Firehouse Technology Privacy Policy

Your Trust, Our Priority 
Last Updated: 17/02/2025 

Privacy Act Compliance 

Firehouse Technology Pty Ltd (ACN 640 966 098) and its Australian related bodies corporate (we,us,our) are APP Entitiesunder the Privacy Act 1988 (Cth) (Act) and are bound by the Australian Privacy Principles (APPs) contained in the Act. We understand that your privacy is important and are committed to safeguarding the personal information we handle about individuals. This Privacy Policy outlines how we manage personal information and comply with the Act and the APPs. 

The Beginning 

At Firehouse Technology, our journey began with a simple yet powerful vision: to revolutionise the way businesses harness the potential of technology. Our mission is fuelled by Innovation and Collaboration, as we strive to empower organisations with transformative digital solutions. From humble beginnings to global partnerships, our commitment remains unwavering: delivering unparalleled value to our clients and shaping the future of technology together. 

The Firehouse stands for the coming together of Strategy, Technology, & Creativity. We work with clients to help them reimagine their business in the new digital age. We define and execute digital transformation strategies to improve business operations and customer experiences. We Are Global 

Firehouse Technology and its extended partners combine many years of expertise to offer a diverse range of cutting-edge cloud solutions and software development services. Specialising in Safe AI Implementation, Cloud Migrations, FinOps, Infrastructure Modernisation, and Cloud Security, we provide efficient, secure, and cost-effective solutions. Our managed IT and Security Services, alongside expert support in enterprise applications, banking technologies, and data-driven software development, ensure comprehensive, client-focused outcomes for organisations worldwide. 

 

Why Us 

We understand that business can be chaotic. With a dedicated team of experts, cutting-edge technology solutions, and a proven track record of success, we are your trusted partner in navigating the complexities of the digital landscape. From tailored strategies to seamless execution, we go above and beyond to deliver transformative results that drive your business forward. With us, you will experience the difference of working with a partner who is as invested in your success as you are. 

 

Better Together 

In our Better Togetherethos, Firehouse Technology proudly collaborates with a network of esteemed partners, uniting our strengths to deliver unparalleled value to our clients. Operating across Many Countries, our combined force of 500+skilled professionals ensures seamless execution and excellence in every endeavour. With a proven track record of 100+ successfully completed projects, our partnership exemplifies a shared commitment to delivering superior outcomes. Together, we leverage our collective expertise and resources to drive innovation, efficiency, and success for our clients worldwide. 

 

Introduction to This Privacy Policy 

Firehouse Technology Pty Ltd (hereafter Firehouse Technology,” “FHT,” “we,” “us,or our) respects your right to privacy and is committed to safeguarding personal information in accordance with the Privacy Act 1988 (Cth), the Australian Privacy Principles (APPs), the EU General Data Protection Regulation (GDPR) (where applicable), and ISO27001 standards for information security. This Privacy Policy explains how we collect, use, disclose, and secure personal information when you interact with us, whether by visiting our websites (including firehouse.technology and fht.services), participating in our services, or communicating with us in any form. 

 

Last Updated: 17/02/2025 

1. Scope and Applicability 

  1. 1.1. Visitors to Our Websites: If you browse our websites or portals, we act as the Data Controller for any personal information we collect or process about you directly. 

  1. 1.2. Clients and End-Users: When we provide services such as Safe AI Implementation, Cloud migrations, FinOps, Data Analytics, LLM integration, or Managed Security, we may handle personal data on our clientsbehalf, acting as a Data Processor under relevant laws (e.g., GDPR, Australian Privacy Act). 

  1. 1.3. Other Interactions: This policy also applies if you contact us directly (e.g., for customer support, sales inquiries, or job applications). 

  1. 2. Information We Collect 

  1. 2.1 Information You Provide 

  • Contact Details: Name, email, phone number, job title, organisation, etc. 
  • Service Requests & Project Details: When inquiring about our specialised services (e.g., FinOps analysis, infrastructure modernisation, or enterprise application development), you may provide project-specific data or credentials. 
  • Marketing & Events: Data you provide when signing up for our newsletters, webinars, or promotional activities. 
  • Recruitment: Resume, CV, LinkedIn profile, and other relevant details if you apply for a position at FHT. 
  1. 2.2. Information Collected Automatically 

  • Website Usage Data: IP address, browser type, access times, referring URLs, and pages visited. We use cookies and similar technologies to improve user experience and gather analytics. 
  • Log Files and Device Information: We may gather technical details about your device, operating system, and unique device identifiers for system diagnostics and security. 
  1. 2.3. Information from Third Parties 

  • Business Partners & Referrals: We may receive personal information about you from our network of partners or referrals (e.g., if you have indicated interest in FHT services). 
  • Publicly Available Sources: We may collect data from professional platforms (LinkedIn, company websites) if relevant to our legitimate interests (e.g., B2B outreach). 
  1. 3. How We Use Personal Information 

  1. 3.1. Service Delivery: 

  • We provide and maintain our services, such as Safe AI Implementation, cloud security, managed IT services, LLM integration, and enterprise application deployments. 
  • Managing client projects from planning through execution. 
  1. 3.2. Business Communication: 

  • Responding to inquiries, sending updates about our offerings, and providing customer support. 
  1. 3.3. Marketing & Analytics: 

  • Conducting research, analysing trends, and personalising content to improve user experiences on our websites or marketing campaigns. 
  1. 3.4. Legal Compliance & Security: 

  • Ensuring compliance with data protection laws (e.g., GDPR), financial regulations, or responding to lawful requests. 
  • Monitoring and preventing fraudulent or malicious activity, consistent with ISO27001 best practices. 
  1. 3.5. Recruitment: 

  • Reviewing job applications and communicating with candidates. 
  1. 4. Legal Basis for Processing 

  1. 4.1. Consent: Where you voluntarily opt-in (e.g., subscribing to newsletters). 

  1. 4.2. Contractual Necessity: When processing your data is essential for fulfilling a contract (e.g., you engage us for IT services). 

  1. 4.3. Legitimate Interests: For service improvements, security, or marketing in a B2B context, balanced against your rights. 

  1. 4.4. Legal Obligations: To comply with legal or regulatory requirements (e.g., responding to governmental authorities). 

  1. 5. Disclosure of Personal Information 

We primarily use personal information internally. However, we may share it with: 

  • 5.1. Service Providers (Sub-processors): Trusted third parties who assist us with hosting, analytics, payment processing, or other operational supportalways under contractual obligations to maintain confidentiality. 

  1. 5.2. Clients: If you are an end-user of one of our clients, we may share relevant data as part of delivering services. 

  1. 5.3. Business Transfers: In case of a merger, acquisition, or asset sale, data may be transferred to relevant parties with appropriate confidentiality measures. 

  1. 5.4. Regulatory or Legal Authorities: Where required by law or when we believe disclosure is necessary to protect our rights, interests, or safety. 

  1. 6. International Data Transfers 

Firehouse Technology operates in 30+ countries, and we may transfer your personal data outside of Australia or your jurisdiction. We will ensure such transfers comply with GDPR adequacy decisions or standard contractual clauses, as well as meet ISO27001 security standards to safeguard your information. 

  1. 7. Data Retention 

We retain personal data only as long as necessary to fulfil our business purposes, compliance obligations, or to exercise or defend legal claims. When data is no longer required, we securely delete or anonymise it. 

  1. 8. Cookies and Similar Technologies 

Our websites employ cookies (small text files) to store information about your preferences and browsing sessions. You can modify your cookie settings in your browser; however, some site features may not function optimally without cookies. 

  1. 9. Security and Privacy First 

We prioritise the security and privacy of your data, adhering to the highest industry standards, including GDPR and ISO27001, to ensure robust protection and confidentiality. Our measures include: 

  • Encryption of data in transit (TLS/SSL) and at rest (where feasible). 
  • Access Controls and Role-Based Permissions to limit data visibility to authorised personnel only. 
  • Regular Security Audits and compliance checks. 
  • Incident Response protocols to investigate and address any suspected data breaches. 
  1. 10. Your Privacy Choices and Rights 

  1. 10.1. Your Rights 

  • Access Information 
 

You have the right to access information we hold about you. 

  • Correct Information 

You have the right to correct any inaccurate personal data about you. 

  • Object to Profiling 

You can object to us using your data for profiling or making automated decisions about you. 

  • Data Portability 

You have the right to port your data to another service. 

  • Right to Be Forgotten 

You have the right to be forgottenby us. 

  • Lodge a Complaint 

You have the right to lodge a complaint regarding our use of your data. 

  1. 10.2. Privacy Choices 

  • Choose Not to Provide Personal Data 

You can continue to use the website without disclosing your personal data, but we will not be able to process required transactions. 

  • Turn Off Cookies 

You can turn off cookies in your browser settings, but some services may not work effectively. 

To exercise these rights, please contact us at dpo@firehouse.technology. 

  1. 11. Data Breach Response 

In the event of a suspected or confirmed data breach, we will: 

  • Investigate Promptly: Determine the nature and extent of the breach. 
  • Notify: Inform affected individuals and relevant authorities where required by law. 
  • Mitigate: Take immediate action to contain the breach and prevent further damage. 
  1. 12. Use of Client Data 

  1. 12.1. Commitment to Purpose-Limited Data Utilisation 

In our unwavering commitment to the trust and privacy of our clients, Firehouse Technology strictly adheres to the principle of purpose-limited data utilisation. We hereby affirm that: 

  • Exclusive Use for Intended Purposes: All client data collected, processed, or handled by Firehouse Technology is used exclusively for the purposes for which it was originally intended, as explicitly communicated to and agreed upon by our clients. This includes, but is not limited to, the provision of our services, improvement of user experience, and compliance with legal obligations. 
  • Prohibition of Secondary Use: Under no circumstances will client data be utilised for secondary or unrelated purposes without the explicit and informed consent of the client. This encompasses a prohibition on the sale, transfer, or use of client data for external marketing, research, or any commercial activities not directly related to the agreed-upon services. 
  • Safeguards and Compliance: We implement rigorous safeguards and compliance measures to ensure that all team members, processes, and technologies align with this commitment. Regular audits and reviews are conducted to verify adherence to this principle. 
  • Transparency and Accountability: Firehouse Technology maintains a policy of transparency with our clients regarding data utilisation practices. Any changes to the purpose of data usage will be communicated promptly and will require explicit client consent. 
  • Client Empowerment: Clients reserve the right to inquire about the specific uses of their data, request limitations on data utilisation, or withdraw consent for certain uses, in accordance with applicable data protection laws and regulations. 

By integrating this clause into our Privacy Policy, we reinforce our dedication to ethical data practices and the protection of our clientsprivacy and trust. 

  1. 13. Changes to This Privacy Policy 

We may update this Privacy Policy periodically to reflect changes in our services, operational practices, or legal/regulatory obligations. We will post the updated policy on our website and revise the Last Updateddate accordingly. 

  1. 14. Contact Us 

For any questions, concerns, or to exercise your data protection rights, please reach out to our Data Protection Officer (DPO) Vimarsha Jayawickrama at: 

Email: dpo@firehouse.technology 
Address:  Australia    – 28 Dequetteville Terrace, Kent Town SA 5067.   

Sri Lanaka – 94/1, Srimath Anagarika Dharmapala Mawatha, Colombo 7. 

Thank you for placing your trust in Firehouse Technology. We remain dedicated to protecting your privacy and providing secure, innovative solutions to help you navigate the digital world. 

“Changes to This Privacy Policy” 
We may update this Privacy Policy from time to time to reflect changes in our practices, legal requirements, or other operational reasons. Any updates will be posted on this page, and we will revise the “Last Updated” date accordingly. We encourage you to review this Privacy Policy periodically to stay informed about how we collect, use, and protect your information. Your continued use of our services after any modifications to this policy constitutes your acknowledgment and acceptance of those changes. 

Appendices 

 

Appendix A: Key Security Measures 

Security Measure 

Description 

Role-Based Access Control 

Ensures only authorised individuals access specific information 

Regular Security Audits 

Conducted to ensure ongoing integrity of our systems 

Data Backups 

Regular backups ensure data integrity and availability 

Compliance Updates 

Team stays updated on laws and regulations affecting data security 

Appendix B: Data Collection Overview 

Type of Data 

How Its Collected 

Purpose 

Contact Details 

Forms, registrations, direct input 

Communication, service provision, GDPR 

Account Information 

Automatic collection, direct input 

Service management, security, analytics 

Usage Data 

Automatic collection 

Performance monitoring, feature improvement 

Content from Services 

User-generated content 

Service provision, user experience enhancement 

Survey and Event Data 

Voluntary input 

Market research, feedback, event management 

Employment Applications 

Direct input 

Recruitment 

Website Browsing Data 

Automatic collection 

Website functionality, user experience improvement