Legal

Disclaimer & Cookie Policy

 

Hi-Key Resources Pty. Limited
PO Box 343, Vermont VIC 3133
Australia
Director: Tom Debney
Phone: +49 (0) 9072 71 82 918
E-Mail: support@hikey-resources.com
Registered in: Australian Securities and Investments Commission, Sydney, Australia
Company No.: ACN603178276

Branch establishment in Germany:
HiKey Resources UG
Kolpingstr. 5
89415 Lauingen
Managing Director/Director: Georg Petrich
Phone: +49 (0) 9072 71 82 918
E-Mail: support@hikey-resources.com
Internet: https://hikey-resources.com
Commercial register: Augsburg
Registration number: HRB 30827

 

Professional liability insurance
Chubb Insurance Australia Limited, Citigroup Centre, Level 29, 2 Park Street Sydney, NSW 2000, Australia
Territorial application: In the entire territory of the European Union and the states of the agreement in the European Economic Area

Umsatzsteuer-Identifikationsnummer (VAT identification number) according to § 27a of the Umsatzsteuergesetz (UStG, Sales Tax Law): DE308433646

Responsible for contents according to § 55 Rundfunkstaatsvertrag (RStV, Broadcast Services State Treaty): Georg Petrich, HiKey Resources UG, Kolpingstr. 5, 89415 Lauingen, Germany

Document produced and updated by janolaw AG.

Privacy Policy

Privacy Policy
We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of the HiKey Resources UG. The use of the Internet pages of the HiKey Resources UG is possible without any indication of personal data; however, if a data subject wants to use special enterprise services via our website, processing of personal data could become necessary. If the processing of personal data is necessary and there is no statutory basis for such processing, we generally obtain consent from the data subject.

The processing of personal data, such as the name, address, e-mail address, or telephone number of a data subject shall always be in line with the General Data Protection Regulation (GDPR), and in accordance with the country-specific data protection regulations applicable to the HiKey Resources UG. By means of this data protection declaration, our enterprise would like to inform the general public of the nature, scope, and purpose of the personal data we collect, use and process. Furthermore, data subjects are informed, by means of this data protection declaration, of the rights to which they are entitled.

As the controller, the HiKey Resources UG has implemented numerous technical and organizational measures to ensure the most complete protection of personal data processed through this website. However, Internet-based data transmissions may in principle have security gaps, so absolute protection may not be guaranteed. For this reason, every data subject is free to transfer personal data to us via alternative means, e.g. by telephone.

1. Definitions
The data protection declaration of the HiKey Resources UG is based on the terms used by the European legislator for the adoption of the General Data Protection Regulation (GDPR). Our data protection declaration should be legible and understandable for the general public, as well as our customers and business partners. To ensure this, we would like to first explain the terminology used.

In this data protection declaration, we use, inter alia, the following terms:

a) Personal data
Personal data means any information relating to an identified or identifiable natural person (“data subject”). An identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.

b) Data subject
Data subject is any identified or identifiable natural person, whose personal data is processed by the controller responsible for the processing.

c) Processing
Processing is any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.

d) Restriction of processing
Restriction of processing is the marking of stored personal data with the aim of limiting their processing in the future.

e) Profiling
Profiling means any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyse or predict aspects concerning that natural person’s performance at work, economic situation, health, personal preferences, interests, reliability, behaviour, location or movements.

f) Pseudonymisation
Pseudonymisation is the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organisational measures to ensure that the personal data are not attributed to an identified or identifiable natural person.

g) Controller or controller responsible for the processing
Controller or controller responsible for the processing is the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the purposes and means of such processing are determined by Union or Member State law, the controller or the specific criteria for its nomination may be provided for by Union or Member State law.

h) Processor
Processor is a natural or legal person, public authority, agency or other body which processes personal data on behalf of the controller.

i) Recipient
Recipient is a natural or legal person, public authority, agency or another body, to which the personal data are disclosed, whether a third party or not. However, public authorities which may receive personal data in the framework of a particular inquiry in accordance with Union or Member State law shall not be regarded as recipients; the processing of those data by those public authorities shall be in compliance with the applicable data protection rules according to the purposes of the processing.

j) Third party
Third party is a natural or legal person, public authority, agency or body other than the data subject, controller, processor and persons who, under the direct authority of the controller or processor, are authorised to process personal data.

k) Consent
Consent of the data subject is any freely given, specific, informed and unambiguous indication of the data subject’s wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her.

2. Name and Address of the controller
Controller for the purposes of the General Data Protection Regulation (GDPR), other data protection laws applicable in Member states of the European Union and other provisions related to data protection is:

HiKey Resources UG

Kolpingstrasse 5

89415 Lauingen

Germany

Phone: +49 (0) 9072 71 82 885

Email: info@hikey-resources.com

Website: https://hikey-resources.com

3. Name and Address of the Data Protection Officer
The Data Protection Officer of the controller is:

Heiko Maniero

DGD Deutsche Gesellschaft für Datenschutz GmbH

Fraunhoferring 3

85238 Petershausen

Germany

Phone: +49 (0) 8131 77 98 70

Email: info@dg-datenschutz.de

Website: https://dg-datenschutz.de

Any data subject may, at any time, contact our Data Protection Officer directly with all questions and suggestions concerning data protection.

4. Collection of general data and information
The website of the HiKey Resources UG collects a series of general data and information when a data subject or automated system calls up the website. This general data and information are stored in the server log files. Collected may be (1) the browser types and versions used, (2) the operating system used by the accessing system, (3) the website from which an accessing system reaches our website (so-called referrers), (4) the sub-websites, (5) the date and time of access to the Internet site, (6) an Internet protocol address (IP address), (7) the Internet service provider of the accessing system, and (8) any other similar data and information that may be used in the event of attacks on our information technology systems.

When using these general data and information, the HiKey Resources UG does not draw any conclusions about the data subject. Rather, this information is needed to (1) deliver the content of our website correctly, (2) optimize the content of our website as well as its advertisement, (3) ensure the long-term viability of our information technology systems and website technology, and (4) provide law enforcement authorities with the information necessary for criminal prosecution in case of a cyber-attack. Therefore, the HiKey Resources UG analyzes anonymously collected data and information statistically, with the aim of increasing the data protection and data security of our enterprise, and to ensure an optimal level of protection for the personal data we process. The anonymous data of the server log files are stored separately from all personal data provided by a data subject.

5. Subscription to our newsletters
On the website of the HiKey Resources UG, users are given the opportunity to subscribe to our enterprise’s newsletter. The input mask used for this purpose determines what personal data are transmitted, as well as when the newsletter is ordered from the controller.

The HiKey Resources UG informs its customers and business partners regularly by means of a newsletter about enterprise offers. The enterprise’s newsletter may only be received by the data subject if (1) the data subject has a valid e-mail address and (2) the data subject registers for the newsletter shipping. A confirmation e-mail will be sent to the e-mail address registered by a data subject for the first time for newsletter shipping, for legal reasons, in the double opt-in procedure. This confirmation e-mail is used to prove whether the owner of the e-mail address as the data subject is authorized to receive the newsletter.

During the registration for the newsletter, we also store the IP address of the computer system assigned by the Internet service provider (ISP) and used by the data subject at the time of the registration, as well as the date and time of the registration. The collection of this data is necessary in order to understand the (possible) misuse of the e-mail address of a data subject at a later date, and it therefore serves the aim of the legal protection of the controller.

The personal data collected as part of a registration for the newsletter will only be used to send our newsletter. In addition, subscribers to the newsletter may be informed by e-mail, as long as this is necessary for the operation of the newsletter service or a registration in question, as this could be the case in the event of modifications to the newsletter offer, or in the event of a change in technical circumstances. There will be no transfer of personal data collected by the newsletter service to third parties. The subscription to our newsletter may be terminated by the data subject at any time. The consent to the storage of personal data, which the data subject has given for shipping the newsletter, may be revoked at any time. For the purpose of revocation of consent, a corresponding link is found in each newsletter. It is also possible to unsubscribe from the newsletter at any time directly on the website of the controller, or to communicate this to the controller in a different way.

6. Newsletter-Tracking
The newsletter of the HiKey Resources UG contains so-called tracking pixels. A tracking pixel is a miniature graphic embedded in such e-mails, which are sent in HTML format to enable log file recording and analysis. This allows a statistical analysis of the success or failure of online marketing campaigns. Based on the embedded tracking pixel, the HiKey Resources UG may see if and when an e-mail was opened by a data subject, and which links in the e-mail were called up by data subjects.

Such personal data collected in the tracking pixels contained in the newsletters are stored and analyzed by the controller in order to optimize the shipping of the newsletter, as well as to adapt the content of future newsletters even better to the interests of the data subject. These personal data will not be passed on to third parties. Data subjects are at any time entitled to revoke the respective separate declaration of consent issued by means of the double-opt-in procedure. After a revocation, these personal data will be deleted by the controller. The HiKey Resources UG automatically regards a withdrawal from the receipt of the newsletter as a revocation.

7. Contact possibility via the website
The website of the HiKey Resources UG contains information that enables a quick electronic contact to our enterprise, as well as direct communication with us, which also includes a general address of the so-called electronic mail (e-mail address). If a data subject contacts the controller by e-mail or via a contact form, the personal data transmitted by the data subject are automatically stored. Such personal data transmitted on a voluntary basis by a data subject to the data controller are stored for the purpose of processing or contacting the data subject. There is no transfer of this personal data to third parties.

8. Comments function in the blog on the website
The HiKey Resources UG offers users the possibility to leave individual comments on individual blog contributions on a blog, which is on the website of the controller. A blog is a web-based, publicly-accessible portal, through which one or more people called bloggers or web-bloggers may post articles or write down thoughts in so-called blogposts. Blogposts may usually be commented by third parties.

If a data subject leaves a comment on the blog published on this website, the comments made by the data subject are also stored and published, as well as information on the date of the commentary and on the user’s (pseudonym) chosen by the data subject. In addition, the IP address assigned by the Internet service provider (ISP) to the data subject is also logged. This storage of the IP address takes place for security reasons, and in case the data subject violates the rights of third parties, or posts illegal content through a given comment. The storage of these personal data is, therefore, in the own interest of the data controller, so that he can exculpate in the event of an infringement. This collected personal data will not be passed to third parties, unless such a transfer is required by law or serves the aim of the defense of the data controller.

9. Subscription to comments in the blog on the website
The comments made in the blog of the HiKey Resources UG may be subscribed to by third parties. In particular, there is the possibility that a commenter subscribes to the comments following his comments on a particular blog post.

If a data subject decides to subscribe to the option, the controller will send an automatic confirmation e-mail to check the double opt-in procedure as to whether the owner of the specified e-mail address decided in favor of this option. The option to subscribe to comments may be terminated at any time.

10. Routine erasure and blocking of personal data
The data controller shall process and store the personal data of the data subject only for the period necessary to achieve the purpose of storage, or as far as this is granted by the European legislator or other legislators in laws or regulations to which the controller is subject to.

If the storage purpose is not applicable, or if a storage period prescribed by the European legislator or another competent legislator expires, the personal data are routinely blocked or erased in accordance with legal requirements.

11. Rights of the data subject
a) Right of confirmation
Each data subject shall have the right granted by the European legislator to obtain from the controller the confirmation as to whether or not personal data concerning him or her are being processed. If a data subject wishes to avail himself of this right of confirmation, he or she may, at any time, contact any employee of the controller.

b) Right of access
Each data subject shall have the right granted by the European legislator to obtain from the controller free information about his or her personal data stored at any time and a copy of this information. Furthermore, the European directives and regulations grant the data subject access to the following information:

the purposes of the processing;
the categories of personal data concerned;
the recipients or categories of recipients to whom the personal data have been or will be disclosed, in particular recipients in third countries or international organisations;
where possible, the envisaged period for which the personal data will be stored, or, if not possible, the criteria used to determine that period;
the existence of the right to request from the controller rectification or erasure of personal data, or restriction of processing of personal data concerning the data subject, or to object to such processing;
the existence of the right to lodge a complaint with a supervisory authority;
where the personal data are not collected from the data subject, any available information as to their source;
the existence of automated decision-making, including profiling, referred to in Article 22(1) and (4) of the GDPR and, at least in those cases, meaningful information about the logic involved, as well as the significance and envisaged consequences of such processing for the data subject.
Furthermore, the data subject shall have a right to obtain information as to whether personal data are transferred to a third country or to an international organisation. Where this is the case, the data subject shall have the right to be informed of the appropriate safeguards relating to the transfer.

If a data subject wishes to avail himself of this right of access, he or she may, at any time, contact any employee of the controller.

c) Right to rectification
Each data subject shall have the right granted by the European legislator to obtain from the controller without undue delay the rectification of inaccurate personal data concerning him or her. Taking into account the purposes of the processing, the data subject shall have the right to have incomplete personal data completed, including by means of providing a supplementary statement.

If a data subject wishes to exercise this right to rectification, he or she may, at any time, contact any employee of the controller.

d) Right to erasure (Right to be forgotten)
Each data subject shall have the right granted by the European legislator to obtain from the controller the erasure of personal data concerning him or her without undue delay, and the controller shall have the obligation to erase personal data without undue delay where one of the following grounds applies, as long as the processing is not necessary:

The personal data are no longer necessary in relation to the purposes for which they were collected or otherwise processed.
The data subject withdraws consent to which the processing is based according to point (a) of Article 6(1) of the GDPR, or point (a) of Article 9(2) of the GDPR, and where there is no other legal ground for the processing.
The data subject objects to the processing pursuant to Article 21(1) of the GDPR and there are no overriding legitimate grounds for the processing, or the data subject objects to the processing pursuant to Article 21(2) of the GDPR.
The personal data have been unlawfully processed.
The personal data must be erased for compliance with a legal obligation in Union or Member State law to which the controller is subject.
The personal data have been collected in relation to the offer of information society services referred to in Article 8(1) of the GDPR.
If one of the aforementioned reasons applies, and a data subject wishes to request the erasure of personal data stored by the HiKey Resources UG, he or she may, at any time, contact any employee of the controller. An employee of HiKey Resources UG shall promptly ensure that the erasure request is complied with immediately.

Where the controller has made personal data public and is obliged pursuant to Article 17(1) to erase the personal data, the controller, taking account of available technology and the cost of implementation, shall take reasonable steps, including technical measures, to inform other controllers processing the personal data that the data subject has requested erasure by such controllers of any links to, or copy or replication of, those personal data, as far as processing is not required. An employees of the HiKey Resources UG will arrange the necessary measures in individual cases.

e) Right of restriction of processing
Each data subject shall have the right granted by the European legislator to obtain from the controller restriction of processing where one of the following applies:

The accuracy of the personal data is contested by the data subject, for a period enabling the controller to verify the accuracy of the personal data.
The processing is unlawful and the data subject opposes the erasure of the personal data and requests instead the restriction of their use instead.
The controller no longer needs the personal data for the purposes of the processing, but they are required by the data subject for the establishment, exercise or defence of legal claims.
The data subject has objected to processing pursuant to Article 21(1) of the GDPR pending the verification whether the legitimate grounds of the controller override those of the data subject.
If one of the aforementioned conditions is met, and a data subject wishes to request the restriction of the processing of personal data stored by the HiKey Resources UG, he or she may at any time contact any employee of the controller. The employee of the HiKey Resources UG will arrange the restriction of the processing.

f) Right to data portability
Each data subject shall have the right granted by the European legislator, to receive the personal data concerning him or her, which was provided to a controller, in a structured, commonly used and machine-readable format. He or she shall have the right to transmit those data to another controller without hindrance from the controller to which the personal data have been provided, as long as the processing is based on consent pursuant to point (a) of Article 6(1) of the GDPR or point (a) of Article 9(2) of the GDPR, or on a contract pursuant to point (b) of Article 6(1) of the GDPR, and the processing is carried out by automated means, as long as the processing is not necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller.

Furthermore, in exercising his or her right to data portability pursuant to Article 20(1) of the GDPR, the data subject shall have the right to have personal data transmitted directly from one controller to another, where technically feasible and when doing so does not adversely affect the rights and freedoms of others.

In order to assert the right to data portability, the data subject may at any time contact any employee of the HiKey Resources UG.

g) Right to object
Each data subject shall have the right granted by the European legislator to object, on grounds relating to his or her particular situation, at any time, to processing of personal data concerning him or her, which is based on point (e) or (f) of Article 6(1) of the GDPR. This also applies to profiling based on these provisions.

The HiKey Resources UG shall no longer process the personal data in the event of the objection, unless we can demonstrate compelling legitimate grounds for the processing which override the interests, rights and freedoms of the data subject, or for the establishment, exercise or defence of legal claims.

If the HiKey Resources UG processes personal data for direct marketing purposes, the data subject shall have the right to object at any time to processing of personal data concerning him or her for such marketing. This applies to profiling to the extent that it is related to such direct marketing. If the data subject objects to the HiKey Resources UG to the processing for direct marketing purposes, the HiKey Resources UG will no longer process the personal data for these purposes.

In addition, the data subject has the right, on grounds relating to his or her particular situation, to object to processing of personal data concerning him or her by the HiKey Resources UG for scientific or historical research purposes, or for statistical purposes pursuant to Article 89(1) of the GDPR, unless the processing is necessary for the performance of a task carried out for reasons of public interest.

In order to exercise the right to object, the data subject may contact any employee of the HiKey Resources UG. In addition, the data subject is free in the context of the use of information society services, and notwithstanding Directive 2002/58/EC, to use his or her right to object by automated means using technical specifications.

h) Automated individual decision-making, including profiling
Each data subject shall have the right granted by the European legislator not to be subject to a decision based solely on automated processing, including profiling, which produces legal effects concerning him or her, or similarly significantly affects him or her, as long as the decision (1) is not is necessary for entering into, or the performance of, a contract between the data subject and a data controller, or (2) is not authorised by Union or Member State law to which the controller is subject and which also lays down suitable measures to safeguard the data subject’s rights and freedoms and legitimate interests, or (3) is not based on the data subject’s explicit consent.

If the decision (1) is necessary for entering into, or the performance of, a contract between the data subject and a data controller, or (2) it is based on the data subject’s explicit consent, the HiKey Resources UG shall implement suitable measures to safeguard the data subject’s rights and freedoms and legitimate interests, at least the right to obtain human intervention on the part of the controller, to express his or her point of view and contest the decision.

If the data subject wishes to exercise the rights concerning automated individual decision-making, he or she may, at any time, contact any employee of the HiKey Resources UG.

i) Right to withdraw data protection consent
Each data subject shall have the right granted by the European legislator to withdraw his or her consent to processing of his or her personal data at any time.

If the data subject wishes to exercise the right to withdraw the consent, he or she may, at any time, contact any employee of the HiKey Resources UG.

12. Data protection for applications and the application procedures
The data controller shall collect and process the personal data of applicants for the purpose of the processing of the application procedure. The processing may also be carried out electronically. This is the case, in particular, if an applicant submits corresponding application documents by e-mail or by means of a web form on the website to the controller. If the data controller concludes an employment contract with an applicant, the submitted data will be stored for the purpose of processing the employment relationship in compliance with legal requirements. If no employment contract is concluded with the applicant by the controller, the application documents shall be automatically erased two months after notification of the refusal decision, provided that no other legitimate interests of the controller are opposed to the erasure. Other legitimate interest in this relation is, e.g. a burden of proof in a procedure under the General Equal Treatment Act (AGG).

13. Data protection provisions about the application and use of Facebook
On this website, the controller has integrated components of the enterprise Facebook. Facebook is a social network.

A social network is a place for social meetings on the Internet, an online community, which usually allows users to communicate with each other and interact in a virtual space. A social network may serve as a platform for the exchange of opinions and experiences, or enable the Internet community to provide personal or business-related information. Facebook allows social network users to include the creation of private profiles, upload photos, and network through friend requests.

The operating company of Facebook is Facebook, Inc., 1 Hacker Way, Menlo Park, CA 94025, United States. If a person lives outside of the United States or Canada, the controller is the Facebook Ireland Ltd., 4 Grand Canal Square, Grand Canal Harbour, Dublin 2, Ireland.

With each call-up to one of the individual pages of this Internet website, which is operated by the controller and into which a Facebook component (Facebook plug-ins) was integrated, the web browser on the information technology system of the data subject is automatically prompted to download display of the corresponding Facebook component from Facebook through the Facebook component. An overview of all the Facebook Plug-ins may be accessed under https://developers.facebook.com/docs/plugins/. During the course of this technical procedure, Facebook is made aware of what specific sub-site of our website was visited by the data subject.

If the data subject is logged in at the same time on Facebook, Facebook detects with every call-up to our website by the data subject—and for the entire duration of their stay on our Internet site—which specific sub-site of our Internet page was visited by the data subject. This information is collected through the Facebook component and associated with the respective Facebook account of the data subject. If the data subject clicks on one of the Facebook buttons integrated into our website, e.g. the “Like” button, or if the data subject submits a comment, then Facebook matches this information with the personal Facebook user account of the data subject and stores the personal data.

Facebook always receives, through the Facebook component, information about a visit to our website by the data subject, whenever the data subject is logged in at the same time on Facebook during the time of the call-up to our website. This occurs regardless of whether the data subject clicks on the Facebook component or not. If such a transmission of information to Facebook is not desirable for the data subject, then he or she may prevent this by logging off from their Facebook account before a call-up to our website is made.

The data protection guideline published by Facebook, which is available at https://facebook.com/about/privacy/, provides information about the collection, processing and use of personal data by Facebook. In addition, it is explained there what setting options Facebook offers to protect the privacy of the data subject. In addition, different configuration options are made available to allow the elimination of data transmission to Facebook. These applications may be used by the data subject to eliminate a data transmission to Facebook.

14. Data protection provisions about the application and use of Google Analytics (with anonymization function)
On this website, the controller has integrated the component of Google Analytics (with the anonymizer function). Google Analytics is a web analytics service. Web analytics is the collection, gathering, and analysis of data about the behavior of visitors to websites. A web analysis service collects, inter alia, data about the website from which a person has come (the so-called referrer), which sub-pages were visited, or how often and for what duration a sub-page was viewed. Web analytics are mainly used for the optimization of a website and in order to carry out a cost-benefit analysis of Internet advertising.

The operator of the Google Analytics component is Google Ireland Limited, Gordon House, Barrow Street, Dublin, D04 E5W5, Ireland.

For the web analytics through Google Analytics the controller uses the application “_gat. _anonymizeIp”. By means of this application the IP address of the Internet connection of the data subject is abridged by Google and anonymised when accessing our websites from a Member State of the European Union or another Contracting State to the Agreement on the European Economic Area.

The purpose of the Google Analytics component is to analyze the traffic on our website. Google uses the collected data and information, inter alia, to evaluate the use of our website and to provide online reports, which show the activities on our websites, and to provide other services concerning the use of our Internet site for us.

Google Analytics places a cookie on the information technology system of the data subject. The definition of cookies is explained above. With the setting of the cookie, Google is enabled to analyze the use of our website. With each call-up to one of the individual pages of this Internet site, which is operated by the controller and into which a Google Analytics component was integrated, the Internet browser on the information technology system of the data subject will automatically submit data through the Google Analytics component for the purpose of online advertising and the settlement of commissions to Google. During the course of this technical procedure, the enterprise Google gains knowledge of personal information, such as the IP address of the data subject, which serves Google, inter alia, to understand the origin of visitors and clicks, and subsequently create commission settlements.

The cookie is used to store personal information, such as the access time, the location from which the access was made, and the frequency of visits of our website by the data subject. With each visit to our Internet site, such personal data, including the IP address of the Internet access used by the data subject, will be transmitted to Google in the United States of America. These personal data are stored by Google in the United States of America. Google may pass these personal data collected through the technical procedure to third parties.

The data subject may, as stated above, prevent the setting of cookies through our website at any time by means of a corresponding adjustment of the web browser used and thus permanently deny the setting of cookies. Such an adjustment to the Internet browser used would also prevent Google Analytics from setting a cookie on the information technology system of the data subject. In addition, cookies already in use by Google Analytics may be deleted at any time via a web browser or other software programs.

In addition, the data subject has the possibility of objecting to a collection of data that are generated by Google Analytics, which is related to the use of this website, as well as the processing of this data by Google and the chance to preclude any such. For this purpose, the data subject must download a browser add-on under the link https://tools.google.com/dlpage/gaoptout and install it. This browser add-on tells Google Analytics through a JavaScript, that any data and information about the visits of Internet pages may not be transmitted to Google Analytics. The installation of the browser add-ons is considered an objection by Google. If the information technology system of the data subject is later deleted, formatted, or newly installed, then the data subject must reinstall the browser add-ons to disable Google Analytics. If the browser add-on was uninstalled by the data subject or any other person who is attributable to their sphere of competence, or is disabled, it is possible to execute the reinstallation or reactivation of the browser add-ons.

Further information and the applicable data protection provisions of Google may be retrieved under https://www.google.com/intl/en/policies/privacy/ and under http://www.google.com/analytics/terms/us.html. Google Analytics is further explained under the following Link https://www.google.com/analytics/.

15. Data protection provisions about the application and use of Google+
On this website, the controller has integrated the Google+ button as a component. Google+ is a so-called social network. A social network is a social meeting place on the Internet, an online community, which usually allows users to communicate with each other and interact in a virtual space. A social network may serve as a platform for the exchange of opinions and experiences, or enable the Internet community to provide personal or business-related information. Google+ allows users of the social network to include the creation of private profiles, upload photos and network through friend requests.

The operating company of Google+ is Google Ireland Limited, Gordon House, Barrow Street, Dublin, D04 E5W5, Ireland.

With each call-up to one of the individual pages of this website, which is operated by the controller and on which a Google+ button has been integrated, the Internet browser on the information technology system of the data subject automatically downloads a display of the corresponding Google+ button of Google through the respective Google+ button component. During the course of this technical procedure, Google is made aware of what specific sub-page of our website was visited by the data subject. More detailed information about Google+ is available under https://developers.google.com/+/.

If the data subject is logged in at the same time to Google+, Google recognizes with each call-up to our website by the data subject and for the entire duration of his or her stay on our Internet site, which specific sub-pages of our Internet page were visited by the data subject. This information is collected through the Google+ button and Google matches this with the respective Google+ account associated with the data subject.

If the data subject clicks on the Google+ button integrated on our website and thus gives a Google+ 1 recommendation, then Google assigns this information to the personal Google+ user account of the data subject and stores the personal data. Google stores the Google+ 1 recommendation of the data subject, making it publicly available in accordance with the terms and conditions accepted by the data subject in this regard. Subsequently, a Google+ 1 recommendation given by the data subject on this website together with other personal data, such as the Google+ account name used by the data subject and the stored photo, is stored and processed on other Google services, such as search-engine results of the Google search engine, the Google account of the data subject or in other places, e.g. on Internet pages, or in relation to advertisements. Google is also able to link the visit to this website with other personal data stored on Google. Google further records this personal information with the purpose of improving or optimizing the various Google services.

Through the Google+ button, Google receives information that the data subject visited our website, if the data subject at the time of the call-up to our website is logged in to Google+. This occurs regardless of whether the data subject clicks or doesn’t click on the Google+ button.

If the data subject does not wish to transmit personal data to Google, he or she may prevent such transmission by logging out of his Google+ account before calling up our website.

Further information and the data protection provisions of Google may be retrieved under https://www.google.com/intl/en/policies/privacy/. More references from Google about the Google+ 1 button may be obtained under https://developers.google.com/+/web/buttons-policy.

16. Data protection provisions about the application and use of LinkedIn
The controller has integrated components of the LinkedIn Corporation on this website. LinkedIn is a web-based social network that enables users with existing business contacts to connect and to make new business contacts. Over 400 million registered people in more than 200 countries use LinkedIn. Thus, LinkedIn is currently the largest platform for business contacts and one of the most visited websites in the world.

The operating company of LinkedIn is LinkedIn Corporation, 2029 Stierlin Court Mountain View, CA 94043, UNITED STATES. For privacy matters outside of the UNITED STATES LinkedIn Ireland, Privacy Policy Issues, Wilton Plaza, Wilton Place, Dublin 2, Ireland, is responsible.

With each call-up to one of the individual pages of this Internet site, which is operated by the controller and on which a LinkedIn component (LinkedIn plug-in) was integrated, the Internet browser on the information technology system of the data subject is automatically prompted to the download of a display of the corresponding LinkedIn component of LinkedIn. Further information about the LinkedIn plug-in may be accessed under https://developer.linkedin.com/plugins. During the course of this technical procedure, LinkedIn gains knowledge of what specific sub-page of our website was visited by the data subject.

If the data subject is logged in at the same time on LinkedIn, LinkedIn detects with every call-up to our website by the data subject—and for the entire duration of their stay on our Internet site—which specific sub-page of our Internet page was visited by the data subject. This information is collected through the LinkedIn component and associated with the respective LinkedIn account of the data subject. If the data subject clicks on one of the LinkedIn buttons integrated on our website, then LinkedIn assigns this information to the personal LinkedIn user account of the data subject and stores the personal data.

LinkedIn receives information via the LinkedIn component that the data subject has visited our website, provided that the data subject is logged in at LinkedIn at the time of the call-up to our website. This occurs regardless of whether the person clicks on the LinkedIn button or not. If such a transmission of information to LinkedIn is not desirable for the data subject, then he or she may prevent this by logging off from their LinkedIn account before a call-up to our website is made.

LinkedIn provides under https://www.linkedin.com/psettings/guest-controls the possibility to unsubscribe from e-mail messages, SMS messages and targeted ads, as well as the ability to manage ad settings. LinkedIn also uses affiliates such as Eire, Google Analytics, BlueKai, DoubleClick, Nielsen, Comscore, Eloqua, and Lotame. The setting of such cookies may be denied under https://www.linkedin.com/legal/cookie-policy. The applicable privacy policy for LinkedIn is available under https://www.linkedin.com/legal/privacy-policy. The LinkedIn Cookie Policy is available under https://www.linkedin.com/legal/cookie-policy.

17. Data protection provisions about the application and use of Pinterest
On this website, the controller has integrated components of Pinterest Inc. Pinterest is a so-called social network. A social network is an Internet social meeting place, an online community that allows users to communicate and interact with each other in a virtual space. A social network may serve as a platform for the exchange of opinions and experiences, or allow the Internet community to provide personal or company-related information. Pinterest enables the users of the social network to publish, inter alia, picture collections and individual pictures as well as descriptions on virtual pinboards (so-called pins), which can then be shared by other user’s (so-called re-pins) or commented on.

The operating company of Pinterest is Pinterest Europe Ltd., Palmerston House, 2nd Floor, Fenian Street, Dublin 2,Ireland.

With each call-up to one of the individual pages of this Internet site, which is operated by the controller and on which a Pinterest component (Pinterest plug-in) was integrated, the Internet browser on the information technology system of the data subject automatically prompted to download through the respective Pinterest component a display of the corresponding Pinterest component. Further information on Pinterest is available under https://pinterest.com/. During the course of this technical procedure, Pinterest gains knowledge of what specific sub-page of our website is visited by the data subject.

If the data subject is logged in at the same time on Pinterest, Pinterest detects with every call-up to our website by the data subject—and for the entire duration of their stay on our Internet site—which specific sub-page of our Internet page was visited by the data subject. This information is collected through the Pinterest component and associated with the respective Pinterest account of the data subject. If the data subject clicks on one of the Pinterest buttons, integrated on our website, then Pinterest assigns this information to the personal Pinterest user account of the data subject and stores the personal data.

Pinterest receives information via the Pinterest component that the data subject has visited our website, provided that the data subject is logged in at Pinterest at the time of the call-up to our website. This occurs regardless of whether the person clicks on the Pinterest component or not. If such a transmission of information to Pinterest is not desirable for the data subject, then he or she may prevent this by logging off from their Pinterest account before a call-up to our website is made.

The data protection guideline published by Pinterest, which is available under https://about.pinterest.com/privacy-policy, provides information on the collection, processing and use of personal data by Pinterest.

18. Data protection provisions about the application and use of Tumblr
On this website, the controller has integrated components of Tumblr. Tumblr is a platform that allows users to create and run a blog. A blog is a web-based, generally publicly-accessible portal on which one or more people called bloggers or web bloggers may post articles or write down thoughts in so-called blogposts. For example, in a Tumblr blog the user can publish text, images, links, and videos, and spread them in the digital space. Furthermore, Tumblr users may import content from other websites into their own blog.

The operating company of Tumblr is Oath (EMEA) Limited, 5-7 Point Square, North Wall Quay, Dublin 1, Ireland.

Through each call to one of the individual pages of this Internet site, which is operated by the controller and on which a Tumblr component (Tumblr button) has been integrated, the Internet browser on the information technology system of the data subject causes automatically the download of a display of the corresponding Tumblr component of Tumblr. Learn more about the Tumblr-buttons that are available under https://www.tumblr.com/buttons. During the course of this technical procedure, Tumblr becomes aware of what concrete sub-page of our website was visited by the data subject. The purpose of the integration of the Tumblr component is a retransmission of the contents of this website to allow our users to introduce this web page to the digital world and to increase our visitor numbers.

If the data subject is logged in at Tumblr, Tumblr detects with every call-up to our website by the data subject—and for the entire duration of their stay on our Internet site—which specific sub-page of our Internet page was visited by the data subject. This information is collected through the Tumblr component and associated with the respective Tumblr account of the data subject. If the data subject clicks on one of the Tumblr buttons, integrated on our website, then Tumblr assigns this information to the personal Tumblr user account of the data subject and stores the personal data.

Tumblr receives information via the Tumblr component that the data subject has visited our website, provided that the data subject is logged in at Tumblr at the time of the call-up to our website. This occurs regardless of whether the person clicks on the Tumblr component or not. If such a transfer of information to Tumblr is not desirable for the data subject, then he or she may prevent this by logging off from their Tumblr account before a call-up to our website is made.

The applicable data protection provisions of Tumblr may be accessed under https://www.tumblr.com/policy/en/privacy.

19. Data protection provisions about the application and use of Twitter
On this website, the controller has integrated components of Twitter. Twitter is a multilingual, publicly-accessible microblogging service on which users may publish and spread so-called ‘tweets,’ e.g. short messages, which are limited to 280 characters. These short messages are available for everyone, including those who are not logged on to Twitter. The tweets are also displayed to so-called followers of the respective user. Followers are other Twitter users who follow a user’s tweets. Furthermore, Twitter allows you to address a wide audience via hashtags, links or retweets.

The operating company of Twitter is Twitter International Company, One Cumberland Place, Fenian Street Dublin 2, D02 AX07, Ireland.

With each call-up to one of the individual pages of this Internet site, which is operated by the controller and on which a Twitter component (Twitter button) was integrated, the Internet browser on the information technology system of the data subject is automatically prompted to download a display of the corresponding Twitter component of Twitter. Further information about the Twitter buttons is available under https://about.twitter.com/de/resources/buttons. During the course of this technical procedure, Twitter gains knowledge of what specific sub-page of our website was visited by the data subject. The purpose of the integration of the Twitter component is a retransmission of the contents of this website to allow our users to introduce this web page to the digital world and increase our visitor numbers.

If the data subject is logged in at the same time on Twitter, Twitter detects with every call-up to our website by the data subject and for the entire duration of their stay on our Internet site which specific sub-page of our Internet page was visited by the data subject. This information is collected through the Twitter component and associated with the respective Twitter account of the data subject. If the data subject clicks on one of the Twitter buttons integrated on our website, then Twitter assigns this information to the personal Twitter user account of the data subject and stores the personal data.

Twitter receives information via the Twitter component that the data subject has visited our website, provided that the data subject is logged in on Twitter at the time of the call-up to our website. This occurs regardless of whether the person clicks on the Twitter component or not. If such a transmission of information to Twitter is not desirable for the data subject, then he or she may prevent this by logging off from their Twitter account before a call-up to our website is made.

The applicable data protection provisions of Twitter may be accessed under https://twitter.com/privacy?lang=en.

20. Data protection provisions about the application and use of YouTube
On this website, the controller has integrated components of YouTube. YouTube is an Internet video portal that enables video publishers to set video clips and other users free of charge, which also provides free viewing, review and commenting on them. YouTube allows you to publish all kinds of videos, so you can access both full movies and TV broadcasts, as well as music videos, trailers, and videos made by users via the Internet portal.

The operating company of YouTube is Google Ireland Limited, Gordon House, Barrow Street, Dublin, D04 E5W5, Ireland.

With each call-up to one of the individual pages of this Internet site, which is operated by the controller and on which a YouTube component (YouTube video) was integrated, the Internet browser on the information technology system of the data subject is automatically prompted to download a display of the corresponding YouTube component. Further information about YouTube may be obtained under https://www.youtube.com/yt/about/en/. During the course of this technical procedure, YouTube and Google gain knowledge of what specific sub-page of our website was visited by the data subject.

If the data subject is logged in on YouTube, YouTube recognizes with each call-up to a sub-page that contains a YouTube video, which specific sub-page of our Internet site was visited by the data subject. This information is collected by YouTube and Google and assigned to the respective YouTube account of the data subject.

YouTube and Google will receive information through the YouTube component that the data subject has visited our website, if the data subject at the time of the call to our website is logged in on YouTube; this occurs regardless of whether the person clicks on a YouTube video or not. If such a transmission of this information to YouTube and Google is not desirable for the data subject, the delivery may be prevented if the data subject logs off from their own YouTube account before a call-up to our website is made.

YouTube’s data protection provisions, available at https://www.google.com/intl/en/policies/privacy/, provide information about the collection, processing and use of personal data by YouTube and Google.

21. Legal basis for the processing
Art. 6(1) lit. a GDPR serves as the legal basis for processing operations for which we obtain consent for a specific processing purpose. If the processing of personal data is necessary for the performance of a contract to which the data subject is party, as is the case, for example, when processing operations are necessary for the supply of goods or to provide any other service, the processing is based on Article 6(1) lit. b GDPR. The same applies to such processing operations which are necessary for carrying out pre-contractual measures, for example in the case of inquiries concerning our products or services. Is our company subject to a legal obligation by which processing of personal data is required, such as for the fulfillment of tax obligations, the processing is based on Art. 6(1) lit. c GDPR. In rare cases, the processing of personal data may be necessary to protect the vital interests of the data subject or of another natural person. This would be the case, for example, if a visitor were injured in our company and his name, age, health insurance data or other vital information would have to be passed on to a doctor, hospital or other third party. Then the processing would be based on Art. 6(1) lit. d GDPR. Finally, processing operations could be based on Article 6(1) lit. f GDPR. This legal basis is used for processing operations which are not covered by any of the abovementioned legal grounds, if processing is necessary for the purposes of the legitimate interests pursued by our company or by a third party, except where such interests are overridden by the interests or fundamental rights and freedoms of the data subject which require protection of personal data. Such processing operations are particularly permissible because they have been specifically mentioned by the European legislator. He considered that a legitimate interest could be assumed if the data subject is a client of the controller (Recital 47 Sentence 2 GDPR).

22. The legitimate interests pursued by the controller or by a third party
Where the processing of personal data is based on Article 6(1) lit. f GDPR our legitimate interest is to carry out our business in favor of the well-being of all our employees and the shareholders.

23. Period for which the personal data will be stored
The criteria used to determine the period of storage of personal data is the respective statutory retention period. After expiration of that period, the corresponding data is routinely deleted, as long as it is no longer necessary for the fulfillment of the contract or the initiation of a contract.

24. Provision of personal data as statutory or contractual requirement; Requirement necessary to enter into a contract; Obligation of the data subject to provide the personal data; possible consequences of failure to provide such data
We clarify that the provision of personal data is partly required by law (e.g. tax regulations) or can also result from contractual provisions (e.g. information on the contractual partner). Sometimes it may be necessary to conclude a contract that the data subject provides us with personal data, which must subsequently be processed by us. The data subject is, for example, obliged to provide us with personal data when our company signs a contract with him or her. The non-provision of the personal data would have the consequence that the contract with the data subject could not be concluded. Before personal data is provided by the data subject, the data subject must contact any employee. The employee clarifies to the data subject whether the provision of the personal data is required by law or contract or is necessary for the conclusion of the contract, whether there is an obligation to provide the personal data and the consequences of non-provision of the personal data.

25. Existence of automated decision-making
As a responsible company, we do not use automatic decision-making or profiling.

This Privacy Policy has been generated by the Privacy Policy Generator of the External Data Protection Officers that was developed in cooperation with the Media Law Lawyers from WBS-LAW.

This policy together with our terms of use set out at https://hikey-resources.com/en/legal/#terms-conditions (together our Terms of Use) sets out the terms upon which Hi-Key Resources Pty Limited ACN 603 178 276 of 405/747 of PO Box 343, Vermont VIC 3133, Australia (“we” or “us”) will process any personal information that is collected through the use of the website at www.hikey-resources.com (Web Site), from our industry partners, clients, contractors or directly from you, and applies to your use of:

Time2L software and mobile application (App) is available on Google play or the iTunes Store and once you have downloaded or streamed a copy of the App onto your PC, mobile telephone or handheld device (Device) and registered for use.
Any of the services accessible through the App (Services) that are available on the App Site, Web Site or other sites of ours (Sites), unless the EULA states that a separate privacy policy applies to a particular Service, in which case that privacy policy only applies.
We reserve the right, at our discretion, to modify or remove portions of this policy or the Terms of Use at any time. We do not make any representations about third party web sites that may be linked to the Sites.

We recognise the importance of protecting the privacy of information collected about visitors to our Sites, in particular information that is capable of identifying an individual (personal information). Should we ask you to provide any information by which you can be identified, we assure you that it will only be used in accordance with these Terms of Use and the Australian Privacy Principles.

By proceeding to use our Sites or Services, you consent that we may process the personal information (including sensitive personal information) that we collect from you in accordance with our Terms of Use.

Our Terms of Use may be updated from time to time and should be reviewed periodically so that you are updated on any changes. If you think our Terms of Use fall short of your expectations or that we are failing to abide by our policy, do please tell us. Your continued use of the Sites following any changes indicates that you accept the changes.

Except as set out below, we do not share, or sell, or disclose to a third party, any personally identifiable information collected at this site.

The information we may collect includes:

your name, birth date, address, e-mail address and phone number, the Device’s phone number, age, username, password and other registration information, financial information, personal description and photograph, employment and contact information.
location information.
information about your Device.
information from a third party (relevant person) given to us in the course of your business and ours, or your employment with a business specifically to enable you to buy or participate in a Service offered to you or your employer, such as information pertaining to working hours and locations.
other information relevant to the customisation of a document on a Site or provision of the Services.
Information you send to us by use of the Site, by email, posting to a forum or blog.
We may receive personal information from third parties. If we do, we will protect it as set out in these Terms of Use.

This information is used:

to provide to provide information to our network of industry partners as may be necessary to provide you or your employer with the Services requested.
for verifying your identity for security purposes.
for internal record keeping.
for marketing our services and products.
Information which does not identify any individual may be used in a general way by us or third parties, to provide class information, for example relating to demographics or usage of a particular page or service.

As with most online businesses, we may log information about your access and use of our Sites, including through the use of Internet cookies and measurement tools, your communications with our Sites, the type of browser you are using, the type of operating system you are using and the domain name of your Internet service provider. We do not presently associate such information with an identifiable person.

We may contact you by a variety of measures including by telephone, email, sms or mail. If you wish to update your contact details or change the way we contact you, please contact us at the details below.

Disclosure of personal information

We may disclose personal information including:

for the purpose of providing information, products and Services to our clients.
to verify personal information details upon request from third parties (such as logged working hours and our location based information).
to comply with our legal and regulatory obligations, including disclosure and reporting to Commonwealth, State and Territory government agencies.
for users under 18, information regarding attendance, progress and general well-being may be provided in order to keep parent(s) and/or guardian(s) adequately informed. If you are under 18, you may use our site only with consent from a parent or guardian.
to credit reporting agencies and courts, tribunals, regulatory authorities where clients fail to pay for Services provided by us to them.
to courts, tribunals, regulatory authorities, and law enforcement officers as required by law, in connection with any actual or prospective legal proceedings, or in order to establish, exercise or defend our legal rights.
to the relevant third party or parties, with our client’s consent, if the matter involves third parties. and
to third parties, including agents, referral partners, contractors and sub-contractors for the purposes of providing information, products and Services to you. This may include parties located, or that store data, outside of Australia.
When we obtain information from a relevant person, we assume that in giving us your information, you are also giving us permission to pass it to the relevant person.

By providing us with personal information, you consent to this disclosure. Where we disclose your personal information to third parties, we will request or otherwise seek to get comfortable that the third party follows the Australian Privacy Principles regarding handling your personal information. However, if you provide information to us with a view to it being read, copied, downloaded or used by other people, we accept no responsibility for what that third party may do with it. It is up to you to satisfy yourself about the privacy level of every person who might see your information. If it is available to all the World, you have no control whatever as to how it is used.

If there is a change of control of our business or a sale or transfer of business assets, we reserve the right to transfer to the extent permissible at law our user databases, together with any personal information and non-personal information contained in those databases. This information may be disclosed to a potential purchaser. We would seek to only disclose information in good faith and where we have sought to maintain confidentiality.

We do not typically or routinely disclose personal information to overseas recipients. Unless consent has been given, or an exception under the Australian Privacy Principles applies. We will only disclose personal information to overseas recipients where reasonable steps have been taken to ensure the overseas recipient does not breach the Australian Privacy Principles in relation to your personal information. In circumstances where information is disclosed to overseas recipients, those recipients are likely to be located in countries in the regions in which we operate.

We are committed to ensuring that the information you provide to us is secure. In order to prevent unauthorised access or disclosure, we have put in place suitable physical, electronic and managerial procedures to safeguard and secure that information and protect it from misuse, interference, loss and unauthorised access, modification and disclosure.

No information transmitted over the Internet can be guaranteed to be secure. We cannot guarantee the security of any information that you transmit to us, or receive from us. The transmission and exchange of information is carried out at your own risk. Although we take measures to safeguard against unauthorised disclosures of information, we cannot assure you that personal information that we collect will not be disclosed in a manner that is inconsistent with these Terms of Use.

Financial information relating to your credit cards

This information is never taken by us either through our website or otherwise. At the point of payment, you are transferred to a secure page on the website of PayPal or some other reputable payment service provider. That page may be dressed in our “livery”, but it is not controlled by us. Our staff and contractors never have access to it.

Financial information about your direct debit

When you have agreed to set up a direct debit arrangement, the information you have given to us is passed to our own bank Commonwealth Bank of Australia for processing according to our instructions. We do keep a copy.

We are registered under the direct debit guarantee scheme. (This provides for the customer’s bank to refund disputed payments without question, pending further investigation. Direct debits can only be set up for payments to beneficiaries that are approved “originators” of direct debits. In order to be approved, these beneficiaries are subjected to careful vetting procedures. Once approved, they are required to give indemnity guarantees through their banks.)

Cookies

Cookies are small text files that are placed on your computer’s hard drive through your web browser when you visit any web site. They are widely used to make websites work, or work more efficiently, as well as to provide information to the owners of the site.

Like all other users of cookies, we may request the return of information from your computer when your browser requests a web page from our server. Cookies enable our web server to identify you to us, and to track your actions and the pages you visit while you use our website. The cookies we use may last for a single visit to our site (they are deleted from your computer when you close your browser), or may remain on your computer until you delete them or until a defined period of time has passed.

Although your browser software enables you to disable cookies, we recommend that you allow the use of cookies in order to take advantage of the features of our website that rely on their use. If you prevent their use, you will not be able to use all the functionality of our Sites. Here are the ways we use cookies:

to record whether you have accepted the use of cookies on our web site.
to allow essential parts of our web site to operate for you.
to operate our content management system.
to operate the online notification form – the form that you use to contact us for any reason.
to enhance security on our contact form.
to collect information about how visitors use our site.
to record your activity during a webcast.
to store your personal information so that you do not have to provide it afresh when you visit the site next time. This cookie will last for 90 days.
Calling our help line

When you call our help line, we collect Calling Line Identification (CLI) information. We use this information to help improve the efficiency and effectiveness of our help line.

Sending a message to our support system

When you send a message, we collect the information you have given to us in that message in order to obtain confirmation that you are entitled to receive the information and to provide to you the information you need. We record your request and our reply in order to increase the efficiency of our business / organisation. We do not keep any personally identifiable information associated with your message, such as your name or email address.

Complaining

When we receive a complaint, we record all the information you have given to us. We use that information to resolve your complaint. If your complaint reasonably requires us to contact some other person, we may decide to give to that other person some of the information contained in your complaint. We do this as infrequently as possible, but it is a matter for our sole discretion as to whether we do give information, and, if we do, what that information is.

We may also compile statistics showing information obtained from this source to assess the level of service we provide, but not in a way that could identify you or any other person.

Removal of your information

If you wish us to remove personally identifiable information from our web site, you may contact us at support@hikey-resources.com. To better safeguard your information, we will also take reasonable steps to verify your identity before granting access or making corrections to your information.

Data may be “processed” outside Australia

Our web sites are hosted in Ireland. We also use outsourced services in countries outside Australia from time to time in other aspects of our business. Accordingly data obtained within Australia may be “processed” outside Australia and data obtained in any other country may be processed within or outside that country.

Complaints procedure

If you have a complaint about how we are collected or handled your personal information, please contact us. We will endeavour in the first instance to deal with your complaint and take action to resolve the matter.
If your complaint cannot be resolved at the first instance, we will ask you to lodge a formal complaint in writing, explaining the circumstances of the matter that you are complaining about, how you believe your privacy has been interfered with and how you believe your complaint should be resolved.
We will acknowledge receipt of your formal complaint and indicate the timeframe that you can expect a response. We will endeavour to resolve the complaint as quickly as possible, but if the matter is complex and our investigation may take longer, we will let you know when we expect to provide our response.
If you are unhappy with our response, you may refer your complaint to the Office of the Australian Information Commissioner.
For more information about privacy issues in Australia and protecting your privacy, visit the Australian Federal Privacy Commissioner’s web site; http://www.privacy.gov.au/
If you have any question regarding the privacy policy, please contact us through the contact page.

How you can contact us

Emailing support@hikey-resources.com

Sending a letter: Attn: Privacy Officer, Hi-Key Resources Pty. Limited, PO Box 343, Vermont VIC 3133, Australia

Terms & Conditions

Welcome to Time2L, a digital productivity timesheet tool, made available by Hi-Key Resources Pty Ltd (ACN 603 178 276) of PO Box 343, Vermont VIC 3133, Australia (HiKey), which is capable of integrating into Your ERP accounting and payroll system. These Terms of Use (Terms) are intended to explain our obligations as a service provider, Your obligations as a Customer and or User and the terms and conditions of using our Service. Please read them carefully.

The Time2L Service will evolve over time based on user feedback. These Terms are not intended to answer every question or address every issue raised by the use of the Time2L Service. HiKey reserves the right to change these Terms at any time, effective upon the posting of modified Terms and HiKey will make every effort to communicate these changes to You via email or notification via the Website. It is likely the terms of use will change over time. It is Your obligation to ensure that You have read, understood and agree to the most recent Terms available on the Website.

By registering to use the Service You acknowledge that You have read and understood these Terms and have the authority to act on behalf of any person for whom You are using the Service. You are deemed to have agreed to these Terms on behalf of any entity or person for whom You use the Service.

These Terms were last updated on 25 May 2018.

1. Definitions

“Access Fee” means the fees payable by the Customer for use of the Software and the Services.
“Admin Portal” means the web portal provided by HiKey that allows the Customer to manage the Software it has licensed.
“Agreement” means these Terms of Use.
“Customer” means the legal entity that enters into a business relationship with HiKey in respect of the use of the Software and provision of the Services.
“Data” includes all information or data submitted by You or on behalf of the Customer and its Users via the Software.
“HiKey” means Hi-Key Resources Pty. Ltd. (ACN 603 178 276).
“Intellectual Property” includes all rights throughout the world in relation to patents, copyright (including moral rights), designs, registered and unregistered trademarks, trade secrets, know-how, confidential information and all other intellectual property and any right to register those rights, whether created before or after the date of this Agreement, and in all cases for the duration of those rights and any renewal, and for the avoidance of doubt, includes all such rights in respect of the Software in source code and object code format.
“Party” means the Customer, a User or HiKey as the context requires, and “Parties” means the Customer, a User and HiKey together.
“Service” means the online digital timesheet tool together any Customisation or Maintenance services relating to the Software and made available by HiKey from time to time.
“Software” means any mobile applications, administrative codes, application programming Interfaces (API’s), plug-ins or other software HiKey makes available to You, and includes any Interfaces, applications and Admin Portals made available in connection with the use of any specific software programs. For the avoidance of doubt, HiKey’s Software includes but is not limited to the software application known as “Time2L”.
“User” is an individual who is authorised by a Customer to use or access the Software. Users can be but are not limited to a Customer’s employees, contractors, agents and any third party the Customer invites to use the Software. For the avoidance of doubt, multiple Users of the Software may belong to one single Customer.
“Website” the HiKey website at www.hikey-resources.com
“You” means the Customer, and where the context permits, a User. “Your” has a corresponding meaning.
2. Interpretation

In this document, unless a contrary intention is expressed:

(a) where a word or phrase is defined, its other grammatical forms have a corresponding meaning;

(b) the singular includes the plural and the plural includes the singular;

(c) a reference to any document is a reference to that document (and, where applicable, any of its provisions) as amended, novated, supplemented or replaced from time to time;

(d) a reference to a party to this document includes that party’s executors, administrators, successors and permitted assigns; and

(e) the word “including” is not to be treated as a word of limitation.

3. Use of Software

HiKey grants You the right to access and use the Service via the Website with the particular user roles available to You according to an agreement between HiKey and the Customer. This right is non-exclusive, non-transferable, and limited by and subject to this Agreement. You acknowledge and agree that, subject to any applicable written agreement between the Customer and the Users, or any other applicable laws:

(a) the Customer determines who is a User and what level of user role access to the relevant organisation and Service that User has;

(b) the Customer is responsible for all Users’ use of the Service;

(c) the Customer controls each User’s level of access to the relevant organisation and Service at all times and can revoke or change a User’s access, or level of access, at any time and for any reason, in which case that person or entity will cease to be an User or shall have that different level of access, as the case may be;

(d) if there is any dispute between a Customer and a User regarding access to any organisation or Service, the Customer shall decide what access or level of access to the relevant Data or Service that User shall have, if any;

(e) HiKey may suspend or terminate Your use of the Service in the event that any invoices for Access Fees are not paid in full by the due date for payment; and

(f) You must only use the Service and Website for Your own lawful internal business purposes, in accordance with these Terms and any notice sent by HiKey or condition posted on the Website. You may use the Service and Website on behalf of others or in order to provide services to others but if You do so you must ensure that You are authorised to do so and that all persons for whom or to whom services are provided comply with and accept all terms of this Agreement that apply to You.

4. Access Conditions

(a) By entering into this Agreement, or accessing and using the Software, or requesting the Services of HiKey, You are representing to HiKey that you have read, understood, accepted and agreed to be bound by the provisions of this Agreement.

(b) As a condition of these Terms, when accessing and using the Services, You must:
(i) not attempt to undermine the security or integrity of HiKey’s computing systems or networks or, where the Services are hosted by a third party, that third party’s computing systems and networks;
(ii) not use, or misuse, the Services in any way which may impair the functionality of the Services or Website, or other systems used to deliver the Services or impair the ability of any other user to use the Services or Website;
(iii) not attempt to gain unauthorised access to any materials other than those to which You have been given express permission to access or to the computer system on which the Services are hosted;
(iv) if the Customer is a company or other entity or organisation:not transmit, or input into the Website, any: files that may damage any other person’s computing devices or software, content that may be offensive, or material or Data in violation of any law (including Data or other material protected by copyright or trade secrets which You do not have the right to use); and
(iv) not attempt to modify, copy, adapt, reproduce, disassemble, decompile or reverse engineer any computer programs used to deliver the Services or to operate the Website except as is strictly necessary to use either of them for normal operation.

(c) At any time and in its sole discretion HiKey reserves the right to discontinue, update, revise, remove or otherwise change Software features and functionality, and the right to revise, update and modify the Terms. Such modifications to this document will be effective immediately or at such future date as may be specified by HiKey. HiKey will use its reasonable efforts to notify You of any changes to this Agreement or to the Software. Your continued use of the Software and or the Services thereafter will be deemed acceptance of such changes to this Agreement and/or the Software.

(d) The Customer and each of its invited Users must, and must ensure that its Users, comply with any rules, regulations, guidelines or similar documentation posted or otherwise made available by HiKey in respect of the Software and or the Services.

(e) The provision of, access to, and use of, the Services is on an “as is” basis and at Your own risk.

5. General Representations and Warranties

You represent and warrant to HiKey that:

(a) You have the full right, power and authority (including corporate right, power and authority, as applicable) to enter into the Agreement;

(b) the acceptance of the Agreement and the performance of its obligations and duties hereunder do not and will not violate any agreement to which it is a party or by which it is bound;

(c) You agree to comply with all applicable federal, territory and state laws and regulations in the performance of its obligations under the Agreement;

(d) The Customer is solely responsible for its Data and the Data of its invited Users, including without limitation, the security of such Data;

(e) You have all necessary rights and licenses, consents, permissions, waivers and releases to use the Data and submit it via the Software, including in respect of use and management of Data in accordance with the Agreement terms;

(f) if You are an individual, that you are at least eighteen (18) years of age and have the legal capacity or permission of a legal guardian to enter into the Agreement; and

(g) the information You provide in connection with entry into the Agreement is accurate, complete and in compliance with the requirements of the Agreement;

(h) if You are a company or other entity or organisation:
(i) such entity or organisation is duly authorised to do business in Australia and any other country or countries where it operates,
(ii) the individual entering into this Agreement on behalf of the Customer meets the requirements of clause 5(f) above and is an authorised representative of such entity or organisation, and
(iii) it will take all steps required to ensure that the Users authorised by the Customer to access and use the Software comply with the terms of the Agreement as applicable.

(i) You are acquiring the right to access and use the Software and or the Services for the purposes of a business and that, to the maximum extent permitted by law, any statutory consumer guarantees or legislation intended to protect non-business consumers in any jurisdiction does not apply to the supply of the Software, the Services, the Website or these Terms

6. Provision of Maintenance Services

(a) If it is agreed that HiKey will provide Maintenance Services to the Customer, HiKey will perform these services at such frequency and duration as it considers reasonable to ensure that:
(i) errors in the Customisations supplied by HiKey that are identified by the Customer or which otherwise come to the attention of HiKey are rectified; and
(ii) the Customisations remains in conformity with the specifications agreed between the Customer and HiKey

(b) The Maintenance Services will be provided by HiKey for the duration agreed by the parties and at the sole option of HiKey will take the form of:
(i) telephone or email advice;
(ii) remote access error correction;
(iii) on-site attendance followed by such advice, programming or re-configuration as HiKey considers necessary;
(iv) provision of third party assistance; and
(v) such services as HiKey considers are more effectively provided off-site.

(c) HiKey will provide the Maintenance Services in response to a report by the Customer of a suspected defect or error in the Customisations, which allegedly causes the Customisations to deviate from the agreed specifications.

(d) The Customer acknowledges and agrees that HiKey may in its discretion appoint a sub-contractor to provide some or all of the Maintenance Services to the Customer.

(e) HiKey will provide the Maintenance Services between 9 am and 5 pm on any Business Day. HiKey does not warrant that it will be capable of promptly receiving, processing or otherwise acting upon a request for support which is made outside HiKey’s normal business hours.

(f) Immediately after making a request for Maintenance Services which may involve error correction or program modification, the Customer must give HiKey a documented example of the defect or error which it alleges prevents conformity of the Customisations with the applicable specifications.

(g) The Customer must, if so requested by HiKey, give HiKey a listing of output and any other data which HiKey requires in order to reproduce operating conditions similar to those present when any alleged defect or error in the Customisations was discovered.

(h) Unless otherwise expressly stated, Maintenance Services to be provided by HiKey under this document do not include:
(i) changes to the Software;
(ii) correction of errors or defects caused by operation of the Software or Customisations in a manner other than that currently specified by HiKey;
(iii) correction of errors or defects caused by modification, revision, variation, translation or alteration of the Software or other Customisations not authorised by HiKey;
(iv) correction of errors or defects caused by the use of the Software or Customisations by a person not authorised by this document or HiKey;
(v) correction of errors in the Customisations caused in whole or in part by the use of computer programs other than the Software;
(vi) correction of errors caused by the failure of the Customer to provide suitably qualified and adequately trained operating and programming staff for the operation of the Software or Customisations;
(vii) training of operating or programming staff;
(viii) rectification of operator errors;
(ix) rectification of errors caused by incorrect use of the Software or Customisations;
(x) rectification of errors caused by an equipment fault;
(xi) equipment maintenance;
(xii) diagnosis or rectification of faults not associated with the Software or Customisations;
(xiii) furnishing or maintenance of accessories, attachments, supplies, consumables or associated items, whether or not manufactured or distributed by HiKey;
(xiv) correction of errors arising directly or indirectly out of the Customer’s failure to comply with this document or any other agreement with HiKey; or
(xv) correction of errors or defects which are the subject of a warranty under another document.

(i) If the Customer so requests in writing, HiKey may at its option provide any of the Maintenance Services referred to in clause 6(h). Such services will be charged on a time and materials basis.

(j) The Customer must ensure that HiKey’s personnel are provided with all information, facilities, assistance and accessories reasonably required by HiKey to enable HiKey to comply with its obligations under this document.

(k) If reasonably requested by HiKey, the Customer must provide a suitably qualified or informed representative to HiKey’s personnel and provide such advice or assistance to those personnel as may be necessary in order to enable HiKey to effectively perform the Maintenance Services.

7. Service interruptions

(a) HiKey can modify or cease to offer the Software, or any part thereof, at any time without prior notice.

(b) To the full extent permitted by law, Hi-Key does not warrant that the Software or Services (or any part of them) will be error free, or that the Customer’s use of the Software will be uninterrupted, or meet the requirements of the Customer.

(c) To the full extent permitted by law, HiKey will not be liable for any damages arising out of or related to interruption of, or defects in use or transmission of, the Software, including without limitation interruptions or defects due to inability to access the Internet or any part thereof, equipment modifications, upgrades, relocations, or repairs. No reduction of payments will be made in the case of temporary interruption of or defects in use or transmission of the Software.

(d) HiKey will not be liable for interruption of or delays in use or transmission of the Software caused by acts of god, fire, water, riots, acts of Government, acts or omissions of Internet providers, or any other causes beyond HiKey’s control.

8. Cancellations and Termination

(a) You can terminate the Agreement at any time at which time Your access to the Software or the Service will cease.

(b) HiKey can temporarily suspend Your entitlement to use the Software without prior notice and/or terminate the Agreement where:
(i) You have committed a material breach of the Agreement that is not capable of remedy;
(ii) You have committed a material breach capable of remedy and has failed to remedy that breach within 7 calendar days after receiving notice in writing requiring the breach to be remedied;
(iii) an Insolvency Event has occurred, or is threatened to occur, in respect of the Customer; or
(iv) the Customer ceases business.

(c) Without affecting subclause (b), HiKey can at any time terminate this Agreement with immediate effect.

(d) Termination of the Agreement will result in the deactivation of Your ability to access the Software, and may result in the deletion of all content linked to the Customer account including but not limited to Data. HiKey will only retain, store, use and disclose Data once the Agreement is terminated to the extent required or permitted by law, and in all cases in accordance with the terms of its Privacy Policy.

(e) Termination of these Terms is without prejudice to any rights and obligations of the Parties accrued up to and including the date of termination. On termination of this Agreement:
(i) the Customer will remain liable for any accrued charges and amounts which become due for payment before or after termination; and
(ii) You will immediately cease to use the Software, the Services and the Website.

(f) The rights and obligations under clauses 3, 5, 7, 8(d), 8(e), 9, 10, 10(c), 12(a), 12(b) and 15 survive the expiry or termination of the Agreement and continue in full force and effect, together with any other rights and obligations which are by their nature or effect intended to survive.

9. Intellectual Property

(a) HiKey is the sole and exclusive owner of the Software, including all associated Intellectual Property, and reserves all rights accordingly.

(b) You must not, and must ensure that Users and all other third parties do not, attempt to reverse engineer, decompile, disassemble, re-engineer, or otherwise discover, recreate, or attempt to discover or recreate the Software or its source code, or otherwise infringe the Intellectual property of HiKey. You must ensure that You and other third parties authorised by You do not, modify or attempt to modify the Software.

(c) The Customer is the owner of all Data. You grant to HiKey a fee-free, perpetual licence to access and use the Data to the extent necessary for HiKey to provide the functionality of the Software and its Services. You are responsible for ensuring that all Data is truthful, accurate and correct.

(d) You acknowledges to HiKey that You have read and understood the HiKey Privacy Policy, which is available on the Website (https://hikey-resources.com/en/legal/#privacy-policy) and is incorporated into, and forms part of, this Agreement.

(e) HiKey will use reasonable efforts to ensure that Data is maintained in a secure manner, but this will not affect or restrict the operation of clause 11(b).

(f) You acknowledge for the avoidance of doubt that Data may be transferred to any successor in title of HiKey.

10. Indemnification

(a) You will at all times be responsible for and indemnify HiKey and its affiliates, employees, officers, directors, agents, and successors (those indemnified) from and against any claims made against, or losses, damage or liability incurred by, any of those indemnified (and including without limitation solicitor’s fees on a solicitor-own client basis) that arise out of, in connection with or in respect of:
(i) any breach by the Customer or any of its Users of any of their obligations under the Agreement, or any warranty or representation given under the Agreement;
(ii) any unauthorised acts, fraud, wilful default, dishonesty or negligence of the Customer or any of its Users;
(iii) the violation by the Customer or any User of any rights, including without limitation Intellectual Property, of HiKey, or those of any third party which result from the use of the Software by the Customer;
(iv) HiKey’s refusal to provide any person access to Your information or Data in accordance with these Terms; or
(v) HiKey making available information or Data to any person with Your authorisation.

(b) Your obligation to indemnify those indemnified will survive the expiration or termination of this Agreement for any reason.

(c)The indemnity referred to in this clause will be granted whether or not legal proceedings are instituted and, if such proceedings are instituted, irrespective of the means, manner or nature of any settlement, compromise or determination, and will survive termination or expiration of the Agreement.

11. Limitation of Liability and Warranty

(a) To the fullest extent legally permitted, HiKey makes no warranties, express or implied, in respect of the Software, the Services, or any aspect thereof. Without limiting the foregoing, HiKey specifically disclaims all warranties, express or implied, including but not limited to implied warranties of merchantability, acceptable quality, or fitness for any purpose. HiKey does not warrant that the Software will meet Your requirements or operate without error, interruption or downtime.

(b) Furthermore, to the full extent permitted by applicable law, HiKey will not be liable to the Customer or any User for any loss, including loss of Data or special, indirect or consequential damages (such as loss of profits), or claim, arising out of breach of the Agreement (including for the avoidance of doubt any unauthorised access to or disclosure of Data) or HiKey’s negligence, or arising out of the supply of defective Software or Services.

(c) Without limiting the preceding subclauses or clause 5(i), to the full extent permitted by applicable law, HiKey’s liability for any term, condition, guarantee or warranty that is implied by law and cannot lawfully be excluded by HiKey, including the consumer guarantees set out in the Australian Consumer Law contained in Schedule 2 of the Competition and Consumer Act 2010 (Cth) and all similar or equivalent legislation, rules and regulations is limited to (at HiKey’s option):
(i) in the case of goods, including the Software (to the extent the Software is considered a good under applicable law) – repairing, replacing or supplying equivalent goods, or paying the cost of any of those remedies to the Customer; or
(ii) in the case of services, including the Services – supplying the services again or re-paying the cost of the Services rendered.

(d) To the extent permitted by law, Your sole and exclusive remedy, if it is dissatisfied with the Software or with any terms, conditions, rules, policies, guidelines, or practices of HiKey is to discontinue using the Software and terminate the Agreement.

(e) Without limiting or affecting any other provision of the Agreement, to the full extent permitted by applicable law, HiKey’s maximum aggregate liability to the Customer or any User is limited the total value of the Access Fees paid by the Customer to HiKey in the preceding two (2) months prior to termination of this Agreement.

12. Limitations on the utilisation of the Service and the Software

(a) You acknowledge that the Software is not a payroll system and You agree to take full responsibility to validate the accuracy of Data produced by the Software when used by Customer for its own payroll or billing purposes. You assume sole and full responsibility for compliance with all applicable laws, including workplace relation laws and reporting obligations, in connection with its use of the Software and the output of the Software, and must indemnify HiKey on demand against any liability HiKey may incur in respect of the Customer’s use of the Software. Certain features of the Software, including multiplying hours tracked by a monetary figure supplied by Customer, are provided for convenience and Your reference only and do not and will not reflect the actual calculation of any payment payable by Customer to any person or entity and can never be relied on as such and are not warranted or guaranteed by HiKey to be a payroll calculation or any other payment calculation.

(b) You must not interfere with or attempt to interfere with or disrupt the integrity, security, functionality or proper working of the Software. You must only access the Software through the interfaces and protocols provided or authorised by HiKey. You may not compile or use the HiKey provided materials or any other information obtained through the Software or the Website for the purpose of unsolicited direct marketing, spamming, unsolicited contacting of customers, or other impermissible advertising, marketing or other activities, including, without limitation, any activities that violate the Spam Act 2003 (Cth) or the Privacy Act 1988 (Cth).

13. Access and Security

(a) You responsible for maintaining the confidentiality of any passwords used by the Customer or its Users to access the Software, and must not disclose such passwords to any unauthorised third parties. Each party will promptly notify the other of any unauthorised access to or use of Data or passwords. The parties will use reasonable efforts to take remedial measures to address any such unauthorised access.

(b) HiKey has no obligation to monitor the Software or its use, but may do so in its discretion. HiKey has the right to monitor use of the Software and to disclose any information arising out of it, including without limitation Data, to the extent necessary to satisfy any law, regulation, or demand of government or of internal auditors or to protect HiKey or its customers. HiKey can, but is not obliged to, remove or refuse to post any materials that it finds, at its sole discretion, to be offensive, undesirable, in violation of the Agreement, or otherwise unacceptable.

14. Dispute Resolution

(a) All disputes between the parties must be referred in writing to a representative appointed by each party (Representative) who will attempt to resolve the dispute by negotiations in good faith.

(b) If the dispute is not settled within 14 days of the receipt by each representative of notification of a dispute pursuant to clause 14(a), the parties agree to refer the dispute to a mediator to be mutually agreed, or in default of agreement within five days of either party requesting the other to agree a mediator, to be appointed by the President for the time being of the Law Society of New South Wales. The mediation will be held in Sydney, New South Wales, and the parties will equally share the costs of the mediator while otherwise each bearing their own costs of attending and participating in the mediation.

(c) If mediation pursuant to clause 14(b) fails to resolve the dispute, each party is free to commence legal proceedings to resolve the dispute.

(d) Nothing in this clause 14 is to be interpreted as preventing either party from obtaining interlocutory relief from an appropriate court if it is reasonably necessary to do so to protect the interests of that party.

15. General Conditions

(a) These Terms, together with the HiKey Privacy Policy and the terms of any other notices or instructions given to You under these Terms, supersede and extinguish all prior agreements, representations (whether oral or written), and understandings and constitute the entire agreement between You and HiKey relating to the Services and the other matters dealt with in these Terms.

(b) The Customer acknowledges and understands that HiKey may use third party vendors to supply the necessary storage, software, hardware, networking and all other technologies related to the operation of its products and services, including the Software.

(c) If any provision of this document is prohibited, invalid or unenforceable in any jurisdiction, that provision will, as to that jurisdiction, be ineffective to the extent of the prohibition, invalidity or unenforceability without invalidating the remaining provisions of this document or affecting the validity or enforceability of that provision in any other jurisdiction.

(d) In the event that any provision of the Agreement is held to be prohibited, invalid or unenforceable in any jurisdiction, , that provision will, as to that jurisdiction, be ineffective to the extent of the prohibition, invalidity or unenforceability without invalidating the remaining provisions of the Agreement or affecting the validity or enforceability of that provision in any other jurisdiction.

(e) HiKey is controlled, operated and administered by its offices within Australia. HiKey makes no representation that HiKey’s Software or other products or services are appropriate or available for use at other locations outside of Australia. If You access or use the Software from locations outside of Australia, You are responsible for compliance with all local laws.

(f) The Agreement is governed by the law in force in the State of New South Wales. The Parties submit to the exclusive jurisdiction of the courts of that State and the New South Wales Registry of the Federal Court of Australia in respect of all proceedings arising in connection with this document.

(g) You will promptly do all things required by law or reasonably requested by HiKey to give effect to the Agreement.

(h) No waiver by HiKey of any breach or default by You is effective unless reduced to writing and signed by HiKey, and any such waiver does not constitute a waiver of any other continuing breach or default under the Agreement.

(i) Other than as provided in the Agreement, the rights and remedies provided under the Agreement are cumulative and not exclusive of any rights or remedies provided by law or of any other such right or remedy. Any single or partial exercise of any power or right does not preclude any other or further exercise of it or the exercise of any other power or right under the Agreement. The rights and obligations of the Parties pursuant to the Agreement are in addition to and not in derogation of any other right or obligation between the parties under any other deed or agreement to which they are parties.

16. Help Desk

Technical Problems: In the case of technical problems You must make all reasonable efforts to investigate and diagnose problems before contacting HiKey. If You still need technical help, please check the support provided online by HiKey on the Website or failing that email us at support@hikey-resources.com

Please send any questions about the above terms and conditions to support@hikey-resources.com

GDPR Compliance

If needed, please request a pre-signed Data Processing Addendum at the email-address dpa@hikey-resources.com.

Amazon Web Services, Inc.: compute (EC2, ElasticBeanstalk, Lightsail), storage (S3), email delivery (SES), networking (CloudFront)
MongoDB, Inc.: storage (MongoDB Atlas)
Google LLC: storage (Drive), customer engagement (Survey), customer support (Gmail), statistics (Analytics), advertisement (AdWords)
Microsoft Azure by Microsoft Corporation: analyze (Power BI, Power BI Embedded), storage (Azure SQL), security (Azure Active Directory), compute (Azure Functions)
SolarWinds, Inc.: centralized remote logging (Papertrail)
Nekkra UG: image compression (Kraken)
Freshworks, Inc. (formerly Freshdesk): customer support
The Rocket Science Group LLC: customer engagement (MailChimp)
HubSpot, Inc: marketing, analytics, statistics
Slack Technologies, Inc: (internal) communication & customer support

Last modified (unless stated differently per section): Wed 03. April 2019