Privacy Policy

Current as of January 2025

quarivonexo operates under a framework where your autonomy over personal records remains paramount. What follows explains how information arrives at our systems, what happens during its residency, and the mechanisms available for you to exercise control.

Information Entry Points

Records enter our environment through three distinct channels. First, direct submissions occur when you establish accounts, configure preferences, or transmit inquiries through our platforms. This encompasses identification details, correspondence addresses, authentication credentials, and any commentary you choose to provide.

Second, automated capture happens as you navigate our digital properties. Server logs document access patterns, browser characteristics, timestamp data, and the pathways you follow through our content. Device identifiers and network parameters fall into this category.

Third-party sources occasionally supply information when you authorize integration with external financial institutions or reference checking services. Such transfers occur exclusively with your explicit permission and under contractual constraints that mirror our own handling standards.

  • Identity Records: Names, birthdates, government identification numbers where legally required for financial verification
  • Contact Channels: Email addresses, phone numbers, postal coordinates for correspondence purposes
  • Financial Credentials: Bank account details, payment card information processed through segregated secure pathways
  • Interaction Data: Service usage patterns, feature engagement metrics, support conversation histories
  • Technical Markers: IP addresses, browser signatures, device specifications, operating system details

Processing Rationale and Methods

Service Delivery Operations

Your records enable core functionality. Account authentication, transaction processing, and service personalization depend on specific data elements. When you request financial analysis tools, we process relevant account information to generate insights. Communication preferences dictate how and when we reach out.

Security and Integrity Measures

Fraud detection systems analyze behavioral patterns to identify anomalous activity. This protective layer operates continuously, comparing current actions against historical baselines. Suspicious deviations trigger verification protocols before any sensitive operations proceed.

Automated decision-making occurs in limited contexts, primarily for initial fraud assessments. These systems flag potential concerns but don't unilaterally deny service. Human review always precedes any consequential determination affecting your access or standing.

Legal Compliance Obligations

Australian financial regulations mandate retention of certain transaction records. Anti-money laundering provisions require identity verification documentation. Tax reporting obligations necessitate maintaining financial activity summaries. We process only what regulatory frameworks demand, for durations those same frameworks specify.

Information Disclosure Circumstances

Records leave our direct control in specific situations. Service providers handling infrastructure operations—payment processors, cloud hosting vendors, security monitoring firms—receive limited access under strict contractual terms. These entities function as extensions of our own operations, bound by confidentiality agreements and prohibited from independent use.

Legal compulsion occasionally forces disclosure. Valid court orders, regulatory investigations, and statutory reporting requirements can mandate release of specific records. We examine such demands carefully, providing only what legal authority explicitly requires and notifying affected individuals unless prohibited.

Payment Processing Partners

Financial transaction data flows to banking institutions and payment networks as necessary to complete transfers you initiate. These entities operate under their own privacy obligations and applicable banking regulations.

Professional Advisors

Legal counsel, auditors, and consultants sometimes require access during specific engagements. Professional privilege and contractual duties govern their handling of any information they encounter.

Business Transition Scenarios

Should quarivonexo undergo acquisition, merger, or restructuring, your records might transfer to successor entities. Such transitions would occur with advance notice and only to organizations accepting equivalent privacy commitments.

We never sell personal information to data brokers, marketing aggregators, or third parties seeking customer lists. Commercial exploitation of your records contradicts our operational philosophy.

Security Architecture

Information protection relies on layered defenses rather than single mechanisms. Encryption shields data during transmission between your devices and our servers. Storage systems employ separate encryption at rest, ensuring files remain unreadable even if physical media were compromised.

Access controls operate on necessity principles. Personnel see only information relevant to their specific functions. Financial data lives in segregated environments with enhanced protections. Regular security audits test our defenses against evolving threat patterns.

No security system achieves absolute invulnerability. We invest substantial resources into protection, but acknowledge inherent risks in digital information handling. Our incident response protocols prioritize rapid detection, containment, and transparent communication should breaches occur.

Your Control Mechanisms

Access Requests

Obtain copies of records we maintain about you. Expect delivery within 30 days of verified requests, provided in portable formats where technically feasible.

Correction Rights

Challenge inaccurate or incomplete information. We'll amend records or note disputes when factual disagreements persist and cannot be resolved.

Deletion Options

Request removal of personal records subject to legal retention requirements. Active service relationships may necessitate maintaining certain information for operational continuity.

Processing Restrictions

Limit how we use specific data categories. Such restrictions might affect service availability or functionality where processing enables core features.

Objection Procedures

Oppose particular processing activities when you believe they exceed necessary boundaries. We'll cease unless compelling legitimate grounds override your interests.

Consent Withdrawal

Revoke previously granted permissions for optional processing activities. This doesn't affect past operations conducted while consent remained valid.

Exercise these rights by contacting our privacy team through channels detailed below. Verification procedures protect against unauthorized access to your records by malicious actors impersonating legitimate account holders.

Retention Duration Framework

Information persists for varying periods depending on category and purpose. Active account data remains accessible throughout your relationship with our services. Transaction histories must stay available for tax and financial reporting obligations—typically seven years under Australian requirements.

Support correspondence gets archived for three years to maintain service continuity and resolve follow-up inquiries. Technical logs expire after 18 months absent specific security investigations requiring longer preservation.

  • Identity verification documents: Seven years following account closure, per financial regulation mandates
  • Transaction records: Seven years as required by taxation law and financial auditing standards
  • Communication histories: Three years to support ongoing service relationships and dispute resolution
  • Marketing preferences: Until you withdraw consent or five years of inactivity, whichever comes first
  • Technical access logs: 18 months for security monitoring and system optimization

Once retention periods expire, systematic deletion protocols purge records from active systems. Backup archives follow separate schedules with eventual complete removal occurring within subsequent backup cycles.

Geographic Considerations

Our primary operations occur within Australia, and most information stays on Australian-based infrastructure. Certain service providers operate internationally, potentially involving data transfers to facilities in Singapore, Japan, or the United States where major cloud platforms maintain regional centers.

Such international transfers occur under contractual safeguards aligning foreign handling practices with Australian Privacy Principles. We select providers committed to equivalent protections regardless of their operational geography.

When you interact with our services from outside Australia, your information might travel internationally before reaching our systems. Internet routing sometimes follows unexpected paths, though encryption protects contents during transit regardless of geographic journey.

Children and Minors

Our services target adult users managing personal or business finances. We don't knowingly gather information from individuals under 18 without parental involvement. Discovering underage account creation triggers immediate contact with guardians and potential account suspension pending proper authorization.

Financial services carry legal responsibilities incompatible with independent minor participation. This isn't age discrimination but recognition of capacity requirements embedded in Australian financial regulations.

Policy Evolution

This document adapts as our practices develop or regulations change. Material modifications—those affecting your rights or how we handle sensitive categories—trigger direct notification to active account holders. Minor clarifications or organizational changes might appear without individual alerts, though we maintain public change logs showing modification history.

Continuing service use after notification periods constitutes acceptance of updated terms. Disagreement with modifications entitles you to close your account and request data deletion subject to legal retention obligations.

Questions and Concerns

Reach our privacy team at help@quarivonexo.com for questions about this policy or your information rights.

Postal correspondence: 7 Melittas Avenue, Coffs Harbour NSW 2450, Australia

Phone inquiries: +61 400 181 685

If our responses don't resolve your concerns, you may lodge complaints with the Office of the Australian Information Commissioner at oaic.gov.au.