Compliance & Governance

Privacy Policy and Data Stewardship

At MumbaiDataCore, we treat personal information with the same rigor we apply to enterprise core data architecture. This document outlines how we collect, handle, and safeguard your details in accordance with the Australian Privacy Principles.

Effective Date: 2026-03-17 Region: Australia (AU)

Scope of Information

We only collect information that is strictly necessary for providing our consultancy services and maintaining system security.

Direct Engagement Data

When you request a consultation regarding your core data strategy, we collect your name, professional email address, phone number, and company name. This is used solely to facilitate business communication and prepare technical assessments.

Technical System Logs

Our web servers automatically record metadata related to your visit. This includes your IP address, browser type, and interaction timestamps. We use this data for performance monitoring and to prevent unauthorized access attempts to our systems.

Third-Party Integration

We do not sell your personal information. We may share specific data points with vetted technical partners only when they are essential for delivering system integration projects you have commissioned.

Your Rights Under Australian Law

Under the Privacy Act 1988, you have clear rights regarding the personal information we hold. We ensure these rights are easy to exercise without unnecessary administrative friction.

  • The right to request access to any personal data we store.
  • The right to correct inaccuracies or out-of-date records.
  • The right to choose to remain anonymous in certain general inquiries.
Access Control

Data Retention & Deletion

MumbaiDataCore retains personal information only for as long as it is necessary to fulfill the purposes for which it was collected, or as required by Australian law. Financial records and project-specific documentation are retained for a minimum of seven years to comply with tax and audit requirements.

Once data is no longer required, we employ secure shredding and digital wiping techniques to ensure it is beyond recovery. For legacy system migrations, we work with clients to define strictly bounded retention windows.

Security of Information

We utilize enterprise-grade encryption for all data at rest and in transit. Our internal protocols include:

Protocol 01

Multi-factor authentication (MFA) required for all internal systems access.

Protocol 02

Annual independent security audits of our core infrastructure.

Protocol 03

End-to-end data encryption using AES-256 standards.

Protocol 04

Controlled physical access to Melbourne-based data processing facilities.

Privacy Concerns?

If you have questions about our handling of information or believe your privacy has been compromised, our Data Privacy Officer is available during standard business hours.

Melbourne Office

+61 3 2000 0015

Registered Address

Melbourne 15

Process for Filing a Complaint

Step 1: Informal Discovery

Contact us via email to clarify any data handling questions.

Step 2: Formal Investigation

Submit a formal complaint which our legal team will review within 14 business days.

Step 3: External Review

If dissatisfied, you may contact the Office of the Australian Information Commissioner (OAIC).

This policy is subject to change. Updates will be posted on this page and, where appropriate, notified to registered clients via email. We encourage you to review this Privacy Policy periodically.