Terms Of Use

Prestige Properties Terms of Use

Last Updated: 1/08/2023

 

  1. Introduction

Welcome to Property Central. By accessing our website, you agree to abide by the following terms and conditions.

  1. Acceptance of Terms

By using our website, you indicate your acceptance of these terms. If you disagree with any part of these terms, please refrain from using our site.

  1. Services Description

Property Central provides real estate listing and agency services. While we strive for accuracy, we cannot guarantee that all information on our website is up-to-date or error-free.

  1. User Conduct

Users are prohibited from:

  • Posting or transmitting harmful, false, or misleading information.
  • Infringing on any third-party rights, including copyright or trademark rights.
  • Attempting unauthorized access or compromising the security of our website.
  1. Intellectual Property

All content on this website, including text, graphics, and logos, is the property of Property Central and is protected by international copyright laws.

  1. Limitation of Liability

Property Central shall not be held liable for any indirect, incidental, or consequential damages arising out of the use or inability to use our website or services.

  1. Modifications

We may revise these terms periodically. Your continued use of the site post any change signifies your acceptance of the updated terms.

  1. Governing Law

These terms shall be governed by the laws of the Commonwealth of Australia and the State of NSW.

  1. Termination

Property Central reserves the right to terminate user access at our discretion without notice for conduct that violates these terms or is harmful to other users, us, or third parties, or for any other reason.

  1. Contact

For questions or concerns regarding these terms, please contact us at info@propertycentral.com.au.

 

 

Prestige Properties Data Breach Response Plan

 

  1. Introduction This plan provides guidelines and procedures to follow in the event of a data breach to ensure a timely and effective response.
  2. Designated Response Team Assign individuals responsible for specific tasks during a data breach:
  • Team Lead: Oversees response and coordinates efforts.
  • IT Specialist: Addresses and investigates the technical aspect of the breach.
  • Legal Advisor: Provides advice on legal obligations and potential liabilities.
  • Communications Manager: Handles internal and external communications.
  1. Identification and Initial Assessment
  • Detection: Use system logs, user reports, or external sources to detect potential breaches.
  • Initial Assessment: Determine the scope and impact of the breach. What data was accessed, and how severe is the breach?
  1. Containment
  • Short-term: Take immediate action to contain the breach. This could mean isolating a compromised server or changing access credentials.
  • Long-term: Identify how the breach occurred and patch vulnerabilities to prevent similar future breaches.
  1. Eradication Identify the root cause of the breach and remove affected systems from the environment until they can be securely reinstated.
  2. Recovery Reinstate systems and data, ensuring all vulnerabilities are addressed.
  3. Notification
  • Notify affected individuals about the breach, providing details on what was compromised and steps they can take.
  • Notify relevant authorities or regulators as required by law. This might include data protection agencies or law enforcement.
  1. Evaluation
  • Post-Incident Analysis: Review how the breach happened and the effectiveness of the response.
  • Recommend Improvements: Make recommendations for preventing similar breaches in the future and improving the response process.
  1. Documentation Document every step taken during the response, from detection to recovery. This not only aids in post-incident analysis but also helps prove due diligence in case of legal repercussions.
  2. Training Regularly train staff on data protection best practices and conduct drills on how to respond in case of a breach.
  3. Review Continuously update the response plan based on lessons learned from any breaches and changes in the organization or the external environment.