Data Handling & Retention PolicyBuilt to Scale Your Business
How Coastal Programs processes, protects, and manages data through automation services — secure, transparent, and compliant with Australian standards.
Data Handling & Retention Policy
Effective Date: 11 August 2025
Service Provider: Jake Rino Schepis trading as Coastal Programs
ABN: 12 340 373 046
Compliance: Privacy Act 1988 (Cth), Australian Privacy Principles
Our Data Handling Approach
This policy details how Coastal Programs processes, stores, and protects data across different service contexts. We maintain distinct handling procedures for website visitor data (which we control) and client project data (which we process on behalf of clients).
1. Data Categories & Processing Context
Visitor & Business Data
Data we control for our operations:
- • Website analytics and usage patterns
- • Contact form submissions and inquiries
- • Business communications and proposals
- • Project documentation and contracts
- • Invoicing and payment records
Client Project Data
Data we process for client services:
- • Customer inquiries and form submissions
- • Automated workflow data and triggers
- • System integration data flows
- • Communication logs and chatbot interactions
- • Business process automation data
Data Controller vs Processor: For visitor data, we are the data controller making decisions about processing. For client project data, we are a data processor following client instructions while maintaining appropriate security and compliance measures.
2. Platform Processing & Security
Processing Platforms
We utilise various trusted platforms to deliver automation services. Each platform is selected based on security standards, compliance certifications, and data protection measures:
Website Operations
- • Analytics platforms (visitor tracking)
- • Contact form processors
- • Customer support tools
- • Communication services
Client Automation Services
- • Workflow automation platforms
- • Database and storage services
- • Integration and API platforms
- • Business communication tools
Security Standards
Technical Measures
- • End-to-end encryption for data transmission
- • Encrypted storage across all platforms
- • Multi-factor authentication required
- • Regular security audits and monitoring
Administrative Controls
- • Access limited to authorized personnel
- • Confidentiality agreements with team members
- • Regular staff training on data protection
- • Incident response procedures maintained
3. Cross-Border Data Transfers
International Processing: Some platforms process data outside Australia, primarily in the United States and European Union. We implement safeguards under Australian Privacy Principle 8.
Transfer Safeguards
- Standard Contractual Clauses (SCCs): Binding agreements with overseas processors ensuring adequate protection
- Data Privacy Framework (DPF): Utilisation of DPF-certified platforms where available
- Platform Security Assessments: Regular review of security measures and compliance certifications
- Data Minimisation: Only necessary data is transferred to overseas platforms
- Client Notification: Transparency about platform locations and security measures
Compliance Monitoring
- Quarterly assessments of platform compliance and security standards
- Ongoing monitoring of legal and regulatory changes affecting data transfers
- Client right to object to specific platform usage with reasonable alternatives
- Regular review and updating of data processing agreements
4. Automated Processing & Decision-Making
Our automation services include computer programs that process data and may make decisions affecting individuals:
Website Automation
- Chatbot responses: Automated customer service based on inquiry patterns
- Form routing: Automatic assignment of inquiries to appropriate departments
- Analytics processing: Automated analysis of website usage and visitor patterns
Client Project Automation
- Workflow triggers: Automated actions based on predefined business rules
- Communication automation: Email, SMS, and notification scheduling
- Data synchronisation: Automated updates between integrated systems
Human Review Available: You can request human review of any automated decision that significantly affects you. Contact us for information about the logic involved in automated processing.
5. Data Retention & Deletion
Business & Legal Records
- Tax & Financial Records: 7 years (Australian tax compliance requirement)
- Contracts & Agreements: 7 years post-completion (business record keeping)
- Business Communications: 3 years (operational purposes)
- Insurance & Legal Documents: 7 years or as required by law
Project-Specific Data
One-Off Projects
- • Active project data: Duration of project
- • System credentials: Deleted immediately upon completion
- • Project files: 30 days post-delivery (support period)
- • Client access data: Deleted after successful handover
Ongoing Services
- • Active service data: Duration of service relationship
- • System access: Maintained during active engagement
- • Operational data: 90 days post-termination
- • Backup data: Automatically purged within 90 days
Website & Analytics Data
- Website Analytics: 26 months (Google Analytics default, business insights)
- Contact Form Data: 3 years (business relationship management)
- Marketing Communications: Until unsubscribed + 3 years (compliance)
- Support Conversations: 2 years (service improvement and training)
6. Your Rights Under Australian Privacy Law
For Visitor Data
Data we control about you:
- • Access your personal information
- • Correct inaccurate information
- • Request deletion where permissible
- • Lodge complaints about handling
- • Object to certain processing
For Client Project Data
Data we process for clients:
- • Contact the relevant client business directly
- • We can facilitate data requests as processor
- • Client controls most data handling decisions
- • We assist with technical implementation
- • Security complaints handled by us directly
Making Requests: Contact us with your request including sufficient information to identify the data in question. We'll respond within reasonable timeframes and may need to verify your identity before processing requests.
7. Data Breach Response
In the event of a data breach affecting personal information:
Immediate Response (0-24 hours)
- Breach containment and security assessment
- Risk evaluation and impact analysis
- Preliminary incident documentation
- Internal team notification and coordination
Notification (24-72 hours)
- OAIC notification if required under NDB scheme
- Affected client notification (immediate for data processor breaches)
- Individual notification if likely risk of serious harm
- Regulatory cooperation and compliance assistance
Post-Incident (Within 7 days)
- Comprehensive incident report and lessons learned analysis
- Implementation of additional security measures to prevent recurrence
- Review and update of security procedures and training materials
- Ongoing monitoring and support for affected individuals and clients
8. Contact & Data Protection
Data Protection Inquiries
External Complaints: If you're not satisfied with our response to privacy concerns, you can lodge a complaint with the Office of the Australian Information Commissioner (OAIC).
OAIC:www.oaic.gov.au or phone 1300 363 992
9. Policy Updates & Reviews
We review this data handling policy quarterly and update it as needed to reflect changes in our services, platforms, legal requirements, or security measures. Material changes affecting data processing will be communicated to active clients with appropriate notice periods.
Version Control: The effective date at the top of this policy indicates when it was last updated. Previous versions are maintained for reference and compliance purposes. Significant changes are highlighted to existing clients through direct communication.