quinelthar logo
Accredited Financial Courses
Certified Instructors

How We Handle Your Details

Transparency around what we receive, why we need it, and what happens to it once it's in our hands.

Last updated: March 2025

quinelthar operates as an educational platform focused on business finance fundamentals. Operating within Australia, we work with individuals seeking to strengthen their financial capabilities through structured learning programs.

This document explains our relationship with the details you share when interacting with our services. For anything related to cookies, tracking mechanisms, or similar technologies, please refer to our separate cookie policy rather than this document.

What Details Come Into Our System

Information enters our records through several distinct pathways. When someone registers interest in our learning programs, we record identification details that allow us to communicate effectively. This includes names, contact information, and basic professional context.

Operational necessities drive most of what we record. If you submit a contact form, send an inquiry via email, or register for program information, those interactions generate records. We capture what you deliberately provide plus some technical elements that emerge from how digital systems function.

Information Category Specific Elements Collection Method
Identity Information Full name, preferred name, professional title Direct submission through registration forms and enrollment processes
Communication Details Email addresses, phone numbers, postal addresses Provided during initial inquiry or program registration
Professional Context Current role, industry sector, organization size Optional fields in registration forms to tailor program recommendations
Technical Records IP addresses, device types, browser information Automatically generated during website visits
Interaction History Pages viewed, documents downloaded, forms completed System logs during platform navigation

Payment information follows a different path entirely. When fees are processed, financial details move through external payment processors rather than our systems. We receive confirmation of successful transactions but never hold complete card numbers or banking credentials.


The Operational Logic Behind Data Intake

Every piece of information we request serves a specific operational function. Nothing gets collected out of habit or without purpose.

Program Delivery Requirements

Running educational programs requires coordination between multiple operational elements. Contact details allow us to send program schedules, material updates, and session reminders. Professional context helps us recommend appropriate learning pathways and connect participants with relevant content.

When you engage with our platform, interaction records help us understand which resources resonate with learners. If certain materials consistently confuse people or specific topics generate repeated questions, those patterns inform how we refine content and structure.

Administrative Necessities

Running any organization generates administrative requirements. We maintain records to track enrollment status, manage waiting lists, process refund requests, and handle various operational tasks that emerge when coordinating multiple learning programs across different timeframes.

Legal Foundations: Different activities rest on different legal justifications. Program delivery operates under contractual necessity since we cannot provide services without basic coordination details. Platform improvement efforts rely on legitimate business interests in maintaining quality. Where regulations require explicit permission, we obtain that before proceeding.


How Details Move Through Our Operations

Information doesn't sit static once recorded. It moves through various internal processes and sometimes crosses organizational boundaries under specific circumstances.

Internal Access Patterns

Within quinelthar, access follows role-based logic. Program coordinators reach enrollment records to manage learning groups. Support staff access contact details when responding to inquiries. Technical teams work with system logs during maintenance or troubleshooting sessions.

No one gets blanket access to everything. Each role connects to specific data segments necessary for their function. Finance staff processing refunds don't need to see which learning materials someone downloaded. Content developers reviewing usage patterns don't require individual contact details.

External Transfers

Certain operational requirements push information beyond our organizational perimeter. Our email delivery system, hosted externally, receives the messages we send to participants. Cloud infrastructure providers hold the servers where our platform runs. Payment processors handle transaction details during enrollment.

  • Technology Infrastructure Partners: Organizations providing hosting services, email delivery systems, and platform infrastructure receive technical details necessary for their operation.
  • Payment Service Providers: Financial transaction details move through specialized payment processors who handle sensitive financial operations under their own security frameworks.
  • Communication Tools: When we send program updates or respond to inquiries, those messages pass through email systems and communication platforms operated by external providers.
  • Professional Service Providers: Legal advisors, auditors, and similar professionals occasionally need access to records when providing specialized services to our organization.

Every external entity that touches your details operates under contractual obligations limiting how they can work with that information. They cannot repurpose what we share for their own marketing, cannot transfer it further without authorization, and must maintain appropriate security measures.

Mandatory Disclosures

Occasionally, legal requirements override normal handling protocols. Court orders, regulatory investigations, or statutory obligations might compel us to disclose specific records. When this happens, we verify the legal basis before releasing anything and limit disclosure to what the requirement specifically demands.


Protective Measures in Place

Security isn't a destination but an ongoing practice. We implement multiple layers of protection, knowing that no system achieves perfect invulnerability.

Technical Safeguards

Data transmissions between your device and our systems travel through encrypted channels. Information stored within our databases sits behind authentication barriers requiring verified credentials. Access logs track who reached what records and when, creating accountability trails.

Our infrastructure undergoes regular security assessments. We patch vulnerabilities as they're discovered, update software to address emerging threats, and maintain monitoring systems that flag unusual access patterns or potential intrusion attempts.

Organizational Protocols

Technology alone doesn't secure information. Staff receive training on appropriate handling practices, including recognizing phishing attempts, protecting credentials, and following proper protocols when working with participant details. Clear policies define acceptable use, and disciplinary measures exist for violations.

Remaining Vulnerabilities

Despite protective measures, risks persist. External attackers constantly develop new intrusion methods. Human error occasionally creates exposure despite training. System failures can occur. While we work to minimize these risks, absolute security remains impossible within current technological constraints.

Should a security incident compromise participant information, we'll assess the scope, take immediate containment actions, and notify affected individuals according to legal requirements and reasonable timeframes.


Your Control Options

You maintain certain rights regarding details we hold. These aren't just legal formalities but practical mechanisms you can activate.

Access and Review

You can request a copy of the information we maintain about you. This includes basic details like contact information plus records of your interactions with our platform and services. We'll provide this in a readable format within reasonable timeframes.

Correction Capabilities

If details we hold are inaccurate or outdated, you can request corrections. This matters particularly for contact information where errors can disrupt communication or program coordination. Submit correction requests through our standard contact channels, and we'll update records once we verify the accuracy of new information.

Deletion Requests

In many circumstances, you can request deletion of your records. This isn't absolute since certain legal or contractual obligations require us to maintain specific details for defined periods. But where no retention requirement exists, we'll process removal requests.

Keep in mind that deletion requests create practical limitations. If you're enrolled in an active program, removing your records would prevent us from delivering that service. Financial records connected to transactions must persist to satisfy tax obligations and audit requirements.

Objection and Restriction

Where we process information based on legitimate interests rather than contractual necessity, you can object to that processing. If your specific circumstances create compelling grounds, we'll cease unless we can demonstrate overriding legitimate reasons or legal requirements.

You might also request restricted processing, meaning we maintain records but limit how actively we work with them. This creates a middle ground between full deletion and unrestricted use.

Marketing Communication Withdrawal

Promotional messages always include straightforward opt-out mechanisms. Clicking an unsubscribe link removes you from marketing lists while preserving operational communications necessary for any services you're actively using.


How Long Details Persist

Information doesn't remain in our systems indefinitely. Retention periods vary based on the nature of the data and applicable requirements.

Information Type Retention Duration Retention Logic
Active Enrollment Records Duration of program plus 3 years Service delivery needs plus reasonable period for addressing post-program inquiries or disputes
Inquiry Details (Non-Enrollees) 18 months from last contact Sufficient time to provide information and follow up on expressed interest
Financial Transaction Records 7 years from transaction date Australian tax law requirements and standard accounting practices
Technical System Logs 90 days from generation Security monitoring and system troubleshooting needs
Marketing Communication History Until opt-out request Ongoing relationship management until individual withdraws consent

When retention periods expire, we either delete information or anonymize it by removing identifying elements. Anonymized data might persist for analytical purposes since it no longer connects to specific individuals.

Certain circumstances can extend retention beyond standard periods. Active legal disputes require us to preserve relevant records until resolution. Ongoing investigations might necessitate retention until completion. These extensions apply narrowly to affected records rather than entire databases.


Geographic Considerations

quinelthar operates primarily within Australia, which shapes our regulatory framework and operational approach. Australian privacy legislation establishes baseline requirements for how organizations handle personal details, including principles around collection limitation, purpose specification, and individual access rights.

Some technical infrastructure sits outside Australian borders since cloud computing naturally distributes across multiple geographic locations. Our service providers maintain operations in various jurisdictions, though contractual arrangements require them to apply protections equivalent to Australian standards.

If you're accessing our services from outside Australia, be aware that information you provide will be transferred to and processed within Australian jurisdiction and potentially in other locations where our infrastructure partners operate.


Changes to These Practices

Privacy practices evolve as operations change, regulations develop, and technology advances. When we modify how we handle details, this document gets updated to reflect those changes.

Significant alterations trigger notification to individuals whose details we hold. Minor clarifications or updates that don't materially affect rights or handling practices might not warrant active notification, though the revised document always appears on our website with an updated effective date.

Reviewing this document periodically makes sense, particularly if you maintain an ongoing relationship with our programs. The date at the top indicates the last revision, helping you identify when changes occurred.

Questions or Concerns About Privacy

If something in this document requires clarification, if you want to exercise any rights described here, or if concerns arise about how we've handled your details, multiple channels exist for reaching us.

location_on

Postal Address

LOT 73 Bennelong Pkwy
Sydney Olympic Park NSW 2127
Australia

phone

Phone Contact

+61 477 689 448
Available weekdays 9am–5pm AEST

email

Email Inquiries

help@quinelthar.com
Privacy-related questions receive priority handling

Should our response to a privacy concern fail to address your situation adequately, you maintain the right to escalate matters to the Office of the Australian Information Commissioner, which oversees privacy regulation enforcement within Australia.