Darwin Respiratory & sleep health are committed to privacy and security
This privacy notice applies to personal information collected on the Darwin Respiratory & sleep health website: www.darwinsleephealth.com.au.
Darwin Respiratory & sleep health is committed to protecting the privacy and security of visitors to the Darwin Respiratory & sleep health website. You may browse and access most information contained within this website without providing any personal information.
Where you provide personal information, Darwin Respiratory & sleep health only uses that information for the purpose(s) for which it was gathered, and provides it to any third parties that are specified in this privacy policy or at the point of collection.
Access to your personal information we hold
To view and/or request the correction of any personal information held by us, or if you have any concerns about personal information that we hold, please write to:
Darwin Sleep Health
Darwin Private Hospital,
Rocklands Drive Tiwi NT 0810
Security
Darwin Respiratory & sleep health websites have security measures in place to prevent the loss, misuse and alteration of information under our control. In order to maintain the cyber security of Darwin Respiratory & sleep health systems and information, Darwin Respiratory & sleep health systems are subject to ongoing monitoring (including activity logging), analysis and auditing. We may use information about your use of our websites and/or other IT systems to prevent unauthorised access or attacks on these systems or to resolve such events. We may use this information even if you are not involved in such activity. Darwin Respiratory & sleep health may utilise services from one or more 3rd party suppliers to monitor or maintain the cyber security of its systems and information. These 3rd party suppliers will have access to monitoring and logging information as well as information processed on Darwin Respiratory & sleep health websites and/or other IT systems. Use of Darwin Respiratory & sleep health websites and/or other IT systems implies acceptance of their use being monitored.