
- Obtain a licence for you to continue using the Deliverable
- Replace or modify the Deliverable to be non-infringing
- Refund fees paid for the infringing Deliverable
- Provide prompt written notice of the claim
- Provide reasonable cooperation and assistance
- Allow the indemnifying party to control defence and settlement
- Do not admit liability or settle without indemnifying party's consent
- Maintaining adequate backups of all systems and data
- Testing backup and recovery procedures regularly
- Ensuring business continuity and disaster recovery capabilities
- Data loss prevention and retention policies
- Where data loss results directly from our gross negligence or wilful misconduct; AND
- You have complied with all our recommendations regarding backups; AND
- You can demonstrate actual unrecoverable loss
- Email notification to your designated project contact
- Providing access credentials (for software/systems)
- Making files available for download (for documents/reports)
- Scheduling go-live or implementation (for deployed systems)
- Test, inspect, and review Deliverables
- Compare against specifications in the Statement of Work
- Provide written notice of any material non-conformance
- Specify defects, errors, or deviations requiring remedy
- Deliverable fails to meet essential specifications in SOW
- Critical functionality is missing or inoperative
- Deliverable contains significant errors preventing intended use
- Security vulnerabilities rated Critical or High severity
- Minor cosmetic issues or aesthetic preferences
- Performance on unsupported browsers, devices, or configurations
- Enhancements or features not specified in SOW
- Issues caused by your infrastructure, data, or environment
- Third-party system issues beyond our control
- Deliverables are deemed accepted by you
- Payment becomes due per the payment schedule
- Any later-discovered non-conformance does not entitle you to refuse payment
- Your remedies are limited to warranty provisions (clause 9) and applicable consumer guarantees
- Your rights under Australian Consumer Law
- Our warranty obligations (clause 9)
- Your right to claim for latent defects discovered later
- We will remedy the non-conformance within a reasonable timeframe
- You provide reasonable cooperation to facilitate remediation
- Accept the Deliverable as-is with fee reduction (to be negotiated); or
- Terminate the engagement and receive a pro-rata refund (minus work completed)
- We may deliver Services in phases or increments per the SOW
- Each part delivery constitutes a separate supply under these Terms
- Payment for each part delivery becomes due per the payment schedule
- Acceptance of one part does not imply acceptance of others
- Rejection of one part does not entitle you to reject other conforming parts
- Hours must be consumed within 12 months of payment
- After 12 months, unused hours are forfeited with no refund
- Hours are non-transferable between projects, entities, or engagements
- Work is tracked in minimum 1-hour increments (rounded up)
- Travel time is excluded unless specified otherwise in SOW
- We provide monthly usage reports showing hours consumed and remaining
- 9:00 AM - 5:00 PM AWST, Monday to Friday (excluding WA public holidays)
- After-hours support available by prior arrangement (additional fees apply)
- Critical issues (system down, data loss): 4 hours
- High priority (major functionality impaired): 8 hours
- Medium priority (minor functionality issue): 24 hours
- Low priority (questions, enhancement requests): 48 hours
- Bug fixes and error resolution
- Assistance with normal system operation
- Guidance on using features per documentation
- Security patches for custom code
- Minor clarifications and troubleshooting
- Issues caused by your modifications or third-party changes
- User training (unless separately contracted)
- New feature development or enhancements
- Issues with third-party systems not under our control
- Data recovery from your backup failures
- Performance issues caused by your infrastructure
- Issues outside supported configurations
- We may review support fees annually with 60 days' written notice
- Fee adjustments based on CPI + complexity of environment
- Material scope changes may require new support agreement
- We may release security patches which you should apply promptly
- Functional updates and new versions are separate services requiring new agreements
- We provide 90 days' notice before deprecating or discontinuing support for any version
- Updates and upgrades are your responsibility unless contracted separately
- We are not liable for impacts of third-party updates on your systems
- We strongly recommend testing all updates in non-production environments
- Major version upgrades typically require separate professional services engagements
- Competition and Consumer Act 2010 (Cth) (Australian Consumer Law)
- Privacy Act 1988 (Cth) and Australian Privacy Principles
- Corporations Act 2001 (Cth)
- Fair Work Act 2009 (Cth) (where applicable)
- Personal Property Securities Act 2009 (Cth)
- Copyright Act 1968 (Cth)
- Australian Consumer Law (WA)
- Other applicable commonwealth and state legislation
- Privacy Act 1988 (Cth) and Australian Privacy Principles
- Health Records Act (relevant state/territory)
- My Health Records Act 2012 (Cth)
- Therapeutic Goods Act 1989 (Cth) (if applicable)
- National Safety and Quality Health Service Standards
- HL7/FHIR interoperability standards
- DICOM standards for medical imaging
- PBS and Medicare compliance requirements
- Legal profession regulations (relevant state/territory)
- Legal professional privilege protections
- Solicitor-client confidentiality obligations
- Anti-money laundering and counter-terrorism financing obligations
- Trust accounting requirements (where relevant)
- Information Security Manual (ISM) published by Australian Signals Directorate
- Protective Security Policy Framework (PSPF)
- Australian Government architecture standards
- Accessibility requirements (WCAG 2.1 Level AA)
- Records management standards
- FOI Act obligations
- Civil Aviation Safety Regulations 1998 (Cth)
- CASA compliance requirements
- Aviation security regulations
- Pilot licensing and medical certification standards
- Compliance with all laws and regulations applicable to your industry and business
- Obtaining necessary approvals, licences, or certifications for your operations
- Ensuring processed data and Deliverables are used in compliance with applicable laws
- Obtaining necessary consents from data subjects
- Meeting industry-specific compliance standards
- Regulatory reporting and audit obligations
- Maintaining professional indemnity or other required insurance
- Implementing technical controls to meet compliance requirements
- Generating compliance reports and audit trails
- Configuring systems to support your compliance processes
- Providing documentation of our processes and controls
- Regulatory investigations or audits affecting the Services
- Enforcement actions related to the Services or Deliverables
- Compliance breaches that may impact the other party
- Changes in applicable regulations affecting the Services
- We commit to developing AI systems that respect human dignity and autonomy
- We implement bias detection and mitigation in AI model training
- We provide transparency about AI capabilities and limitations
- We support human-in-the-loop validation for critical applications
- We refuse to develop AI for surveillance, manipulation, or human harm
- We advocate for responsible AI governance and ethical frameworks
- Conduct credit checks with credit reporting agencies
- Obtain commercial credit reports about you or your business
- Contact trade references you provide
- Verify information with your bank or financial institutions (with consent)
- Assess your creditworthiness and financial position
- Exchange credit information with other credit providers
- Your identity: Name, ABN/ACN, business address, contact details
- Credit arrangements: Credit limits, payment terms on your account
- Payment defaults: Amounts overdue by 60+ days
- Payment status: Advice when overdue payments are settled
- Dishonoured payments: Cheques, direct debits, or credit card payments that are dishonoured
- Serious credit infringements: Fraudulent conduct or material breaches
- Cessation of supply: Advice that we have ceased supplying Services due to non-payment
- Privacy Act 1988 (Cth), particularly Part IIIA (Credit Reporting)
- Privacy (Credit Reporting) Code 2014
- Our Privacy Policy
- Access your credit information we hold
- Request correction of credit information
- Complain to us or the OAIC about credit reporting
- Refuse to provide Services on credit terms
- Require payment in advance or deposits
- Set credit limits on your account
- Reduce or cancel existing credit facilities at any time
- Require personal guarantees from company directors
- Require security interests over assets
- Deliverables supplied on credit (see clause 8.5)
- Software licences and databases
- Equipment, hardware, or infrastructure provided
- All present and after-acquired property (PMSI)
- Waive your right to receive notice of registration or verification statements
- Agree to sign any documents necessary to perfect our security interest
- Must not create security interests that rank ahead of ours without written consent
- Agree to pay our reasonable costs of PPSR registration and enforcement
- You agree to pay all reasonable collection costs
- This includes collection agency fees, legal costs (solicitor-client basis), and enforcement expenses
- Court filing fees and debt recovery costs are payable by you
- These costs are in addition to the outstanding invoice amount and interest
- Day 8 after due date: First reminder email
- Day 15 after due date: Second reminder by phone and email
- Day 22 after due date: Final notice before suspension of Services
- Day 30 after due date: Suspension of Services and formal demand letter
- Day 45 after due date: Referral to collection agency or legal action
- Day 60+ after due date: Credit reporting of default (if applicable)
- Continue to perform all obligations under these Terms (to the extent possible)
- Make all undisputed payments when due
- Maintain all confidentiality obligations
- Not take actions that escalate or worsen the dispute
- Act in good faith to resolve the dispute expeditiously
- Either party may initiate negotiations by providing written notice describing the dispute
- Senior representatives from each party (director level or above) must meet within 14 days
- Meeting may be in person or via video conference
- Parties must negotiate in good faith for 30 days from the initial notice
- Each party bears its own costs during negotiation
- Either party may require mediation by providing written notice
- Parties must agree on an independent mediator within 14 days of notice
- If no agreement on mediator, either party may request appointment by Resolution Institute
- Mediation must occur within 45 days of mediation notice
- Mediation location: Perth, WA (or video conference if agreed)
- Each party bears its own costs; mediator fees shared equally
- Mediation communications are without prejudice and confidential
- Either party may commence legal proceedings
- These Terms are governed by the laws of Western Australia
- Both parties submit to the non-exclusive jurisdiction of the courts of Western Australia
- Exclusive jurisdiction means WA courts only; non-exclusive means we may sue you elsewhere if needed
- Urgent interlocutory or injunctive relief to prevent immediate harm
- Urgent relief to protect intellectual property rights
- Debt recovery proceedings for undisputed amounts
- Orders for delivery up of property or Deliverables
- Statutory demands or wind-up applications
- Protection of confidential information
- You must pay all undisputed amounts by the due date regardless of any dispute
- You may withhold only the specific disputed amount (with written explanation)
- Failure to pay undisputed amounts constitutes breach
- Interest continues to accrue on all outstanding amounts during dispute
- We may suspend Services for non-payment during dispute
- If we successfully sue you for payment, you pay our legal costs (solicitor-client basis)
- If litigation is required due to your breach, you pay our reasonable costs
- Otherwise, each party typically bears its own legal costs (unless court orders otherwise)
- Costs of expert witnesses may be allocated by the court
- Use Services for any illegal purpose or in violation of any laws
- Submit documents or data containing illegal content
- Use Services to infringe third-party intellectual property, privacy, or other rights
- Use Services to defame, harass, threaten, or harm any person or entity
- Use Services to distribute malware, viruses, or other harmful code
- Attempt to reverse engineer, decompile, or disassemble our technology
- Attempt to circumvent security measures or access controls
- Overload, interfere with, or disrupt our systems or infrastructure
- Use automated scripts, bots, or scrapers without authorisation
- Probe, scan, or test vulnerabilities of our systems
- Access systems or data not intended for you
- Use Services to compete with TRICORE TECH or develop competing products
- Resell, sub-licence, or redistribute Services without authorisation
- Remove, alter, or obscure proprietary notices or attribution
- Use Services on behalf of third parties without separate agreement
- Exceed usage limits or quotas specified in your SOW
- Submit data you do not have rights to use or process
- Process personal information without appropriate legal basis and consents
- Violate privacy laws or regulations
- Submit data containing malicious or corrupted content
- Store or process data in ways that violate these Terms
- Immediate suspension or termination of Services without notice
- Withholding of Deliverables until violation is remedied
- Liability for all damages caused to us or third parties
- Reporting to law enforcement or regulatory authorities
- Legal action to recover damages and seek injunctive relief
- Forfeiture of all fees paid (no refund)
- Monitor usage of Services for compliance with these Terms
- Investigate suspected violations
- Require you to provide information or evidence of compliance
- Audit your use of Services (with reasonable notice)
- The applicable Statement of Work
- Our Privacy Policy (please refer to the table of content)
- Any annexures or schedules specifically referenced
- Negotiations, discussions, and understandings
- Representations (oral or written)
- Agreements, arrangements, and commitments
- Quotes, proposals, and marketing materials
- Updated Terms will be posted on our website with the "Last Updated" date
- We will notify you of material changes by email or through the service platform
- Your continued use of Services after changes constitutes acceptance
- For significant changes, we may require explicit acceptance
- Both parties agree in writing to adopt updated Terms; or
- The SOW explicitly incorporates future amendments
- Documented in writing as a formal change order or amendment
- Signed by authorised representatives of both parties
- Clearly specify impact on scope, timeline, fees, and other terms
- That provision will be limited or eliminated to the minimum extent necessary
- The remaining provisions will remain in full force and effect
- The parties will negotiate in good faith to replace the invalid provision with a valid provision that achieves a similar commercial outcome
- Waiver of one breach does not waive subsequent breaches
- Waiver of one provision does not waive other provisions
- Any waiver must be in writing and signed by the waiving party
- No course of dealing establishes a waiver
- You may not assign, transfer, or novate these Terms or your rights hereunder without our prior written consent
- Any attempted assignment without consent is void
- Change of control of your entity may be deemed an assignment requiring our consent
- We may assign these Terms to a related body corporate (as defined in Corporations Act) or a successor entity in connection with merger, acquisition, or sale of assets
- We will provide you notice of any assignment
- Assignment does not relieve us of obligations already accrued
- We may subcontract work to qualified subcontractors
- We remain responsible for subcontractor performance
- Subcontractors are bound by equivalent confidentiality and security obligations
- You may not subcontract or delegate your obligations without our consent
- The parties are independent contractors
- Nothing in these Terms creates a partnership, joint venture, employment, or agency relationship
- Neither party has authority to bind the other or make commitments on the other's behalf
- Neither party is entitled to employee benefits from the other
- In writing (email acceptable for routine notices)
- Sent to the addresses specified below
- In English
- Email: Upon transmission (unless delivery failure notification received)
- Post (within Australia): 5 business days after posting
- Post (international): 10 business days after posting
- Hand delivery: Upon delivery during business hours
- Registered post: On the date acknowledged as received
- Termination notices
- Legal demands or claims
- Notices of material breach
- Dispute resolution notices
- Clause 4 (Fees and Payment) - for amounts owing
- Clause 5 (Privacy and Data Protection) - indefinitely
- Clause 6 (Intellectual Property) - indefinitely
- Clause 7 (Confidentiality) - per durations specified
- Clause 8 (Title and Property Security) - until all amounts paid
- Clause 11 (Liability and Indemnification) - indefinitely for accrued claims
- Clause 14 (Credit Assessment) - for credit reporting obligations
- Clause 15 (Dispute Resolution) - for any disputes
- Clause 17 (General Provisions) - as applicable
- Execute any documents reasonably necessary to give effect to these Terms
- Take any actions reasonably necessary to perform obligations
- Cooperate in good faith to achieve the purposes of the engagement
- Provide reasonable assistance to enable the other party to perform
- Exercising one right does not preclude exercising others
- Rights under these Terms are in addition to rights at law or in equity
- No remedy is exclusive unless explicitly stated
- No third party has any right to enforce these Terms
- Subcontractors and related parties have no direct rights
- Exception: Indemnified parties under clause 11 may enforce indemnification provisions
- These Terms and Statements of Work may be executed in counterparts
- Each counterpart constitutes an original, all together constitute one agreement
- Electronic signatures (including DocuSign, Adobe Sign) are valid and binding
- Facsimile or PDF signatures are acceptable
- Headings are for convenience only and do not affect interpretation
- References to "including" or "includes" mean "including without limitation"
- References to clauses are to clauses in these Terms
- References to statutes include amendments and replacements
- Singular includes plural and vice versa
- References to persons include individuals, companies, and other entities
- References to "written" or "in writing" include email
- These Terms are governed by the laws of Western Australia
- The parties submit to the non-exclusive jurisdiction of the courts of Western Australia
- Where relevant, the laws of the Commonwealth of Australia also apply
- United Nations Convention on Contracts for the International Sale of Goods does not apply
- Accuracy Targets: As specified in SOW (typically 70-95% depending on document type)
- Human Validation: Mandatory for production deployments unless explicitly waived in SOW
- Batch Processing: Processing times depend on volume, complexity, and validation requirements
- Supported Formats: PDF, JPG, PNG, TIFF, DOCX (others by arrangement)
- File Size Limits: Maximum 50MB per document unless otherwise agreed
- Language Detection: Automatic for supported languages (English, primary focus)
- Confidence Scores: Provided for all extractions to guide validation priorities
- Provide documents in readable quality
- Validate all outputs before use in business decisions
- Not use outputs for safety-critical or life-critical applications without extensive additional validation
- Comply with data protection laws when processing personal information
- Handwritten text accuracy may be significantly lower than typed text
- Poor quality scans may yield unacceptable results
- Some document types (e.g., heavily formatted tables, non-Latin scripts) may require custom development
- Compliance Templates: Pre-built policies for HIPAA, GDPR, Australian Privacy Principles
- Detection Methods: Pattern matching, named entity recognition, machine learning models
- Redaction Types: Permanent burn-in or reversible overlay (specify in SOW)
- Audit Trails: Complete logs of what was detected and redacted
- Review Interface: Human review recommended before finalising redactions
- Bulk Processing: Available for large document sets
- Ultimate compliance responsibility remains with you
- Review redacted documents before external distribution
- Validate that all sensitive data has been appropriately masked
- Maintain audit trails for regulatory compliance
- Test redaction policies on sample documents before production use
- No automated system achieves 100% detection accuracy
- Novel or unusual data patterns may not be detected
- You must validate outputs for your specific regulatory requirements
- We are not legal or compliance advisers
- Data Pipeline: Cleaning, labelling, balancing, synthetic generation as needed
- Training Approaches: Fine-tuning foundation models, RAG, custom embeddings, ensemble methods
- Privacy Controls: Local processing, data anonymisation, Australian data sovereignty
- Bias Mitigation: Testing and adjustment to reduce algorithmic bias
- Delivery: Deployable models for Azure, AWS, on-premises, or edge environments
- Documentation: Model cards, training procedures, performance metrics
- Provide sufficient quality training data (quantity and diversity per SOW)
- Review and approve data labelling and preparation
- Test models thoroughly before production deployment
- Monitor model performance continuously post-deployment
- Retrain models periodically to prevent drift
- Ensure appropriate use cases (not safety-critical without extensive validation)
- Model performance depends entirely on training data quality
- Biases in training data will be reflected in model outputs
- Models may not generalise to significantly different data distributions
- Production deployment and monitoring are your responsibility
- We provide best-effort training, not guaranteed accuracy levels
- Integration Methods: REST APIs, webhooks, Power Automate connectors, custom middleware
- Workflow Automation: Intelligent triage, extraction, routing, approvals, summaries, chat interfaces
- Human-in-the-Loop: Configurable validation steps and approval workflows
- Security: API authentication, encryption, audit logging, role-based access
- Deployment: Cloud (Azure/AWS) or on-premises per your requirements
- Monitoring: Performance dashboards, error alerting, usage analytics
- Provide access to systems for integration (credentials, APIs, documentation)
- Test integrations in non-production environments
- Train users on new workflows
- Monitor AI outputs for accuracy and appropriateness
- Maintain guardrails and validation processes
- Ensure third-party API quotas and rate limits are adequate
- Integration depends on third-party API availability and stability
- We are not responsible for third-party system changes, downtime, or bugs
- API rate limits may affect performance
- You remain responsible for business decisions based on AI outputs
Key Provisions:
- Modules: Finance, Procurement, Inventory, Projects, HR, CRM, Manufacturing, Sales, etc.
- Customisation: Tailored workflows, automations, reports, dashboards, integrations
- Odoo Platform: Community (LGPL) or Enterprise (Odoo SA licence) per SOW
- Integration: Accounting systems, e-commerce, logistics, third-party APIs
- Security: SSO, RBAC, audit logs, data encryption
- Deployment: Cloud hosting, on-premises, or hybrid architecture
- Training: User training and documentation included per SOW
- Go-Live Support: Transition assistance during initial production period
- Define business requirements and approval workflows
- Participate in design workshops and UAT
- Provide accurate data for migration
- Maintain backups before go-live
- Allocate internal resources for project (subject matter experts, decision-makers)
- Obtain necessary stakeholder buy-in and change management
- Community Edition: LGPL v3 licence (open-source)
- Enterprise Edition: Odoo SA proprietary licence (annual subscription required)
- Custom Modules: TRICORE TECH IP unless otherwise agreed (see clause 6)
- Database Hosting: Remains TRICORE TECH property until full payment (see clause 8)
- Version Upgrades: Separate service requiring new agreement
- Third-Party Apps: Subject to their respective licences
- Clinical Suite: EMR, appointment scheduling, pharmacy, pathology, radiology, theatre management
- Administrative: Patient registration, insurance, billing, claims, reporting
- Compliance: Australian Privacy Principles, health records legislation, Medicare integration
- Standards: HL7/FHIR messaging, DICOM imaging, ICD-10 coding, SNOMED CT terminology
- Security: Role-based access, consent management, audit logs, encryption
- Infrastructure: Cloud or on-premises with redundancy, backups, disaster recovery
- Integration: Existing practice management systems, imaging systems, pathology labs
- Training: Comprehensive staff training on clinical workflows
- Clinical validation is your responsibility - we provide technology only
- Ensure clinical staff are appropriately trained and licensed
- Maintain clinical governance and quality assurance processes
- Obtain necessary regulatory approvals and accreditations
- Ensure compliance with healthcare regulations and standards
- Maintain professional indemnity insurance
- Conduct thorough UAT with clinical staff before go-live
- We are not healthcare providers or clinicians
- We provide technology to support clinical workflows, not clinical advice
- Clinical decision-making remains the responsibility of qualified healthcare professionals
- You must validate all clinical functionality with appropriate healthcare experts
- Patient safety and clinical outcomes are your responsibility
- Additional regulatory approval may be required (TGA, ACQSHC, etc)
Scope: Advisory services for technology strategy, digital transformation, change management, and ethics implementation.
- Deliverables: Strategy documents, roadmaps, change plans, ethics charters, training programmes
- Engagement Models: Retainer, project-based, or time-and-materials
- Workshops: Facilitation of stakeholder workshops and strategy sessions
- Research: Industry analysis, benchmarking, best practice research
- Recommendations: Based on information provided and our professional judgement
- Provide accurate and complete information
- Facilitate access to stakeholders and decision-makers
- Allocate internal resources to support the engagement
- Make timely decisions on recommendations
- Drive internal change management and implementation
- Execute on recommendations (we advise, you implement)
- We provide advice only - you make all business decisions
- Recommendations are based on information you provide and assumptions documented in reports
- We are not responsible for implementation or outcomes
- Success depends on your organisational commitment and execution
- External factors may affect implementation success
- Our recommendations do not constitute legal, financial, or regulatory advice
- You should seek specialist advice for legal, financial, tax, or compliance matters
-----------------------
- You have read and understood these Commercial Terms & Conditions
- You agree to be bound by these Terms in their entirety
- You have authority to enter into these Terms on behalf of your organisation (if applicable)
- You understand the limitations, responsibilities, and risks outlined in these Terms
- You have had the opportunity to seek independent legal advice regarding these Terms
- You understand that Services involve technology that may not be perfect and requires human oversight
- You understand your obligations regarding data security, backups, and compliance
- You understand our payment terms and consequences of non-payment
TRICORE TECH
----------------
Billing: hello@tricoretech.com.au
Privacy: hello@tricoretech.com.au
WEBSITE TERMS & CONDITIONS
1.4 Our Mission
- Learning about TRICORE TECH and our services
- Reading content, articles, and resources we publish
- Contacting us through provided contact forms or details
- Personal, non-commercial purposes
- Use the Website for any unlawful purpose or in violation of these Terms
- Copy, reproduce, distribute, or republish Website content without our written permission
- Modify, adapt, or create derivative works from Website content
- Remove, alter, or obscure any copyright notices, trademarks, or proprietary notices
- Use automated systems (bots, scrapers, crawlers) to access or extract content without permission
- Attempt to gain unauthorised access to the Website, servers, or networks
- Transmit viruses, malware, or other harmful code
- Interfere with or disrupt the Website or servers
- Frame or mirror the Website on another website without permission
- Misrepresent your identity or affiliation when using the Website
- Use the Website to collect information about other users
- Post or transmit any defamatory, offensive, or illegal content
- Monitor use of the Website for compliance with these Terms
- Remove or restrict access to any content that violates these Terms
- Block or restrict access for users who violate these Terms
- Report illegal activities to law enforcement authorities
- Take legal action to enforce these Terms
- Text, articles, blog posts, and written content
- Images, photographs, graphics, and illustrations
- Videos, animations, and multimedia content
- Software, code, and technical implementations
- Design, layout, and user interface
- Logos, trademarks, and branding elements
- Data compilations and databases
- View and read Website content on your device
- Print individual pages for personal reference
- Share links to Website pages on social media
- Republish Website content on other websites or publications
- Use Website content for commercial purposes
- Incorporate Website content into other works or products
- Extract substantial portions of Website content systematically
- You grant us a worldwide, perpetual, royalty-free, non-exclusive licence to use, reproduce, modify, adapt, publish, and display such content
- You warrant that you own or have rights to submit such content
- You agree that we may use your content without attribution or compensation
- We are not obligated to use or respond to your content
- We may remove any user content at our discretion
- Technical information: IP address, browser type, device type, operating system
- Usage information: Pages visited, time spent, links clicked, referral sources
- Contact information: Name, email, phone number, company (if you submit a contact form)
- Communication preferences: Marketing consent, newsletter subscriptions
- Provide and improve the Website functionality
- Respond to your enquiries and requests
- Send you information about our services (with your consent)
- Analyse Website usage and improve user experience
- Protect against fraud and security threats
- Comply with legal obligations
- Essential Cookies: Required for Website functionality (authentication, security, load balancing)
- Analytical Cookies: Help us understand how visitors use the Website (Google Analytics or similar)
- Marketing Cookies: Enable personalised advertising and measure campaign effectiveness (with your consent)
- We may use third-party services that collect information about your Website usage:
- Google Analytics: Website traffic analysis (anonymised data)
- LinkedIn Insights: B2B visitor insights and advertising
- Microsoft Clarity: Session recordings and heat-maps (anonymised)
- HubSpot or similar: Marketing automation and CRM
- Accuracy: We do not warrant that Website content is accurate, complete, current, or error-free
- Availability: We do not warrant that the Website will be available, uninterrupted, or free from errors
- Security: We do not warrant that the Website is free from viruses, malware, or other harmful components
- Fitness for Purpose: We do not warrant that the Website meets your specific requirements
- Third-Party Links: We do not warrant the accuracy or reliability of linked websites
- Professional advice (legal, financial, technical, or otherwise)
- Recommendations or endorsements
- Contractual offers or binding commitments
- Guarantees of service quality or outcomes
- Service descriptions are summaries only
- Detailed service terms are in separate Commercial Terms & Conditions
- Features, pricing, and availability may change without notice
- Specific project outcomes are subject to Statement of Work agreements
- Keep Website content accurate and up-to-date
- Maintain Website availability and performance
- Protect against security threats and vulnerabilities
- Respond promptly to reported issues or errors
- Your use of or inability to use the Website
- Reliance on Website content or information
- Errors, omissions, or inaccuracies in Website content
- Viruses or malware transmitted through the Website
- Unauthorised access to or alteration of your transmissions or data
- Third-party statements or conduct on the Website
- Website downtime, interruptions, or performance issues
- Indirect, consequential, incidental, or punitive damages
- Loss of profits, revenue, business, or opportunities
- Loss of data or information
- Loss of goodwill or reputation
- Business interruption
- Any damages arising from third-party claims
- Availability or accuracy of third-party websites
- Content, products, or services offered by third parties
- Privacy practices of third-party websites
- Any damage or loss caused by third-party websites
- Decisions you make based on Website content
- Actions you take or fail to take after visiting the Website
- Consequences of implementing information found on the Website
- Misunderstandings or misinterpretations of Website content
- Internet service provider failures
- Network congestion or connectivity issues
- Power outages or infrastructure failures
- Cyberattacks affecting third-party services
- Browser or device compatibility issues
- Liability for personal injury or death caused by our negligence
- Liability for misleading or deceptive conduct
- Liability for breach of consumer guarantees that cannot be excluded
- Content, accuracy, or legality of third-party websites
- Privacy practices or data collection by third-party websites
- Products, services, or offerings on third-party websites
- Availability or performance of third-party websites
- You may link to our Website, provided that:
- Links direct to our homepage or specific pages (not embedded content)
- Links do not misrepresent our services or relationship with you
- Links do not imply endorsement or affiliation without permission
- The linking website does not contain illegal, offensive, or inappropriate content
- Links do not frame or mirror our Website content
- Violate any Australian federal or state laws
- Infringe intellectual property or other proprietary rights
- Transmit any unlawful, threatening, defamatory, obscene, or offensive content
- Impersonate any person or entity
- Engage in fraudulent or deceptive conduct
- Interfere with other users' use of the Website
- Attempt to hack, compromise, or reverse engineer the Website
- Use the Website to distribute spam, malware, or phishing attempts
- Harvest or collect information about Website users
- Use the Website to compete with TRICORE TECH
- Immediate termination of your access to the Website
- Removal of any content you submitted
- Reporting to law enforcement authorities
- Legal action to enforce these Terms or recover damages
- Liability for all costs and expenses (including legal fees)
- Your use or misuse of the Website
- Your violation of these Website Terms
- Your violation of any laws or regulations
- Your violation of any third-party rights (including intellectual property, privacy, or confidentiality rights)
- Content you submit to the Website
- Your conduct in connection with the Website
- Encryption of data in transit (HTTPS/TLS)
- Regular security assessments and updates
- Access controls and authentication
- Monitoring for suspicious activity
- Incident response procedures
- Unauthorised access to or interception of data in transit
- Security breaches beyond our reasonable control
- Vulnerabilities in third-party systems or software
- User actions that compromise security (weak passwords, sharing credentials)
- Maintaining confidentiality of your login credentials
- Using strong, unique passwords
- Notifying us immediately of any unauthorised access
- Preventing unauthorised use of your account
- Logging out after each session on shared devices
- Violation of these Website Terms
- Suspected fraudulent or illegal activity
- Prolonged inactivity
- Technical or security concerns
- Business reasons
- Your right to access and use the Website immediately ceases
- We may delete any content you submitted
- Provisions that by their nature should survive (disclaimers, limitations of liability, indemnification, governing law) continue in effect
- Semantic HTML markup
- Descriptive alt text for images
- Keyboard navigation support
- Sufficient colour contrast
- Resizable text
- Clear headings and structure
- Your rights under Australian Consumer Law
- Any other statutory rights that cannot lawfully be excluded
- Our liability for misleading or deceptive conduct
- Our liability for personal injury or death caused by our negligence
- Supplying the services again; or
- Paying the cost of having services supplied again
- Posting a prominent notice on the Website homepage
- Updating the "Last Updated" date at the top of this page
- Sending an email to registered users (if applicable)
- Contact us directly: Email hello@tricoretech.com.au with details of your concern
- We will acknowledge: Within 2 business days
- We will investigate: Thoroughly and impartially
- We will respond: Within 10 business days with our findings and proposed resolution
- Escalation: If unsatisfied, request escalation to our Director
- Office of the Australian Information Commissioner (OAIC): For privacy complaints (www.oaic.gov.au)
- Australian Competition and Consumer Commission (ACCC): For consumer protection matters (www.accc.gov.au)
- You have read and understood these Website Terms
- You agree to be bound by these Website Terms
- You have reviewed our Privacy Policy and Cookie Policy
- You understand the limitations on Website use and content
- You understand our disclaimers and limitations of liability
PRIVACY POLICY
1. INTRODUCTION
1.1 Our Commitment to Privacy
At TRICORE TECH ("TRICORE TECH", "we", "us", "our"), we are committed to protecting your privacy and handling your personal information responsibly and transparently.
This Privacy Policy explains how we collect, use, store, disclose, and protect your personal information in accordance with the Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs).
1.2 Our Mission and Privacy
Beyond Digital. Genuinely Human. - Our mission extends to privacy. We believe in:
- Transparency about data collection and use
- Respecting individual privacy rights and dignity
- Maintaining Australian data sovereignty
- Using data ethically and responsibly
- Empowering you with control over your information
1.3 Who We Are
TRICORE TECH is an Australian technology company based in Perth, Western Australia. We provide:
- OCR and AI-powered document intelligence solutions
- Redaction and privacy protection services
- AI model training and integration services
- Custom ERP and hospital management systems
- Technology strategy and change management consulting
- Ethics charter development and implementation
1.4 Scope of This Policy
This Privacy Policy applies to:
- Personal information collected through our website (www.tricoretech.com.au)
- Personal information collected when you engage our services
- Personal information collected through communications with us
- Personal information of our clients, prospects, suppliers, and business contacts
1.5 Additional Policies
This Privacy Policy should be read in conjunction with:
- Our Website Terms & Conditions
- Our Cookie Policy
- Our Commercial Terms & Conditions (for service clients)
- Service-specific privacy notices (where applicable)
2. WHAT IS PERSONAL INFORMATION?
2.1 Definition
"Personal information" means information or an opinion about an identified individual, or an individual who is reasonably identifiable, whether the information or opinion is true or not, and whether the information or opinion is recorded in a material form or not.
2.2 Examples of Personal Information We May Collect
Contact Information:
- Name, title, and position
- Business name and ABN/ACN
- Email address
- Phone and mobile numbers
- Business and postal addresses
Professional Information:
- Job title and role
- Company and industry
- Professional interests and expertise
- Business requirements and preferences
Technical Information:
- IP address
- Device type and operating system
- Browser type and version
- Referring website/source
- Pages visited and time spent
- Click behaviour and interaction patterns
Transactional Information:
- Payment details (processed by secure third parties)
- Invoicing and billing information
- Purchase history and service usage
- Credit information (for credit assessments)
Client Data (for Services):
- Documents and files you provide for processing
- Data extracted from your documents
- Business processes and workflows
- System access credentials (encrypted)
Communications:
- Emails, phone calls, and messages with us
- Feedback, testimonials, and survey responses
- Support tickets and help desk interactions
- Marketing preferences and consent records
2.3 Sensitive Information
We generally do not collect sensitive information as defined in the Privacy Act, including:
- Health information
- Racial or ethnic origin
- Political opinions or associations
- Religious beliefs or affiliations
- Sexual orientation or practices
- Criminal records
- Biometric information
Exception: If you engage our healthcare services (Custom Hospital Management), we may process sensitive health information on your behalf. In such cases:
- We act as a service provider, not a collector
- You remain responsible for obtaining patient consents
- Additional security and privacy measures apply
- Specific healthcare privacy agreements govern the arrangement
3. HOW WE COLLECT PERSONAL INFORMATION
3.1 Direct Collection
We collect personal information directly from you when you:
Use Our Website:
- Browse pages and read content
- Complete contact forms or enquiry forms
- Subscribe to newsletters or updates
- Download resources or whitepapers
- Interact with chatbots or live chat
Engage Our Services:
- Request a quote or proposal
- Sign a Statement of Work
- Provide documents for processing (OCR, AI services)
- Grant access to your systems (for integration services)
- Participate in training or workshops
Communicate With Us:
- Send emails or messages
- Call our office
- Attend meetings (virtual or in-person)
- Connect via social media
Provide Feedback:
- Complete surveys or questionnaires
- Provide testimonials or case study information
- Submit complaints or feedback
3.2 Automatic Collection
We automatically collect certain information when you visit our website through:
Cookies and Tracking Technologies:
- Essential cookies for website functionality
- Analytical cookies to understand usage patterns
- Marketing cookies for personalised advertising (with consent)
For detailed information, see our Cookie Policy (please refer to the table of content).
Server Logs:
- IP addresses
- Browser and device information
- Date, time, and pages accessed
- Referral sources
Analytics Services:
- Google Analytics (anonymised data)
- LinkedIn Insights
- Microsoft Clarity (session recordings and heatmaps)
- Other analytics tools we may use
3.3 Third-Party Sources
We may collect personal information from third parties, including:
Publicly Available Sources:
- LinkedIn profiles and company websites
- Business directories and registries
- Industry publications and news
- ASIC company records
Business Partners and Referrers:
- Referral partners who introduce clients
- Joint venture partners
- Technology partners (e.g., Odoo partners)
Service Providers:
- Credit reporting agencies (for credit assessments)
- Background check providers (for employment screening)
- Data enrichment services (to verify business information)
Your Organisation:
- Your employer or organisation (if you're a designated contact)
- Other employees or colleagues who provide your details
3.4 Document Processing Services
When you engage our OCR, AI, or data processing services:
- You upload documents containing information (which may include personal information)
- We process these documents to extract and structure data
- The responsibility for lawful collection and processing remains with you
- You must have appropriate legal basis and consents before providing documents to us
4. WHY WE COLLECT PERSONAL INFORMATION
4.1 Primary Purposes
We collect and use personal information for the following purposes:
Service Delivery:
- Providing OCR, AI, ERP, consulting, and other services as contracted
- Communicating with you about services and projects
- Managing accounts and service agreements
- Delivering Deliverables and reports
- Providing technical support and maintenance
- Training and capacity building
- Processing payments and invoicing
Business Operations:
- Responding to enquiries and requests for information
- Preparing quotes and proposals
- Managing client relationships and communications
- Improving our services and developing new offerings
- Conducting research and analysis
- Managing supplier and partner relationships
Legal and Compliance:
- Complying with legal obligations and regulations
- Enforcing our terms and conditions
- Protecting our legal rights and interests
- Resolving disputes and complaints
- Conducting audits and assessments
- Meeting regulatory reporting requirements
Security and Fraud Prevention:
- Protecting against fraud, unauthorised access, and security threats
- Monitoring for suspicious activity
- Investigating security incidents
- Maintaining system integrity and availability
4.2 Marketing and Communications (With Consent)
With your consent, we may use personal information to:
- Send newsletters, updates, and industry insights
- Inform you about new services and features
- Invite you to events, webinars, and workshops
- Conduct market research and surveys
- Provide personalised content and recommendations
- Display targeted advertising on third-party platforms
You can opt-out at any time by:
- Clicking "unsubscribe" links in emails
- Contacting our Privacy Officer
- Updating your preferences through our website
- Email hello@tricoretech.com.au
4.3 Analytics and Improvement
We use personal information to:
- Analyse website usage and user behaviour
- Understand how services are used and valued
- Identify areas for improvement
- Develop new services and features
- Optimise user experience and functionality
- Conduct A/B testing and experiments
4.4 Credit Assessment (Business Clients)
For clients requesting credit terms, we may use personal information to:
- Assess creditworthiness and financial capacity
- Obtain commercial credit reports
- Conduct credit checks with credit reporting agencies
- Monitor payment behaviour and credit history
- Make decisions about credit limits and terms
See section 8 for detailed information about credit reporting.
4.5 Employment and Recruitment
For employment applicants and employees, we collect and use personal information to:
- Assess suitability for positions
- Conduct background checks and reference checks
- Manage employment relationships
- Administer payroll and benefits
- Provide training and development
- Meet workplace health and safety obligations
- Comply with employment laws
5. HOW WE USE AND DISCLOSE PERSONAL INFORMATION
5.1 Use Principles
We will only use personal information for:
- The purposes for which it was collected
- Related secondary purposes you would reasonably expect
- Purposes to which you have consented
- Purposes required or authorised by law
5.2 Disclosure to Third Parties
We may disclose personal information to the following types of third parties:
Service Providers and Contractors:
- IT service providers and hosting companies (Australian-based where possible)
- Payment processors and financial institutions
- Cloud infrastructure providers (Azure, AWS with Australian regions)
- Email service providers
- Analytics and marketing platforms
- Professional advisers (lawyers, accountants, consultants)
- Subcontractors assisting with service delivery
All service providers are required to:
- Handle personal information securely and confidentially
- Use information only for specified purposes
- Comply with Australian Privacy Principles
- Not disclose information to other parties without authorisation
Business Partners:
- Odoo partners (K3 Team and others) for ERP implementations
- Technology partners for integrated solutions
- Referral partners (with your consent)
- Joint venture or collaboration partners
Professional Advisers:
- Legal counsel for legal advice and representation
- Accountants and auditors for financial services
- Insurance providers for coverage and claims
- Business consultants for strategic advice
Regulatory and Legal:
- Government agencies and regulators (where required by law)
- Law enforcement (in response to lawful requests)
- Courts and tribunals (in legal proceedings)
- ASIC, ATO, Fair Work, and other statutory bodies
Credit Reporting Agencies:
- Equifax, Experian, illion (for credit assessments)
- Other credit providers (with your authorisation)
- Debt collection agencies (if accounts are overdue)
Corporate Transactions:
- Potential buyers or investors (if we sell or restructure the business)
- Advisers assisting with mergers, acquisitions, or restructuring
- Related companies within the TRICORE TECH group
Your Organisation:
- Other employees or authorised representatives within your organisation
- Your designated project team members
- Your IT administrators (for system integrations)
5.3 Disclosure With Your Consent
We may disclose personal information to other parties with your express consent, including:
- Testimonials and case studies (with your approval)
- Client references for prospective clients
- Marketing partners for co-branded initiatives
- Event organisers for conference attendance
5.4 De-identified and Aggregated Data
We may de-identify and aggregate personal information to create anonymised datasets for:
- Industry research and benchmarking
- Service improvement and development
- Statistical analysis and reporting
- Machine learning model training
- Marketing and promotional materials
De-identified data cannot reasonably be used to identify individuals and is not subject to the Privacy Act.
5.5 Overseas Disclosure
Our Australian Data Residency Commitment: We prioritise Australian data sovereignty and store personal information within Australia wherever possible.
However, some overseas disclosure may occur in limited circumstances:
Third-Party Services with International Operations:
- Google Analytics (USA - but IP anonymisation enabled)
- LinkedIn (USA - for advertising and analytics)
- Microsoft Azure (Australian regions used, but Microsoft is a USA company)
- GitHub (USA - for code repositories)
- Email service providers (if international provider used)
Exceptional Circumstances:
- Where you consent to overseas transfer
- Where necessary for service delivery (e.g., international consulting projects)
- Where required or authorised by law
When disclosing personal information overseas:
- We use contractual arrangements to ensure APP-equivalent protections
- We use Australian data centres and regions where available
- We implement encryption and security measures
- We remain accountable for overseas handling of your information
Countries Where Information May Be Disclosed:
- United States (for certain cloud services and platforms)
- European Union (if explicitly agreed for EU clients)
- Other jurisdictions as specifically agreed in service agreements
6. HOW WE STORE AND SECURE PERSONAL INFORMATION
6.1 Australian Data Residency
We maintain Australian data residency as a core commitment:
- Primary data storage on servers physically located in Australia
- Use of Australian data centre regions (Azure Australia East/Southeast, AWS Sydney)
- Processing of sensitive data within Australian territorial boundaries
- Backup and disaster recovery systems in Australian locations
6.2 Security Measures
We implement comprehensive technical and organisational security measures, including:
Technical Security:
- Encryption of data in transit (TLS 1.2 or higher)
- Encryption of data at rest (AES-256)
- Multi-factor authentication (MFA) for system access
- Secure development practices and code review
- Regular security assessments and penetration testing
- Intrusion detection and prevention systems
- Vulnerability scanning and patch management
- Secure API authentication and authorisation
- Database encryption and access controls
Organisational Security:
- Role-based access controls (principle of least privilege)
- Employee confidentiality and non-disclosure agreements
- Security awareness training for all staff
- Background checks for employees with data access
- Incident response and breach notification procedures
- Business continuity and disaster recovery planning
- Third-party security assessments
- ISO 27001 principles (progressing towards certification)
Physical Security:
- Use of certified data centres (Tier III or higher)
- 24/7 physical security and monitoring
- Environmental controls (power, cooling, fire suppression)
- Controlled access to server rooms and facilities
Data Minimisation and Retention:
- Collection of only necessary information
- Regular review and deletion of unnecessary data
- Retention in accordance with legal requirements
- Secure disposal when no longer needed
6.3 Storage Locations and Infrastructure
Primary Storage:
- Azure Australia East and Australia Southeast regions
- AWS Sydney region
- Australian-owned data centres (where feasible)
Backup Storage:
- Encrypted backups in separate Australian locations
- 3-2-1 backup strategy (3 copies, 2 different media, 1 off-site)
- Regular testing of backup restoration procedures
Email and Communications:
- Australian-based email hosting (where possible)
- Encrypted email for sensitive communications
- Secure messaging platforms
6.4 How Long We Keep Personal Information
General Retention Periods:
- Client information: 7 years after service completion (for legal and warranty purposes)
- Prospect information: 3 years from last contact (unless opted out earlier)
- Supplier information: 7 years after last transaction
- Employee records: 7 years after employment ends
- Financial records: 7 years (ATO requirement)
- Website analytics: 26 months (Google Analytics default)
- Support tickets: 2 years after resolution
Longer Retention for:
- Legal holds and litigation
- Regulatory investigations
- Ongoing disputes or claims
- Contractual obligations requiring longer retention
Shorter Retention for:
- Marketing lists (delete promptly when you opt-out)
- Session cookies (expire after browser session)
- Temporary files (delete after processing)
Secure Disposal: When we delete personal information, we:
- Overwrite and securely erase digital files
- Shred physical documents
- Destroy backup copies
- Confirm deletion with third-party service providers
- Maintain deletion logs for audit purposes
6.5 Data Breach Response
In the event of a data breach:
Immediate Response (Within 24 hours):
- Contain the breach and prevent further unauthorised access
- Assess scope and impact of the breach
- Notify senior management and engage incident response team
Assessment and Notification (Within 72 hours):
- Determine if breach is likely to result in serious harm
- Notify affected individuals if serious harm is likely
- Notify the Office of the Australian Information Commissioner (OAIC)
- Provide recommendations to mitigate harm
Remediation and Prevention:
- Implement corrective measures to prevent recurrence
- Conduct post-incident review and lessons learned
- Update security measures and procedures
- Provide support to affected individuals
Our Commitment: We take data breaches seriously and will be transparent, timely, and supportive if a breach occurs.
7. YOUR PRIVACY RIGHTS
Under the Australian Privacy Principles, you have the following rights regarding your personal information:
7.1 Right to Access
You have the right to request access to the personal information we hold about you.
How to Request Access:
- Submit a written request to our Privacy Officer (see contact details in section 14)
- Specify what information you're seeking
- Provide proof of identity (to protect against unauthorised access)
Our Response:
- We will respond within 30 days
- We will provide the information in a reasonable format (typically PDF or CSV)
- Access is generally free, but we may charge a reasonable fee for extensive requests
Grounds for Denial (Limited): We may deny or restrict access if:
- Providing access would be unlawful
- Denying access is required or authorised by law
- Access would prejudice legal proceedings or law enforcement
- Access would reveal confidential commercial information
- Access would be unreasonable impact on others' privacy
- The request is frivolous or vexatious
If we deny access, we will provide written reasons and inform you of complaint mechanisms.
7.2 Right to Correction
You have the right to request correction of personal information that is inaccurate, out-of-date, incomplete, irrelevant, or misleading.
How to Request Correction:
- Contact our Privacy Officer with correction details
- Provide evidence supporting the correction (if available)
Our Response:
- We will respond within 30 days
- If we agree, we will correct the information and notify relevant third parties
- If we disagree, you can request that we associate a statement with your information indicating you dispute its accuracy
Proactive Correction: We also take reasonable steps to correct personal information proactively when we become aware of inaccuracies.
7.3 Right to Erasure/Deletion
While not explicitly required by the Privacy Act, we respect your right to request deletion of your personal information in certain circumstances.
When We Will Delete:
- Information no longer needed for legal or business purposes
- You withdraw consent and we have no other legal basis
- You object to processing and we have no overriding legitimate interest
- Information was unlawfully collected or processed
When We Cannot Delete:
- Legal retention requirements apply (e.g., tax records for 7 years)
- Information is necessary for legal claims or defence
- Information is necessary for contract performance
- Deletion would prejudice ongoing investigation or proceeding
7.4 Right to Opt-Out of Marketing
You have the right to opt-out of receiving marketing communications at any time.
How to Opt-Out:
- Click "unsubscribe" links in marketing emails
- Email hello@tricoretech.com.au with your opt-out request
- Call us and request removal from marketing lists
- Update preferences through our website (if you have an account)
What Happens When You Opt-Out:
- We will stop sending marketing communications within 5 business days
- We will retain your contact details to honour your opt-out request
- You will still receive transactional communications (invoices, service updates, security alerts)
7.5 Right to Complain
If you believe we have breached the Privacy Act or APPs, you have the right to complain.
Internal Complaint Process:
- Submit a complaint to our Privacy Officer (see section 14)
- We will acknowledge your complaint within 2 business days
- We will investigate thoroughly and impartially
- We will respond within 30 days with our findings and proposed resolution
- Escalation: If unsatisfied, request escalation to our Director
External Complaints: If we cannot resolve your complaint to your satisfaction, you may complain to:
Office of the Australian Information Commissioner (OAIC)
- Website: www.oaic.gov.au
- Phone: 1300 363 992
- Email: enquiries@oaic.gov.au
- Mail: GPO Box 5218, Sydney NSW 2001
The OAIC can investigate complaints and make determinations about privacy breaches.
7.6 Right to Data Portability
Upon request, we will provide your personal information in a commonly used, machine-readable format (such as CSV, JSON, or PDF) to facilitate transfer to another service provider.
8. CREDIT REPORTING
8.1 When Credit Reporting Applies
If you apply for commercial credit terms with TRICORE TECH, we may collect and disclose credit information to credit reporting agencies.
8.2 Credit Reporting Legislation
Credit reporting is governed by:
- Part IIIA of the Privacy Act 1988 (Cth)
- Privacy (Credit Reporting) Code 2014
- Australian Privacy Principles (where applicable)
8.3 Credit Information We May Collect
Identification Information:
- Name, date of birth, address, employer
- ABN/ACN for businesses
- Driver's licence or other identity documents
Credit Application Information:
- Amount of credit applied for
- Type of credit or credit facility
- Purpose of credit application
Credit Eligibility Information:
- Consumer credit reports from credit reporting agencies
- Credit scores and risk assessments
- Payment history and credit behaviour
- Court judgments and bankruptcies
- Credit defaults and serious credit infringements
Credit Liability Information:
- Credit limits on your account
- Repayment terms and history
- Outstanding balances
8.4 Credit Reporting Agencies We Use
We may disclose credit information to and obtain credit reports from:
- Equifax: www.equifax.com.au | 13 8332
- Experian: www.experian.com.au | 1300 783 684
- illion (formerly Dun & Bradstreet): www.illion.com.au | 13 23 33
Each agency has its own privacy policy available on their website.
8.5 What We May Disclose to Credit Reporting Agencies
At Application:
- Your identity information
- Credit application details
- Credit limit requested
During Credit Period:
- Repayment information (whether you are meeting payment obligations)
- Information about serious credit infringements (fraud, intent to avoid payment)
Payment Default Information:
We may report payment defaults if:
- Payment is at least 60 days overdue
- Amount is at least $150
- We have sent you written notice of intent to report
- You have not disputed the debt or made arrangements
Other Information:
- When we provide, vary, or terminate credit
- Cessation of credit due to non-payment
- Dishonoured payment methods (cheques, direct debits)
8.6 Why We Disclose to Credit Reporting Agencies
We disclose credit information to:
- Assess your creditworthiness for new credit applications
- Manage existing credit arrangements
- Collect overdue payments
- Participate in the credit reporting system
- Meet legal obligations
8.7 Who May Access Your Credit Information
Credit reporting agencies may disclose your credit information to:
- TRICORE TECH and other credit providers (to assess credit applications)
- Debt collection agencies (to assist with collection of overdue payments)
- Your guarantors (if you have provided a guarantee)
- Persons you have authorised to receive the information
- TRICORE TECH's insurers or advisers (for relevant purposes)
- Government agencies and regulators (where required by law)
8.8 Your Credit Reporting Rights
Access Credit Reports:
- You can request a free copy of your credit report from each credit reporting agency once every 12 months
- You can request additional copies (fee may apply)
Correct Credit Information:
- If information is inaccurate, you can request correction
- Agencies must investigate and respond within 30 days
Place a Ban on Information:
- If you are a victim of fraud, you can request a ban on disclosures
Restrict Direct Marketing:
- You can opt-out of pre-screening for direct marketing
Make a Complaint:
- Complain to the credit reporting agency directly
- Complain to the OAIC if unresolved
8.9 Credit Information Retention
Credit information is generally retained for:
- Credit applications: 5 years from application date
- Repayment history: 2 years from date entered
- Payment defaults: 5 years from default date (or until paid, if sooner)
- Serious credit infringements: 7 years from report date
- Court judgments: 5 years from judgment date
- Bankruptcy: Permanently (on public record)
9. EMPLOYMENT AND RECRUITMENT PRIVACY
9.1 Job Applicants
When you apply for a position at TRICORE TECH, we collect:
- Resume/CV and cover letter
- Contact information
- Employment history and references
- Qualifications and certifications
- Right to work in Australia
- Responses to application questions
How We Use This Information:
- Assessing suitability for the position
- Conducting interviews and evaluations
- Checking references and qualifications
- Making employment offers
- Onboarding successful applicants
Retention:
- Successful applicants: Information transferred to employee file
- Unsuccessful applicants: Information retained for 12 months (in case of future opportunities), then securely destroyed
9.2 Employees
For employees, we collect and use additional personal information including:
- Tax file number and superannuation details
- Bank account information (for payroll)
- Emergency contact information
- Performance reviews and disciplinary records
- Training and development records
- Leave and attendance records
- Workplace health and safety information
- Salary and benefits information
How We Use This Information:
- Administering employment relationship
- Processing payroll and benefits
- Complying with employment laws
- Providing workplace health and safety
- Performance management and development
- Managing leave and attendance
Employee Monitoring: We may monitor employee:
- Email and internet usage on company systems
- Access to company systems and data
- Attendance and work hours
- Performance and productivity
Monitoring is conducted in accordance with workplace surveillance laws and employee policies.
9.3 Background Checks
With your consent, we may conduct:
- National police checks
- Reference checks with previous employers
- Qualification and licence verification
- Credit checks (for positions with financial responsibility)
- Working with Children checks (if applicable)
10. COOKIES AND TRACKING TECHNOLOGIES
10.1 What Are Cookies?
Cookies are small text files stored on your device when you visit our website. They help us provide a better user experience and understand how the website is used.
10.2 Types of Cookies We Use
Essential Cookies (Always Active):
- Session management and authentication
- Security and fraud prevention
- Load balancing and performance
- Form completion and error messages
- Accessibility preferences
You cannot opt-out of essential cookies as they are necessary for website functionality.
Analytical Cookies (With Consent):
- Google Analytics (anonymised IP addresses)
- Microsoft Clarity (session recordings and heatmaps)
- Website usage statistics and metrics
- User behaviour analysis
- Performance monitoring
Marketing Cookies (With Consent):
- LinkedIn Insight Tag
- Google Ads conversion tracking
- Retargeting and remarketing
- Personalised advertising
- Campaign performance measurement
10.3 Third-Party Cookies
Some cookies are set by third-party services we use:
- Google (Analytics, Ads, Tag Manager)
- LinkedIn (Insight Tag, advertising)
- Microsoft (Clarity, Bing Ads)
- Other marketing and analytics platforms
Third-party cookies are subject to the third party's privacy policy.
10.4 How to Control Cookies
Browser Settings:
- Most browsers allow you to refuse or delete cookies
- Settings typically found under "Privacy" or "Security"
- Note: Disabling cookies may affect website functionality
Cookie Consent Manager:
- When you first visit our website, you'll see a cookie consent banner
- You can accept or reject non-essential cookies
- You can change your preferences at any time (link in website footer)
Opt-Out Tools:
- Google Analytics: https://tools.google.com/dlpage/gaoptout
- Network Advertising Initiative: www.networkadvertising.org/choices
- Digital Advertising Alliance: www.aboutads.info/choices
10.5 Do Not Track (DNT)
Some browsers support "Do Not Track" signals. However, there is no universal standard for DNT implementation. Our website does not currently respond to DNT signals, but you can use cookie settings to manage tracking.
10.6 Detailed Cookie Information
For a comprehensive list of cookies we use, their purposes, and retention periods, please see our separate Cookie Policy (please refer to the table of content).
11. CHILDREN'S PRIVACY
11.1 Age Restrictions
Our website and services are not directed at children under 18 years of age. We do not knowingly collect personal information from children.
11.2 Parental Notification
If you are a parent or guardian and believe your child has provided personal information to us, please contact our Privacy Officer immediately (please refer to the table of content). We will promptly delete such information from our systems.
11.3 Healthcare Services Exception
Our Custom Hospital Management systems may process health information of minors as part of healthcare service delivery. In such cases:
- The healthcare provider (our client) is responsible for obtaining appropriate parental consent
- We process information as a service provider only, following healthcare provider's instructions
- Specific paediatric privacy protocols apply as per healthcare regulations
12. CHANGES TO THIS PRIVACY POLICY
12.1 Updates and Revisions
We may update this Privacy Policy from time to time to reflect:
- Changes in laws or regulations
- Changes in our business practices
- New services or features
- Feedback from clients and stakeholders
- Evolving privacy best practices
12.2 Notification of Changes
When we make material changes to this Privacy Policy:
- We will update the "Last Updated" date at the top
- We will post a prominent notice on our website homepage
- We may send an email to registered users or clients
- For significant changes, we may seek fresh consent
12.3 Review Responsibility
We encourage you to review this Privacy Policy periodically to stay informed about how we protect your privacy.
12.4 Previous Versions
We maintain archives of previous versions of this Privacy Policy. If you would like to review a previous version, please contact our Privacy Officer.
13. INTERNATIONAL TRANSFERS AND GLOBAL PRIVACY
13.1 Our Australian Focus
As an Australian company committed to Australian data residency, we prioritise keeping your information within Australia.
13.2 Limited International Transfers
In limited circumstances, personal information may be transferred internationally:
USA:
- Google services (Analytics, Workspace, Cloud)
- Microsoft services (Azure, Clarity)
- GitHub (code repositories)
- LinkedIn (advertising and analytics)
- Other SaaS providers with USA parent companies
European Union:
- If we engage European clients or partners
- Some SaaS providers with EU data centres
Other Jurisdictions:
- Only as specifically agreed in service contracts
- Only with appropriate safeguards
13.3 Safeguards for International Transfers
When transferring information internationally:
- We use Standard Contractual Clauses (SCCs)
- We require APP-equivalent privacy protections
- We use encryption in transit and at rest
- We conduct due diligence on recipient security
- We remain accountable for overseas handling
13.4 GDPR Compliance (For EU Clients)
If we process information of EU residents:
- We comply with General Data Protection Regulation (GDPR) requirements
- EU residents have additional rights (right to erasure, data portability, etc.)
- Data Protection Officer contact: hello@trichoretech.com.au
14. CONTACT US - PRIVACY OFFICER
14.1 General Enquiries
For general questions about this Privacy Policy or our privacy practices:
- Email: hello@trichoretech.com.au
- Online: www.tricoretech.com.au/contact
14.2 Making a Privacy Complaint
Step 1: Submit Your Complaint
- Provide details of your privacy concern
- Include your contact information
- Attach any relevant documentation
- Send to: hello@trichoretech.com.au
Step 2: Acknowledgement
- We will acknowledge your complaint within 2 business days
- We will provide a reference number
Step 3: Investigation
- We will investigate thoroughly and impartially
- We may contact you for additional information
- We will review relevant systems, policies, and procedures
Step 4: Response
- We will respond within 30 days with our findings
- We will explain our decision and any corrective actions
- We will provide options for escalation if you're unsatisfied
Step 5: Escalation (If Needed)
- Request escalation to our Director
- Complaint to OAIC (see section 7.5)
14.3 Response Times
- General enquiries: 2-3 business days
- Access requests: Within 30 days
- Correction requests: Within 30 days
- Complaints: Acknowledgement within 2 days, response within 30 days
- Data breaches: Notification within 72 hours (if serious harm likely)
14.4 Office Hours
- Monday to Friday: 9:00 AM - 5:00 PM AWST
- Closed: Weekends and WA public holidays
- Emergency: For urgent privacy matters outside business hours, email hello@trichoretech.com.au with "URGENT" in subject line
15. OFFICE OF THE AUSTRALIAN INFORMATION COMMISSIONER (OAIC)
If you are not satisfied with how we have handled your privacy complaint, you can contact the OAIC:
Office of the Australian Information Commissioner
Website: www.oaic.gov.au
Phone: 1300 363 992 (Monday to Friday, 9:00 AM - 5:00 PM AEST)
Email: enquiries@oaic.gov.au
Mail: GPO Box 5218, Sydney NSW 2001
Online Complaint Form: www.oaic.gov.au/privacy/privacy-complaints
The OAIC can:
- Investigate privacy complaints
- Attempt to conciliate between parties
- Make determinations about privacy breaches
- Award compensation (in limited circumstances)
- Issue enforceable undertakings
- Apply to court for civil penalties
16. DEFINITIONS AND INTERPRETATION
16.1 Key Definitions
"APPs" means the Australian Privacy Principles contained in Schedule 1 of the Privacy Act.
"Australian Privacy Principles" means the 13 principles that govern how organisations handle personal information.
"Credit information" means information about creditworthiness, credit standing, credit history, or credit capacity.
"Credit reporting agency" means an organisation that collects, holds, uses, and discloses credit information for the purpose of providing credit reporting services.
"De-identified information" means information from which personal identifiers have been removed so that individuals are no longer reasonably identifiable.
"Personal information" means information or an opinion about an identified individual, or an individual who is reasonably identifiable, whether the information or opinion is true or not, and whether recorded in a material form or not.
"Privacy Act" means the Privacy Act 1988 (Cth) as amended from time to time.
"Sensitive information" means personal information about an individual's racial or ethnic origin, political opinions, political association, religious beliefs or affiliations, philosophical beliefs, professional or trade association membership, trade union membership, sexual orientation or practices, criminal record, health information, genetic information, biometric information, or biometric templates.
16.2 Interpretation
- References to "we", "us", "our" mean TRICORE TECH P LTD
- References to "you", "your" mean the individual whose personal information is being handled
- Headings are for convenience only
- References to legislation include amendments and replacements
--------------------------
ACKNOWLEDGEMENT
By providing personal information to TRICORE TECH or using our website and services, you acknowledge that:
- You have read and understood this Privacy Policy
- You consent to the collection, use, and disclosure of your personal information as described
- You understand your privacy rights under Australian law
- You understand how to contact us about privacy matters
- You understand how to access and correct your personal information
- You understand how to make a privacy complaint
This Privacy Policy was last updated on 25 November 2025.
TRICORE TECH
Beyond Digital. Genuinely Human.
ABN: 77 249 933 517
COOKIE POLICY
1. ABOUT THIS POLICY
This Cookie Policy explains how TRICORE TECH ("we", "us", "our") uses cookies and similar technologies on our website.
This policy should be read together with our Privacy Policy (please refer to the table of content)
2. WHAT ARE COOKIES
Cookies are small text files stored on your device when you visit a website. They help websites recognise your device and remember information about your visit.
Types of Cookies:
- Session cookies - Deleted when you close your browser
- Persistent cookies - Remain until they expire or you delete them
- First-party cookies - Set by us
- Third-party cookies - Set by external services we use
3. WHY WE USE COOKIES
We use cookies for:
- Essential website functionality and security
- Analysing how visitors use our website
- Improving website performance
- Marketing and advertising our services
- Remembering your preferences
4. TYPES OF COOKIES WE USE
4.1 Strictly Necessary Cookies (Always Active)
These cookies are essential for the website to function and cannot be disabled.
Purpose:
- Maintain your browsing session
- Remember your cookie consent preferences
- Security and fraud prevention
- Load balancing
You cannot opt out of these cookies as they are necessary for the website to work.
4.2 Performance Cookies (Require Your Consent)
These cookies help us understand how visitors use our website.
Purpose:
- Analyse website traffic and usage patterns
- Measure page performance
- Identify and fix errors
- Improve user experience
Services used:
- Google Analytics
- Microsoft Clarity
What they collect:
- Pages you visit
- Time spent on pages
- Device and browser type
- Approximate location (city level)
Your control: You can reject these cookies via our cookie consent banner or browser settings.
4.3 Marketing Cookies (Require Your Consent)
These cookies enable us to show relevant advertisements and measure campaign effectiveness.
Purpose:
- Display targeted advertisements
- Measure advertising performance
- Retarget website visitors
- Limit ad frequency
Services used:
- Google Ads
- Other advertising platforms
What they collect:
- Pages you viewed
- Content you engaged with
- Advertising identifiers
- Approximate location
Your control: You can reject these cookies via our cookie consent banner or browser settings.
4.4 Functionality Cookies (Require Your Consent)
These cookies enable enhanced features and personalisation.
Purpose:
- Remember your preferences
- Enable live chat
- Customise content
- Provide enhanced features
Services used:
- Live chat services
- Preference management
Your control: You can reject these cookies, but some features may not work properly.
5. MANAGING COOKIES
5.1 Our Cookie Consent Banner
When you first visit our website, you can:
- Accept all cookies
- Reject non-essential cookies
- Customise your preferences by category
You can change your preferences at any time by clicking "Cookie Settings" in the website footer.
5.2 Browser Settings
You can control cookies through your browser settings:
- Block all cookies (may affect website functionality)
- Block third-party cookies only
- Delete existing cookies
- Set preferences for specific websites
Instructions for managing cookies:
- Chrome: Settings > Privacy and Security > Cookies
- Firefox: Settings > Privacy & Security > Cookies
- Edge: Settings > Cookies and site permissions
- Safari: Preferences > Privacy
5.3 Third-Party Opt-Out
You can opt out of advertising cookies:
- Google Analytics opt-out: https://tools.google.com/dlpage/gaoptout
- Google ad settings: https://adssettings.google.com
- LinkedIn ad settings: https://www.linkedin.com/psettings/advertising
- Network Advertising Initiative: http://www.networkadvertising.org/choices/
- Digital Advertising Alliance: http://www.aboutads.info/choices/
6. YOUR RIGHTS
Under the Privacy Act 1988 (Cth) and Australian Privacy Principles, you have rights regarding information collected through cookies:
- Right to know what information we collect
- Right to control which cookies are set
- Right to access information collected about you
- Right to complain if you believe we've breached privacy laws
For more information about your privacy rights, see our Privacy Policy (please refer to the table of content).
7. THIRD-PARTY SERVICES
We use third-party services that set cookies on our website. These services have their own privacy and cookie policies:
- Google Analytics: https://policies.google.com/privacy
- Google Ads: https://policies.google.com/technologies/ads
- Microsoft Clarity: https://privacy.microsoft.com/en-us/privacystatement
- LinkedIn: https://www.linkedin.com/legal/privacy-policy
We are not responsible for the content of third-party policies.
8. DATA SECURITY
Information collected through cookies is protected by:
- Encryption in transit (HTTPS)
- Secure storage
- Access controls
- Compliance with Australian Privacy Principles
9. INTERNATIONAL TRANSFERS
Some third-party cookies may involve transferring information to countries outside Australia, including the United States. We ensure appropriate safeguards are in place for any international transfers as described in our Privacy Policy.
10. UPDATES TO THIS POLICY
We may update this Cookie Policy from time to time. Changes will be posted on this page with an updated "Last Updated" date. Material changes may require fresh consent.
11. CONTACT US
Questions about cookies:
Email: hello@trichoretech.com.au
Privacy complaints:
If you believe we have breached privacy laws in our use of cookies, contact our Privacy Officer. If unsatisfied with our response, you can contact:
Office of the Australian Information Commissioner (OAIC)
Phone: 1300 363 992
Website: www.oaic.gov.au
Email: enquiries@oaic.gov.au
12. USEFUL RESOURCES
Learn more about cookies:
- About Cookies: www.aboutcookies.org
- All About Cookies: www.allaboutcookies.org
Australian privacy information:
- OAIC: www.oaic.gov.au
- Australian Privacy Principles: www.oaic.gov.au/privacy/australian-privacy-principles
This Cookie Policy was last updated on 25 November 2025.
TRICORE TECH
Beyond Digital. Genuinely Human.
ABN: 77 249 933 517