Use of and access to this site is subject to the following terms and conditions:
Risk Wizard's web site provides general information on a range of products and services. The purpose of this information is to inform. It is not intended as solutions on any specific problem or any particular situation. Therefore, it must not be relied upon because Risk Wizard does not guarantee the accuracy, reliability, or currency of this information. In addition, Risk Wizard recommends you seek professional advice before acting or relying upon any information provided in this site.
Risk Wizard is not responsible for and has no knowledge of the contents of the links to any vendor or other sites. These links are intended to facilitate the ease for users. Hence, visitors to this site may use any information on this site, and any other linked sites, at their own risk. Risk Wizard will not be liable for damages of any kind, including direct, consequential (including loss of profits, business or data) or special damages, which may arise out of or result from reliance on or use of this information. Risk Wizard does not endorse or accept any liability to any person for the content and use of the information or services provided on this site or on linked sites.
Risk Wizard disclaims any warranties or representations as to the accuracy or completeness of the contents of this site, and any implied warranties of merchantability or fitness for a particular purpose.
Links from external websites to Risk Wizard's website are only permitted with our express written permission.
Reasonable Use and Publishing Policy
The Reasonable Use and Publishing Policy (“Policy”) applies to use of Risk Wizard’s Hosted Software Service (“Hosting Service”). Customers should ensure compliance with all applicable provisions of this Policy. Policy enquiries can be emailed to
1. Reasonable use and publishing
1.1 Use of Hosting Service to post, publish, transmit, re-transmit or store material must be:
(a) compliant with current laws and regulations including but not limited to regulations pertaining to copyright, license agreements and patents;
(b) in accordance with accepted community standards and ethical;
(c) for activities of a standard business nature; and
(d) in accordance with terms and conditions of Risk Wizard’s Hosted Software Agreement.
2. Unacceptable use and publishing
2.1 General: Hosting Service shall not be used to post, publish, transmit, re-transmit or store material which:
(a) violates local, state, federal, foreign, or international law;
(b) could be considered threatening, obscene, indecent, defamatory or that otherwise could adversely affect any individual, group or entity;
(c) amounts to deceptive or fraudulent practices;
(d) infringes the intellectual property rights of others, including, but not limited to, copyrights, trademarks, trade secrets and patents.
(e) restricts or inhibits any person, whether a customer, Risk Wizard, or otherwise, in its use or enjoyment of the Hosting Services;
(f) advertises, transmits, or otherwise making available any software, program, product, or service that is designed to violate this Policy, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail bombing, denial of service attacks, and piracy of software or copyrighted content;
(g) sends unsolicited bulk messages (spam), via any means, including, but not limited to, email, instant messenger services, and message group postings. Risk Wizard reserves the right to determine in its sole discretion and based on the information available what constitutes spam as well as what measures are necessary in response to spamming complaints;
(h) sends solicited bulk messages, including but not limited to, the utilisation of services not designed to manage this functionality or any such actions which Risk Wizard deems to potentially compromise or adversely affect service standards; or
(i) promotes deceptive and or illegal marketing practices, products or services.
2.2 System and network: Hosting Service shall not be used to:
(a) deliberately transmit computer viruses, worms, Trojan software, or other malicious programs;
(b) interfere with, disrupt, or deny service including, but not limited to, using any technique to intentionally degrade or disable the delivery of any legitimate data;
(c) attempt to gain unauthorised entry to any site or network including, but not limited to, executing any form of network probing, monitoring or other information gathering on someone else's site or network;
(d) attempt to circumvent host or user authentication or other security measures of any host, network or account; or
(e) manipulate or bypass Risk Wizard’s usage limits.
2.3 Email: Hosting Service shall not be used to:
(a) send unsolicited mail messages;
(b) allow harassment including, but not limited to, language, frequency or size of messages;
(c) forge or illegitimately use mail header information;
(d) create or forward "chain letters" or other "schemes" of any type; or
(e) for the use of unsolicited email originating from within Risk Wizard’s network, on behalf of, or to advertise any service hosted by Risk Wizard, or connected via Risk Wizard's network.
2.4 Message groups: Hosting Service shall not be used to:
(a) post the same or similar messages to large numbers of Message groups ("Message group spam");
(b) post excessive numbers of identical or similar messages to any number of Message groups from Risk Wizard's network to advertise, any service hosted by Risk Wizard or sites hosted within, or via Risk Wizard's network;
(c) post chain letters of any type;
(d) post encoded binary files to Message groups not named for that purpose; or
(e) cancel or supersede posts other than Customer's own.
3. Hosting Service resale
Hosting Service cannot be resold unless authorised by Risk Wizard in an executed Authorised Distributor contract.
4. Password protection
Customer is responsible for protecting passwords and for any authorised or unauthorised use of its systems and/or networks. All actions resulted from passwords being compromised will remain the sole responsibility of the Customer.
5. Privacy, content and data protection
5.1 Customer will use reasonable and appropriate measures to secure the content on its systems and/or networks against accidental or unlawful loss, access or disclosure.
5.2 Customer must provide appropriate protection to prevent minors (persons under 18 years of age) from accessing any unsuitable material published via the Hosting Service.
5.3 Customer will agree to comply with all applicable legislation governing privacy and data protection including but not limited to those contained in the privacy principles contained in the Privacy Act 1988 (Cth), and any other similar legislation both within and outside the Commonwealth of Australia, while using the Hosting Service.
6. Content ownership
The Customer is responsible for all content or information residing on, obtained or transmitted via the Hosting Service.
7.1 Violation of this Policy may subject the Customer to international, federal, and/or state civil and/or criminal liability. Customer activity that facilitates a violation of this Policy by any party constitutes a violation of this Policy by the Customer.
7.2 Risk Wizard reserves the right to block, suspend, and/or terminate access to the Hosting Service at any time for any conduct that violates, or may violate, this Policy or is otherwise harmful to Risk Wizard's interests or the interests of others.
7.3 Risk Wizard reserves the right to charge the Customer to remedy any harm caused to Risk Wizard or its Customers by use of the Hosting Service in violation of this Policy.
Risk Wizard Pty Limited (Risk Wizard) recognises the importance of the performance of online technology and how personal information is collected, stored, used and disclosed. Risk Wizard is bound by the Privacy Act 1988 (Cth) (Privacy Act) and the Australian Privacy Principles (APPs) set out in the Privacy Act, and understands the importance people place on their personal information.
Collection of Information
We may collect personal information that is reasonably necessary for, or directly related to, one or more of our services or activities; or because it is required under relevant law or regulation.
The type of personal information we may collect includes your name, address, telephone number, email address, occupation and other information that is capable of identifying you (including information about your work experience in the event that you apply for a position with us) or details regarding conversations we have had with you. This information is kept and treated as confidential information and will only be used by Risk Wizard.
Risk Wizard will generally collect personal information directly from you or your authorised representative through conversations, emails, meetings or using tools such as the Internet and forms. There may be some instances where personal information about you will be collected from a third party, a publicly available source or by other lawful means, but only if:
you have provided your consent, or you would reasonably expect us to collect your personal information; or
it is necessary for a specific purpose such as executing a function or activity in connection with your dealings with Risk Wizard; or
we are permitted, or required to, by applicable law.
We will usually notify you about these instances in advance or where that is not possible, as soon as reasonably practicable after your information has been collected. If the personal information you provide to us is incomplete or inaccurate, we may be unable to provide you or your authorised representative with the requested services and/or information.
We may collect sensitive information about you (such as your criminal record or health information) if you provide your consent.
Separate guidelines apply to information held in relation to Risk Wizard's own staff.
How we deal with unsolicited information
Sometimes we receive unsolicited information from individuals or from other sources. If we determine that we could not have collected the information for one or more of our functions or activities, we will take reasonably practicable steps to de-identify or destroy the information. Alternatively, we will take reasonable steps to protect the information from misuse or unauthorised disclosure. Disclosure of unsolicited information we hold may be made where required or permitted by law.
How your information is used
The personal information that we collect and hold about you depends on your interaction with us. Generally, we will only collect and hold your personal information where it is reasonably necessary for us to establish and/or maintain a relationship with you. We will use your personal information (including sensitive information) for the primary purpose it was collected, or if your personal information is to be used for a secondary purpose we will seek your consent, in order to:
provide services to you;
facilitate our internal business operations;
analyse our services and customer needs with a view to developing new or improved services;
provide you with information about other services that we offer that may be of interest to you (Marketing Material); or
because disclosure or use is required or authorised by law.
If you do not wish to receive Marketing Material from us you can opt out at any time by contacting our Sales Director as detailed below.
We do not sell personal information, and we do not provide your personal information to third parties unless one or more of the following situations apply:
we have consent from you;
you would reasonably expect, or have been advised that personal information may be used or disclosed;
if the use or disclosure is required by lawful authority; or
if the use of disclosure relates to one or more of the Prescribed General situations under the Privacy Act including, but not limited to, a serious and imminent threat to somebody's life or health, or if it is reasonably necessary for law enforcement.
We may disclose your personal information (including sensitive information) for the purposes for which it was collected;
persons reasonably necessary to enable us to provide services to you, including but not limited to you or your overseas representatives;
external service providers that may assist us in our business in providing administration, information technology or other services; or
anyone else as required by applicable law.
Protection of information
We will take reasonable steps to ensure that the information we hold about you is relevant, accurate, up-to-date and complete. We take reasonable and practicable steps to protect your personal information from loss, misuse, modification, disclosure, interference or unauthorised access.
When we no longer need your personal information we will take all reasonable and practicable steps to de-identify or destroy the information in a secure manner.
Accessing your personal information
You can request that we provide you with access to information we hold about you, or ask us to correct any personal information we hold about you, that is out-of-date, incorrect, incomplete or misleading. You can contact us by submitting a request in writing to the address set out below. If we are able to, we will action your request within a reasonable time frame following receipt of your request.
We may decline a request for access to personal information in circumstances prescribed by the Privacy Act as amended from time to time. If complying with your request for access or amendment requires considerable time and expense on our part, we may charge you a reasonable fee for providing you with information. If we are unable to agree to your request, we will provide you with an appropriate explanation.
Contact us about your privacy
PO Box 602
Melbourne VIC 8007
If you contact us in relation to your personal information and believe that we have not resolved your request you may apply to the Office of the Australian Information Commission (OAIC) to have your complaint heard and determined.