The type of personal information we collect, and hold depends on your relationship with us. For example, if you are a ;
In addition to the above, we may also collect sensitive information where you consent to the collection of that information and the information is reasonably necessary to carry out a business function or activity. The most likely sensitive information we may collect includes criminal background checks and records.
We collect personal information from you in a number of different ways. We may collect personal information from you directly or during our dealings with you, for example:
The main purposes for which we collect, hold, and use your personal information are to provide you with our products or services that you have requested, including for the performance of any contract you have with us respond to your queries or feedback, maintain contact with you, verify your identity, send you newsletters, marketing or promotional materials and other information related to our products and services. (You can always opt-out of receiving direct marketing information from us at any time by following the unsubscribe link or instructions provided in any email we send or by contacting us), facilitate your participation in forums, social events, and educational events, recruit employees and contractors.
If we are not able to collect personal information about you, we may not be able to provide you with products, services and assistance to the extent that they require us to collect, use or disclose personal information.
We may use or disclose your personal information for the purpose for which it was collected. We may also use and disclose your personal information for a secondary purpose that is related to a purpose for which we collected it, where you would reasonably expect us to use or disclose your personal information for that secondary purpose.
Other instances when we may use and disclose your personal information include:
where you have expressly or impliedly consented to the use or disclosure, in confidence, to our advisers and insurers in confidence, to third parties to improve our services and obtain feedback where the use or disclosure is authorised or required by or under an Australian law or a court/tribunal order.
From time to time we deal with third parties, such as service providers or our related companies. As a result, we may disclose your personal information to a third-party recipient. For example, we may share your personal information: amongst our related bodies corporate with third-party service providers we use in conducting our business, including, Google Analytics (for the purpose of providing web analytics services), and email marketing service providers such as Mailchimp
When we disclose your personal information overseas, we take steps to ensure that our service providers and business partners are obliged to protect the privacy and security of your personal information in accordance with the standards that apply in Australia, including that they only use personal information for the purpose for which it is disclosed.
The security of your personal information is important to us and we take reasonable steps to keep the personal information we hold about you secure.
However, except to the extent liability cannot be excluded due to the operation of the statute, we exclude all liability (including in negligence) for the consequences of any unauthorised access to your personal information. Please notify us immediately if you become aware of any breach of security.
We will store electronic records within our own secure network and through third party data storage providers. Personal information within our network is password protected and access is appropriately limited.
third-party Our third-party data storage providers are required to protect personal information in accordance with applicable laws and take appropriate technical and organisational measures against the unauthorised or unlawful use of personal information or its accidental loss, destruction, or damage.
We have no control over and assume no responsibility for the content, privacy policies or practices of any third-party sites or services.
You have a right to request access to, or to update or correct your personal information held by us. To make a request, please contact us in writing (see our contact details below). We will require you to verify your identity and specify what information you require. We may charge a fee for providing access to this information and we may refuse access where the Privacy Act 1988 (Cth) allows us to do so.
In the event of any loss, or unauthorised access or disclosure of your personal information that is likely to result in serious harm to you, we will investigate and notify you and the Australian Information Commissioner as soon as practicable, in accordance with the Privacy Act 1988 (Cth).
If you aren’t happy with us, please let us know. We are committed to efficiently and professionally resolving any complaint in relation to your privacy. Please contact the Privacy Officer in writing (contact details below) and provide the following information to support your complaint:
The Privacy Officer will:
We try to resolve any complaints as quickly and as efficiently as possible, and we aim to respond to complaints within 28 days. If this is not possible, you will be contacted within that time to let you know how long it should take us to respond to your complaint.
If you are dissatisfied with our response to your privacy concerns, a complaint may be lodged with the Office of the Australian Information Commission (OAIC). Their enquiry line is 1300 363 992 or they have an online privacy complaint form accessible at oaic.gov.au.
Please direct any privacy issues, complaints, or queries to our Privacy Officer:
By mail: Kodez, Privacy Officer, Level 3, 162 Collins Street Melbourne VIC 3000
By phone: (+61) 390 699 477
By email: firstname.lastname@example.org
Privacy Act 1988 (Privacy Act)
Australian Privacy Principles (APPs)At Kodez, your privacy is very important to us. We respect your rights to privacy, and we are absolutely committed to protecting your personal information. We want to be transparent with you about the types of personal information we collect and hold, how that information is used and with whom we share the information.
This policy explains all of this to you and how you can contact us if you have any queries or concerns about this policy and/or your privacy.
References in this policy to:
“Kodez” refers to Kodez Pty Ltd (ABN 13 614 647 728) and all its related entities.
“we”, “us” or “our” refers to Kodez.
“website” refers to www.kodez.com.au
Containers have revolutionized the way applications are developed, packaged, and deployed, offering a modular and efficient approach to ensure consistent functionality across varied environments. To leverage the full potential of containerization, Azure presents an array of services and tools tailored to meet diverse needs. This article aims to dissect and compare three prominent Azure services: Azure Container Instances (ACI), Azure Kubernetes Service (AKS), and Azure Container Apps (ACA). We will delve into the distinct features, advantages, and ideal scenarios for each service, providing an analysis of their capabilities and applications.
Most developers are familiar with the OWASP Top 10 that describes the most critical risks to web applications. OWASP also produce a lesser known artefact called the OWASP Top 10 CI/CD Security Risks that describes risks that modern build and deployment systems face that is essential reading for all development teams.