Skip to content

SlashTech Privacy Policy

Last updated: October 24, 2025

1. Introduction

This Privacy Policy explains how SlashTech Pty Ltd (“SlashTech”, “we”, “us”, or “our”) collects, uses, discloses, and protects personal information and data collected through our IoT systems, LoRaWAN networks, technology infrastructure services, and associated software platforms. We are committed to protecting your privacy and ensuring your personal information is handled responsibly. This policy has been developed in accordance with the Australian Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs).

1.1 About This Policy

This policy describes our practices across our products, services, and websites, including how we collect, use, and safeguard personal information, and the rights available to clients and end-users.

1.2 Policy Scope

  • Information collected through IoT devices installed and managed by SlashTech
  • Data transmitted across LoRaWAN networks implemented by SlashTech
  • Information processed through our data infrastructure services
  • Personal information collected through our SaaS platforms
  • Data collected from visitors to our website
  • Information provided by clients and business partners

1.3 Definitions

  • Personal Information means information or an opinion about an identified individual, or an individual who is reasonably identifiable.
  • IoT Devices refers to Internet of Things devices including sensors, actuators, and connected devices.
  • LoRaWAN Network refers to the Long Range Wide Area Network infrastructure operated by SlashTech.
  • Client refers to organisations or individuals who engage SlashTech to provide services.
  • End-User refers to individuals who use or interact with systems implemented by SlashTech.
  • Platform refers to SlashTech’s software applications, dashboards, and management interfaces.

2. Information We Collect

IoT device data, network data, client details, platform usage, and website visitors

2.1 IoT Device Data

  • Environmental data (temperature, humidity, light levels, etc.)
  • Location data (GPS coordinates, proximity information)
  • Operational data (device status, battery levels, etc.)
  • Usage patterns and activity data
  • Equipment performance metrics
  • Resource consumption data (energy, water, etc.)

2.2 Network Data

  • Device identifiers and network addresses
  • Signal strength and quality metrics
  • Connection timestamps and durations
  • Message metadata
  • Network performance statistics
  • Gateway location and identification information

2.3 Client Information

  • Contact details of client representatives (name, email, phone)
  • Business information (company name, ABN, address)
  • Account authentication credentials
  • Service configuration preferences
  • Billing and payment information
  • Communication records and correspondence
  • Contract and service agreement details

2.4 Platform Usage Data

  • Account information (usernames, email addresses)
  • User preferences and settings
  • Access logs and activity records
  • Dashboard configuration data
  • Authentication information
  • Device information (browser type, operating system, etc.)
  • IP addresses and geolocation data

2.5 Website Visitor Information

  • Browser type and version
  • Operating system
  • IP address
  • Pages visited and navigation patterns
  • Referring websites
  • Time and date of visits
  • Device information

3. How We Collect Information

Installations, transmissions, registrations, cookies, communications, and authorised providers

  • Direct installation and configuration of IoT devices
  • Data transmissions across LoRaWAN networks
  • Client-provided information during service setup
  • Registration and account creation on our platforms
  • Cookies and similar technologies on our website
  • Communications with our team (email, phone, meetings)
  • Service usage and interaction with our systems
  • Third-party service providers where authorised

4. Purpose of Information Collection

Primary and secondary purposes

4.1 Primary Purposes

  • Providing contracted IoT and technology services
  • Deploying and maintaining LoRaWAN networks
  • Managing and optimising device performance
  • Delivering data visualisation and analytics
  • Processing and storing IoT-generated data
  • Facilitating system integration with client platforms
  • Authenticating users and managing access controls
  • Billing and account administration

4.2 Secondary Purposes

  • Service improvement and feature development
  • Troubleshooting and technical support
  • Analysing usage patterns to enhance user experience
  • Creating anonymised statistical data
  • Marketing and promoting our services
  • Conducting research and development
  • Compliance with legal and regulatory obligations
  • Maintaining the security of our systems

5. Data Usage and Processing

IoT data processing, client data usage, aggregated data

5.1 IoT Data Processing

  • Transform raw sensor data into meaningful information
  • Generate alerts and notifications based on thresholds
  • Create visualisations and reports
  • Perform trend analysis and predictive modelling
  • Enable automation and system control
  • Support decision-making processes
  • Verify system functionality and performance

5.2 Client Data Usage

  • Establish and maintain client accounts
  • Provide technical and customer support
  • Communicate about service updates or issues
  • Process payments and manage billing
  • Fulfil contractual obligations
  • Customise services to client requirements
  • Maintain business records

5.3 Aggregated and De-identified Data

We may create aggregated, de-identified, or anonymised data from the information we collect. This data does not identify specific clients or individuals and may be used for industry analysis, research and development, service enhancements, marketing, and general business intelligence.

6. Data Sharing and Disclosure

Client-directed sharing, service providers, legal requirements, consent

6.1 Client-Directed Sharing

  • Transmitting IoT data to client-specified platforms
  • Providing access to authorised client representatives
  • Integrating with third-party systems as requested
  • Enabling data export in client-selected formats
  • Sharing with client’s other service providers as authorised

6.2 Service Providers

We may share information with third-party service providers who perform services on our behalf, such as cloud infrastructure, network operators, payment processors, technical support, and professional services. These providers are bound by appropriate confidentiality and data protection obligations.

6.3 Legal Requirements

  • Lawful requests from government authorities
  • Compliance with legal processes (e.g., subpoenas, court orders)
  • Protection of rights, privacy, safety, or property
  • Investigation of suspected fraud or illegal activity
  • In connection with a merger, acquisition, or sale of assets

6.4 With Consent

We may share information with third parties when we have consent to do so from the client or individual.

7. Data Security

Security measures for data, IoT devices, LoRaWAN, and breach procedures

7.1 Security Measures

  • Encryption of data in transit and at rest
  • Access controls and authentication mechanisms
  • Firewalls and network security monitoring
  • Regular security assessments and audits
  • Physical security for facilities
  • Secure development practices and employee training
  • Incident response procedures

7.2 IoT Device Security

  • Device authentication and authorisation
  • Secure boot mechanisms where available
  • Regular firmware updates and patch management
  • Network segmentation and traffic filtering
  • Secure provisioning processes
  • Monitoring for unusual device behaviour
  • Device retirement and decommissioning protocols

7.3 LoRaWAN Security

  • AES-128 encryption for all communications
  • Unique network and application session keys
  • Secure device activation processes
  • Message integrity checking
  • Gateway authentication
  • Network server security controls and monitoring

7.4 Data Breach Procedures

  • Identify and contain the breach
  • Assess the nature and scope
  • Evaluate risk of harm
  • Notify affected clients/individuals where required
  • Report to regulators as required
  • Remediate and prevent re-occurrence

8. Data Retention and Disposal

Retention periods and secure disposal

8.1 Retention Periods

We retain information for as long as necessary to fulfil the purposes outlined in this policy, comply with legal and contractual obligations, and resolve disputes. Specific periods vary by data type, sensitivity, client requirements, legal/regulatory obligations, and operational needs.

8.2 Data Disposal

  • Secure deletion of electronic records
  • Destruction of physical documents
  • De-identification or anonymisation where appropriate
  • Decommissioning of storage media

9. Client and End-User Rights

Access, correction, deletion, restriction, portability, and objections

9.1 Access and Correction

  • Request access to personal information we hold
  • Request correction of inaccurate information
  • Receive a copy in a structured format
  • Update account and profile information

9.2 Deletion and Restriction

  • Request deletion of personal information
  • Request restriction of processing
  • Withdraw consent for specific processing activities
  • Object to certain types of processing

9.3 Additional Rights

  • Data portability to another service provider
  • Lodge a complaint with a supervisory authority
  • Opt-out of marketing communications
  • Request information about automated decision-making

9.4 Exercising Rights

To exercise these rights, contact us via privacy@slashtech.com.au. We will respond in accordance with applicable laws.

10. International Data Transfers

Data location and transfer safeguards

10.1 Data Location

We primarily store and process data in Australia. However, we may transfer data to other countries for processing (e.g., cloud service providers with global infrastructure, international service providers, and client-specified destinations).

10.2 Transfer Safeguards

  • Contractual clauses requiring adequate data protection
  • Verification of recipient’s data protection practices
  • Limiting transfers to countries with adequate protection
  • Obtaining client consent for specific transfers
  • Additional security measures where needed

11. Children’s Privacy

Not directed to individuals under 18

Our services are not directed to individuals under the age of 18. We do not knowingly collect personal information from children. If we learn we have collected such information, we will delete it promptly. If you believe we have collected information from a child, please contact us immediately.

12. Cookies and Tracking Technologies

Website cookies, types, and management

12.1 Website Cookies

  • Enhance user experience and support security features
  • Analyse usage and performance
  • Remember user preferences
  • Facilitate certain website functions

12.2 Cookie Types

  • Essential cookies (required for functionality)
  • Analytics cookies (usage patterns)
  • Preference cookies (settings)
  • Marketing cookies (advertising)

12.3 Cookie Management

You can manage cookies via your browser settings, including accepting or declining cookies, deleting cookies, and setting preferences for specific types of cookies.

13. Marketing Communications

Practices and opt-out options

13.1 Marketing Practices

  • New services and features
  • Industry insights and best practices
  • Company news and updates
  • Events and webinars
  • Special offers and promotions

13.2 Opt-Out Options

Each marketing communication includes options to unsubscribe, update preferences, or specify preferred channels.

14. Changes to This Policy

How we’ll notify you of updates

  • Post the updated policy on our website
  • Update the “Last Updated” date at the top
  • Notify clients of material changes via email or in-app
  • Obtain consent where required by law
  • Encourage periodic review for the latest information

15. Contact Us

Reach our Privacy Officer

Privacy Officer
SlashTech Pty Ltd
Address
[Address Line 1]
[Address Line 2]
[City, QLD Postcode], Australia
Phone
[Phone Number]

Document Control

Document Number
POL-PRIV-001
Version
1.0
Last Updated
October 24, 2025
Prepared By
Jayben Bertrand
Approved By
Javier Bates
Review Date
1/12/2025