Privacy Protocols

Compliance & Infrastructure Agency

Effective Date: 15 January 2026

1. Introduction

These Privacy Protocols explain how Compliance & Infrastructure Agency (“CIA”, “we”, “us”, “our”) collects, stores, protects, and uses Personal Information. As a digital operations, compliance, and systems-deployment agency, we recognise the importance of safeguarding all information entrusted to us.

By accessing our website, landing pages, digital funnels, forms, systems, or by interacting with CIA in any capacity, you acknowledge that you have read, understood, and agreed to these Protocols. These Protocols apply to all visitors, leads, applicants, clients, and authorised users of our services, regardless of geographic location.

CIA operates as a remote-first Australian agency, and all information handling is governed by the laws of Queensland, Australia. We implement industry-standard privacy, security, and data-handling practices suitable for both small businesses and enterprise-level organisations.

2. Definitions

To ensure clarity and prevent any ambiguity, CIA uses the following definitions throughout these Protocols:

“Agency” / “CIA”
Refers to Compliance & Infrastructure Agency, including its Tech Ops team members, contractors, and authorised representatives.

“Systems”
Refers to any digital workflows, operational frameworks, dashboards, templates, structures, or systemised deployments created or configured by CIA. Examples include—but are not limited to—the Mission Dispatch Grid, Field Intel Uplink, Asset Tracking Matrix, Onboarding Pipeline, Competency Vault, Vehicle Inspection Protocol, and any custom operational system designed for a client.

“Workspace”
A secure digital environment configured for a client within a software platform selected by either the CIA or the client. Workspaces may include dashboards, forms, workflows, user permissions, and operational modules.

“Personal Information”
Any information that identifies, or could reasonably identify, an individual, including but not limited to names, contact details, behavioural data, and digital identifiers.

“Client Data”
Operational or business information provided by a client or their authorised representatives. This may include organisational processes, workflows, asset information, staff data, job site information, vehicle details, or training requirements. Client Data remains the property of the client at all times.

“Third-Party Tools”
External digital platforms, cloud-based services, or software applications that the CIA uses to deliver its services. These may include workforce tools, workflow automation systems, form collection platforms, communications tools, email services, payment processors, analytics platforms, accounting software, and secure storage environments. (CIA does not publicly name or endorse these tools in legal documents.)

“Engagement”
Any interaction with CIA—including visiting our website, submitting a form, joining a waiting list, booking a call, entering into an agreement, completing onboarding, or accessing any of our digital systems.

3. What information do we collect

CIA collects information for operational, communication, and service-delivery purposes. We only collect what is reasonably necessary.

3.1 Personal Information

This includes but is not limited to:

  • Names and contact details

  • Phone numbers

  • Email addresses

  • Business information

  • Position or role within an organisation

  • Application form responses

  • Interaction preferences

This information is collected when users join waiting lists, submit inquiry forms, book calls, complete onboarding questionnaires, interact with our funnels, or communicate with us directly.

3.2 Operational Information

This information is typically collected after a client enters into a formal Engagement and is required for system setup:

  • Workflow documentation

  • Team lists and structure

  • Vehicle and asset information

  • Training materials

  • Internal procedures

  • Job site details

  • Operational challenges

  • Compliance requirements

  • Company checklists and SOPs

This data is considered Client Data and is used strictly for operational delivery.

3.3 Usage & Technical Information

We may automatically collect technical information through digital platforms, including:

  • IP address

  • Device identifiers

  • Browser type and version

  • Interaction behaviour

  • Funnel navigation

  • Time on page

  • Region or approximate location

This helps the CIA optimise performance, security, user experience, and service improvement.

3.4 Payment Information

Payment data is handled by secure third-party processors.

CIA does not store credit card numbers or financial credentials.

4. How we collect information

CIA collects information through various digital and operational touchpoints, including:

  • Website and landing page forms

  • Waiting list submissions

  • Intake questionnaires

  • Application funnels

  • Digital onboarding procedures

  • Email interactions

  • Strategy or discovery calls

  • Training registrations

  • Surveys or assessments

  • System configuration activities

  • Secure client uploads

  • Third-Party Tools used to support service delivery

CIA collects information only when you voluntarily provide it or when required for contractual and operational purposes.

5. How we use information

CIA uses collected information for purposes including:

  • Reviewing waiting list applications

  • Determining service suitability

  • Communicating with leads and clients

  • Deploying operational Systems

  • Setting up digital Workspaces

  • Assigning tasks to Tech Ops

  • Configuring user access and permissions

  • Delivering training or onboarding materials

  • Improving overall service quality

  • Providing customer support

  • Handling billing and account-related communication

  • Ensuring compliance with relevant laws

We use Personal Information exclusively for service delivery and administrative communication.
You may unsubscribe from marketing messages at any time. CIA does not use collected information

to make automated decisions that produce legal or similarly significant effects on individuals.

6. How we store & Protect information

CIA uses a secure digital infrastructure to ensure the confidentiality and integrity of all information collected.

We apply:

  • Encrypted storage environments

  • Password-protected access

  • Strict role-based access controls

  • Access logs and monitoring

  • Secure communication channels

  • Cloud-based backup and redundancy

  • Internal audits and access reviews

CIA Tech Ops personnel only access information required for operational tasks and strictly on a need-to-know basis. No physical documents are stored.

7. Disclosure to Third-Parties

CIA may disclose limited data to external service providers when necessary to support our operations.

These disclosures may involve:

  • Workspace configuration

  • Workflow automation

  • Communication processes

  • Payment handling

  • Data storage

  • System hosting

  • Analytics or optimisation

  • Administrative or operational support

CIA does:

  • Only share data required for delivery

  • Ensure providers follow appropriate security practices

  • Refrain from publicly naming third-party platforms

  • Never sell Personal Information

Each provider maintains its own privacy practices and policies.

8. International Data Transfers

Some Third-Party Tools used by the CIA may store or process data in jurisdictions outside Australia.

By engaging with CIA, you consent to such transfers where permitted by:

  • Australian Privacy Act 1988 (Cth)

  • Australian Privacy Principles (APPs)

  • GDPR (where applicable)

  • CCPA/CPRA (where applicable)

CIA ensures that reasonable measures are taken to protect the integrity of any transferred data.

9. Your Rights

You have the right to:

  • Request access to your Personal Information

  • Request correction of inaccurate or incomplete information

  • Request deletion or restriction of information, subject to legal, contractual, and operational requirements.

  • Request copies of your information

  • Object to certain processing activities

  • Withdraw communication consent

  • Request limitations on processing

Requests must be submitted to: support@ciaops.co

CIA may require identity verification to process your request for security reasons.

10. Data Retention

CIA retains information based on operational and legal requirements:

  • Lead and applicant data: retained for 24 months

  • Client Data: retained for the duration of Engagement + 36 months

  • Contractual and financial records: retained for 7 years (legal requirement)

Information may be anonymised for research or analytics purposes.

11. Children's Privacy

CIA does not knowingly engage with, market to, or provide services to individuals under 18. We do not knowingly collect data from minors.

12. Updates to these Protocols

CIA may amend these Privacy Protocols as our services, legal requirements, or internal processes evolve.

Any updates will be published with a revised “Effective Date.”

Your continued use of CIA services after changes are published constitutes acceptance of the updated Protocols.

13. Contact Us

For all inquiries relating to privacy, data handling, or these Protocols, contact:

support@ciaops.co


Compliance & Infrastructure Agency (CIA)
Governing Jurisdiction: Queensland, Australia