Privacy Protocols
Compliance & Infrastructure Agency
Effective Date: 15 January 2026
1. Introduction
These Privacy Protocols explain how Compliance & Infrastructure Agency (“CIA”, “we”, “us”, “our”) collects, stores, protects, and uses Personal Information. As a digital operations, compliance, and systems-deployment agency, we recognise the importance of safeguarding all information entrusted to us.
By accessing our website, landing pages, digital funnels, forms, systems, or by interacting with CIA in any capacity, you acknowledge that you have read, understood, and agreed to these Protocols. These Protocols apply to all visitors, leads, applicants, clients, and authorised users of our services, regardless of geographic location.
CIA operates as a remote-first Australian agency, and all information handling is governed by the laws of Queensland, Australia. We implement industry-standard privacy, security, and data-handling practices suitable for both small businesses and enterprise-level organisations.
2. Definitions
To ensure clarity and prevent any ambiguity, CIA uses the following definitions throughout these Protocols:
“Agency” / “CIA”
Refers to Compliance & Infrastructure Agency, including its Tech Ops team members, contractors, and authorised representatives.
“Systems”
Refers to any digital workflows, operational frameworks, dashboards, templates, structures, or systemised deployments created or configured by CIA. Examples include—but are not limited to—the Mission Dispatch Grid, Field Intel Uplink, Asset Tracking Matrix, Onboarding Pipeline, Competency Vault, Vehicle Inspection Protocol, and any custom operational system designed for a client.
“Workspace”
A secure digital environment configured for a client within a software platform selected by either the CIA or the client. Workspaces may include dashboards, forms, workflows, user permissions, and operational modules.
“Personal Information”
Any information that identifies, or could reasonably identify, an individual, including but not limited to names, contact details, behavioural data, and digital identifiers.
“Client Data”
Operational or business information provided by a client or their authorised representatives. This may include organisational processes, workflows, asset information, staff data, job site information, vehicle details, or training requirements. Client Data remains the property of the client at all times.
“Third-Party Tools”
External digital platforms, cloud-based services, or software applications that the CIA uses to deliver its services. These may include workforce tools, workflow automation systems, form collection platforms, communications tools, email services, payment processors, analytics platforms, accounting software, and secure storage environments. (CIA does not publicly name or endorse these tools in legal documents.)
“Engagement”
Any interaction with CIA—including visiting our website, submitting a form, joining a waiting list, booking a call, entering into an agreement, completing onboarding, or accessing any of our digital systems.
3. What information do we collect
CIA collects information for operational, communication, and service-delivery purposes. We only collect what is reasonably necessary.
3.1 Personal Information
This includes but is not limited to:
Names and contact details
Phone numbers
Email addresses
Business information
Position or role within an organisation
Application form responses
Interaction preferences
This information is collected when users join waiting lists, submit inquiry forms, book calls, complete onboarding questionnaires, interact with our funnels, or communicate with us directly.
3.2 Operational Information
This information is typically collected after a client enters into a formal Engagement and is required for system setup:
Workflow documentation
Team lists and structure
Vehicle and asset information
Training materials
Internal procedures
Job site details
Operational challenges
Compliance requirements
Company checklists and SOPs
This data is considered Client Data and is used strictly for operational delivery.
3.3 Usage & Technical Information
We may automatically collect technical information through digital platforms, including:
IP address
Device identifiers
Browser type and version
Interaction behaviour
Funnel navigation
Time on page
Region or approximate location
This helps the CIA optimise performance, security, user experience, and service improvement.
3.4 Payment Information
Payment data is handled by secure third-party processors.
CIA does not store credit card numbers or financial credentials.
4. How we collect information
CIA collects information through various digital and operational touchpoints, including:
Website and landing page forms
Waiting list submissions
Intake questionnaires
Application funnels
Digital onboarding procedures
Email interactions
Strategy or discovery calls
Training registrations
Surveys or assessments
System configuration activities
Secure client uploads
Third-Party Tools used to support service delivery
CIA collects information only when you voluntarily provide it or when required for contractual and operational purposes.
5. How we use information
CIA uses collected information for purposes including:
Reviewing waiting list applications
Determining service suitability
Communicating with leads and clients
Deploying operational Systems
Setting up digital Workspaces
Assigning tasks to Tech Ops
Configuring user access and permissions
Delivering training or onboarding materials
Improving overall service quality
Providing customer support
Handling billing and account-related communication
Ensuring compliance with relevant laws
We use Personal Information exclusively for service delivery and administrative communication.
You may unsubscribe from marketing messages at any time. CIA does not use collected information
to make automated decisions that produce legal or similarly significant effects on individuals.
6. How we store & Protect information
CIA uses a secure digital infrastructure to ensure the confidentiality and integrity of all information collected.
We apply:
Encrypted storage environments
Password-protected access
Strict role-based access controls
Access logs and monitoring
Secure communication channels
Cloud-based backup and redundancy
Internal audits and access reviews
CIA Tech Ops personnel only access information required for operational tasks and strictly on a need-to-know basis. No physical documents are stored.
7. Disclosure to Third-Parties
CIA may disclose limited data to external service providers when necessary to support our operations.
These disclosures may involve:
Workspace configuration
Workflow automation
Communication processes
Payment handling
Data storage
System hosting
Analytics or optimisation
Administrative or operational support
CIA does:
Only share data required for delivery
Ensure providers follow appropriate security practices
Refrain from publicly naming third-party platforms
Never sell Personal Information
Each provider maintains its own privacy practices and policies.
8. International Data Transfers
Some Third-Party Tools used by the CIA may store or process data in jurisdictions outside Australia.
By engaging with CIA, you consent to such transfers where permitted by:
Australian Privacy Act 1988 (Cth)
Australian Privacy Principles (APPs)
GDPR (where applicable)
CCPA/CPRA (where applicable)
CIA ensures that reasonable measures are taken to protect the integrity of any transferred data.
9. Your Rights
You have the right to:
Request access to your Personal Information
Request correction of inaccurate or incomplete information
Request deletion or restriction of information, subject to legal, contractual, and operational requirements.
Request copies of your information
Object to certain processing activities
Withdraw communication consent
Request limitations on processing
Requests must be submitted to: support@ciaops.co
CIA may require identity verification to process your request for security reasons.
10. Data Retention
CIA retains information based on operational and legal requirements:
Lead and applicant data: retained for 24 months
Client Data: retained for the duration of Engagement + 36 months
Contractual and financial records: retained for 7 years (legal requirement)
Information may be anonymised for research or analytics purposes.
11. Children's Privacy
CIA does not knowingly engage with, market to, or provide services to individuals under 18. We do not knowingly collect data from minors.
12. Updates to these Protocols
CIA may amend these Privacy Protocols as our services, legal requirements, or internal processes evolve.
Any updates will be published with a revised “Effective Date.”
Your continued use of CIA services after changes are published constitutes acceptance of the updated Protocols.
13. Contact Us
For all inquiries relating to privacy, data handling, or these Protocols, contact:
Compliance & Infrastructure Agency (CIA)
Governing Jurisdiction: Queensland, Australia