SlashTech Privacy Policy
Last updated: October 24, 2025
1. Introduction
This Privacy Policy explains how SlashTech Pty Ltd (“SlashTech”, “we”, “us”, or “our”) collects, uses, discloses, and protects personal information and data collected through our IoT systems, LoRaWAN networks, technology infrastructure services, and associated software platforms. We are committed to protecting your privacy and ensuring your personal information is handled responsibly. This policy has been developed in accordance with the Australian Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs).
1.1 About This Policy
This policy describes our practices across our products, services, and websites, including how we collect, use, and safeguard personal information, and the rights available to clients and end-users.
1.2 Policy Scope
- Information collected through IoT devices installed and managed by SlashTech
- Data transmitted across LoRaWAN networks implemented by SlashTech
- Information processed through our data infrastructure services
- Personal information collected through our SaaS platforms
- Data collected from visitors to our website
- Information provided by clients and business partners
1.3 Definitions
- Personal Information means information or an opinion about an identified individual, or an individual who is reasonably identifiable.
- IoT Devices refers to Internet of Things devices including sensors, actuators, and connected devices.
- LoRaWAN Network refers to the Long Range Wide Area Network infrastructure operated by SlashTech.
- Client refers to organisations or individuals who engage SlashTech to provide services.
- End-User refers to individuals who use or interact with systems implemented by SlashTech.
- Platform refers to SlashTech’s software applications, dashboards, and management interfaces.
2. Information We Collect
IoT device data, network data, client details, platform usage, and website visitors
2. Information We Collect
IoT device data, network data, client details, platform usage, and website visitors
2.1 IoT Device Data
- Environmental data (temperature, humidity, light levels, etc.)
- Location data (GPS coordinates, proximity information)
- Operational data (device status, battery levels, etc.)
- Usage patterns and activity data
- Equipment performance metrics
- Resource consumption data (energy, water, etc.)
2.2 Network Data
- Device identifiers and network addresses
- Signal strength and quality metrics
- Connection timestamps and durations
- Message metadata
- Network performance statistics
- Gateway location and identification information
2.3 Client Information
- Contact details of client representatives (name, email, phone)
- Business information (company name, ABN, address)
- Account authentication credentials
- Service configuration preferences
- Billing and payment information
- Communication records and correspondence
- Contract and service agreement details
2.4 Platform Usage Data
- Account information (usernames, email addresses)
- User preferences and settings
- Access logs and activity records
- Dashboard configuration data
- Authentication information
- Device information (browser type, operating system, etc.)
- IP addresses and geolocation data
2.5 Website Visitor Information
- Browser type and version
- Operating system
- IP address
- Pages visited and navigation patterns
- Referring websites
- Time and date of visits
- Device information
3. How We Collect Information
Installations, transmissions, registrations, cookies, communications, and authorised providers
3. How We Collect Information
Installations, transmissions, registrations, cookies, communications, and authorised providers
- Direct installation and configuration of IoT devices
- Data transmissions across LoRaWAN networks
- Client-provided information during service setup
- Registration and account creation on our platforms
- Cookies and similar technologies on our website
- Communications with our team (email, phone, meetings)
- Service usage and interaction with our systems
- Third-party service providers where authorised
4. Purpose of Information Collection
Primary and secondary purposes
4. Purpose of Information Collection
Primary and secondary purposes
4.1 Primary Purposes
- Providing contracted IoT and technology services
- Deploying and maintaining LoRaWAN networks
- Managing and optimising device performance
- Delivering data visualisation and analytics
- Processing and storing IoT-generated data
- Facilitating system integration with client platforms
- Authenticating users and managing access controls
- Billing and account administration
4.2 Secondary Purposes
- Service improvement and feature development
- Troubleshooting and technical support
- Analysing usage patterns to enhance user experience
- Creating anonymised statistical data
- Marketing and promoting our services
- Conducting research and development
- Compliance with legal and regulatory obligations
- Maintaining the security of our systems
5. Data Usage and Processing
IoT data processing, client data usage, aggregated data
5. Data Usage and Processing
IoT data processing, client data usage, aggregated data
5.1 IoT Data Processing
- Transform raw sensor data into meaningful information
- Generate alerts and notifications based on thresholds
- Create visualisations and reports
- Perform trend analysis and predictive modelling
- Enable automation and system control
- Support decision-making processes
- Verify system functionality and performance
5.2 Client Data Usage
- Establish and maintain client accounts
- Provide technical and customer support
- Communicate about service updates or issues
- Process payments and manage billing
- Fulfil contractual obligations
- Customise services to client requirements
- Maintain business records
5.3 Aggregated and De-identified Data
We may create aggregated, de-identified, or anonymised data from the information we collect. This data does not identify specific clients or individuals and may be used for industry analysis, research and development, service enhancements, marketing, and general business intelligence.
7. Data Security
Security measures for data, IoT devices, LoRaWAN, and breach procedures
7. Data Security
Security measures for data, IoT devices, LoRaWAN, and breach procedures
7.1 Security Measures
- Encryption of data in transit and at rest
- Access controls and authentication mechanisms
- Firewalls and network security monitoring
- Regular security assessments and audits
- Physical security for facilities
- Secure development practices and employee training
- Incident response procedures
7.2 IoT Device Security
- Device authentication and authorisation
- Secure boot mechanisms where available
- Regular firmware updates and patch management
- Network segmentation and traffic filtering
- Secure provisioning processes
- Monitoring for unusual device behaviour
- Device retirement and decommissioning protocols
7.3 LoRaWAN Security
- AES-128 encryption for all communications
- Unique network and application session keys
- Secure device activation processes
- Message integrity checking
- Gateway authentication
- Network server security controls and monitoring
7.4 Data Breach Procedures
- Identify and contain the breach
- Assess the nature and scope
- Evaluate risk of harm
- Notify affected clients/individuals where required
- Report to regulators as required
- Remediate and prevent re-occurrence
8. Data Retention and Disposal
Retention periods and secure disposal
8. Data Retention and Disposal
Retention periods and secure disposal
8.1 Retention Periods
We retain information for as long as necessary to fulfil the purposes outlined in this policy, comply with legal and contractual obligations, and resolve disputes. Specific periods vary by data type, sensitivity, client requirements, legal/regulatory obligations, and operational needs.
8.2 Data Disposal
- Secure deletion of electronic records
- Destruction of physical documents
- De-identification or anonymisation where appropriate
- Decommissioning of storage media
9. Client and End-User Rights
Access, correction, deletion, restriction, portability, and objections
9. Client and End-User Rights
Access, correction, deletion, restriction, portability, and objections
9.1 Access and Correction
- Request access to personal information we hold
- Request correction of inaccurate information
- Receive a copy in a structured format
- Update account and profile information
9.2 Deletion and Restriction
- Request deletion of personal information
- Request restriction of processing
- Withdraw consent for specific processing activities
- Object to certain types of processing
9.3 Additional Rights
- Data portability to another service provider
- Lodge a complaint with a supervisory authority
- Opt-out of marketing communications
- Request information about automated decision-making
9.4 Exercising Rights
To exercise these rights, contact us via privacy@slashtech.com.au. We will respond in accordance with applicable laws.
10. International Data Transfers
Data location and transfer safeguards
10. International Data Transfers
Data location and transfer safeguards
10.1 Data Location
We primarily store and process data in Australia. However, we may transfer data to other countries for processing (e.g., cloud service providers with global infrastructure, international service providers, and client-specified destinations).
10.2 Transfer Safeguards
- Contractual clauses requiring adequate data protection
- Verification of recipient’s data protection practices
- Limiting transfers to countries with adequate protection
- Obtaining client consent for specific transfers
- Additional security measures where needed
11. Children’s Privacy
Not directed to individuals under 18
11. Children’s Privacy
Not directed to individuals under 18
Our services are not directed to individuals under the age of 18. We do not knowingly collect personal information from children. If we learn we have collected such information, we will delete it promptly. If you believe we have collected information from a child, please contact us immediately.
13. Marketing Communications
Practices and opt-out options
13. Marketing Communications
Practices and opt-out options
13.1 Marketing Practices
- New services and features
- Industry insights and best practices
- Company news and updates
- Events and webinars
- Special offers and promotions
13.2 Opt-Out Options
Each marketing communication includes options to unsubscribe, update preferences, or specify preferred channels.
14. Changes to This Policy
How we’ll notify you of updates
14. Changes to This Policy
How we’ll notify you of updates
- Post the updated policy on our website
- Update the “Last Updated” date at the top
- Notify clients of material changes via email or in-app
- Obtain consent where required by law
- Encourage periodic review for the latest information
15. Contact Us
Reach our Privacy Officer
15. Contact Us
Reach our Privacy Officer
Document Control
- Document Number
- POL-PRIV-001
- Version
- 1.0
- Last Updated
- October 24, 2025
- Prepared By
- Jayben Bertrand
- Approved By
- Javier Bates
- Review Date
- 1/12/2025