1. General Statement
2. Collection of Personal Information
3. Using and Disclosing Your Personal Information
4. Security of Your Personal Information
We take steps to protect the personal information we hold against loss, unauthorised access, use, modification or disclosure and against other misuse. When no longer required, personal information is destroyed in a secure manner or deleted.
5. Access to Your Personal Information