Home

INSTITUTE OF SENIOR EDUCATIONAL ADMINISTRATORS OF NSW


Privacy

Copyright

Disclaimer

Contact Us


NEW MEMBERS
WELCOME


JOIN NOW



RON IKIN MEMORIAL
AWARD FOR EXCELLENCE 2016
Information

Nomination Form



WORKING TOGETHER FOR EDUCATION
webmaster@iseansw.org.au


PRIVACY STATEMENT

Security of Information

You should be aware that there are inherent risks associated with the transfer of information via the Internet.


The ISEA website provides access to other online resources, which are not under our direct control. You should read the conditions of use and other statements of these sites.


The Data We Collect – Emails and Electronic Forms

Your personal information will only be used for the purposes for which you have provided it. Your email address will not be added to a mailing list, Where you choose to send us a completed electronic form that includes your personal details, we do collect personally identifiable information, such as name, address and email address. The information collected by email or electronic forms will be used only for the purpose for which you have provided it, and we will not disclose it without your consent, except where authorised or required by law.


Publishing Personal Information

We will only publish personal information on this site if it has been collected for this purpose with your knowledge or if you have consented to the disclosure. When giving such consent, you should be aware that information published on this site is accessible to millions of users from all over the world, that search engines will index it, and that it may be copied and used by any web user. This means that once the information is published on this site, we will have no control over its subsequent use and disclosure.


The Data We Collect – Browsing

When you look at this web site, our server makes a record of your visit and logs the following information:

The data listed above is collected for the following purposes:

No attempt will be made to identify users or their browsing activities, except in the unlikely event that a law enforcement (or other government agency) exercises a legal authority to inspect ISP logs (eg, by warrant, subpoena, or notice to produce).