Special Offer

Free IT Security Audit*

Cully Systems Policies

Welcome to the Cully Systems Policies page. Here you will find detailed information about our Security Policy, Privacy Policy, and Terms of Use. Please expand each section below to read the full policies.

Security Policy

Cully Systems Security Policy

Introduction Cully Systems is committed to ensuring the security of our clients’ data and information. This Security Policy outlines our measures to protect data against unauthorized access, breaches, and other security threats, following the Essential Eight strategies recommended by the Australian Cyber Security Centre (ACSC).

Data Protection Measures Cully Systems implements the Essential Eight strategies to various maturity levels, ensuring comprehensive cybersecurity:

  1. Application Control:

    • Maturity Level 1: Allow only approved and trusted applications to execute.
    • Maturity Level 2: Regularly update the list of approved applications.
    • Maturity Level 3: Enforce strict policies to block untrusted applications.
  2. Patch Applications:

    • Maturity Level 1: Apply security patches within a month of release.
    • Maturity Level 2: Apply patches within two weeks for applications with known exploits.
    • Maturity Level 3: Apply patches within 48 hours for critical applications.
  3. Configure Microsoft Office Macro Settings:

    • Maturity Level 1: Block macros from the internet.
    • Maturity Level 2: Only allow macros from trusted locations.
    • Maturity Level 3: Disable all macros unless explicitly allowed by IT.
  4. User Application Hardening:

    • Maturity Level 1: Disable unneeded features in applications.
    • Maturity Level 2: Remove or disable vulnerable plugins and settings.
    • Maturity Level 3: Regularly review and harden application configurations.
  5. Restrict Administrative Privileges:

    • Maturity Level 1: Limit administrative privileges to essential personnel.
    • Maturity Level 2: Use multi-factor authentication for administrative accounts.
    • Maturity Level 3: Regularly review and revoke unnecessary administrative privileges.
  6. Patch Operating Systems:

    • Maturity Level 1: Apply security patches within a month.
    • Maturity Level 2: Apply patches within two weeks for systems with known exploits.
    • Maturity Level 3: Apply patches within 48 hours for critical systems.
  7. Multi-Factor Authentication:

    • Maturity Level 1: Use multi-factor authentication for remote access.
    • Maturity Level 2: Enforce multi-factor authentication for all users.
    • Maturity Level 3: Implement additional authentication measures for high-risk users.
  8. Regular Backups:

    • Maturity Level 1: Conduct weekly backups of essential data.
    • Maturity Level 2: Perform daily backups and store them securely offsite.
    • Maturity Level 3: Test backups regularly to ensure data integrity and quick recovery.

For more details on the Essential Eight strategies and maturity levels, please refer to the Essential Eight Maturity Model by the Australian Cyber Security Centre.

Client Responsibilities

  1. Secure Credentials: Clients are responsible for maintaining the security of their login credentials and for any activities performed under their accounts.
  2. Reporting Incidents: Clients should report any suspected security incidents or breaches to Cully Systems immediately.
  3. Compliance with Policies: Clients must comply with all relevant Cully Systems policies and procedures regarding data security.

For further details, please contact us.

Terms of Use

Cully Systems Terms of Use

Introduction Welcome to Cully Systems. These Terms of Use govern your access to and use of our services. By using our services, you agree to these terms.

Service Use

  1. Eligibility: You must be at least 18 years old to use our services.
  2. Account Security: You are responsible for maintaining the confidentiality of your account information and for any activity that occurs under your account.
  3. Prohibited Activities: You agree not to use our services for any unlawful or unauthorized purpose.

Intellectual Property All content and materials provided by Cully Systems are protected by intellectual property laws. You may not use, reproduce, or distribute any content without our explicit permission.

Limitation of Liability Cully Systems is not liable for any direct, indirect, incidental, or consequential damages arising from your use of our services. Our liability is limited to the maximum extent permitted by the laws of South Australia.

Governing Law These Terms of Use are governed by the laws of South Australia, without regard to its conflict of law principles.

Changes to Terms We may update these Terms of Use from time to time. Any changes will be posted here, and continued use of our services constitutes acceptance of the updated terms.

Security Measures Cully Systems employs rigorous security measures to protect your data, in accordance with the Essential Eight strategies outlined by the Australian Cyber Security Centre. This includes application control, patching, configuration of macro settings, user application hardening, restriction of administrative privileges, operating system patching, multi-factor authentication, and regular data backups.

Customer Responsibilities

  1. Compliance: Customers must comply with all relevant laws and regulations while using our services.
  2. Data Security: Customers are responsible for ensuring that their systems and data are protected in line with our security recommendations.
  3. Notification: Customers must promptly notify Cully Systems of any security breaches or unauthorized access to their accounts.

For more information, including our adherence to these security practices, please contact us directly.

Privacy Policy

Cully Systems Privacy Policy

Introduction Cully Systems values your privacy and is dedicated to protecting your personal data. This Privacy Policy explains how we collect, use, and safeguard your information.

Data Collection We collect personal data to provide and improve our services. This includes:

  1. Contact Information: Name, email address, phone number, and other contact details.
  2. Service Usage Data: Information about how you use our services, including log files and usage patterns.
  3. Payment Information: Billing details and payment method information.

Data Use Your data is used for the following purposes:

  1. Service Provision: To deliver and manage our services effectively.
  2. Customer Support: To assist with inquiries and provide support.
  3. Marketing: To send promotional materials, with your consent.
  4. Improvement: To analyze service usage and enhance our offerings.

Data Retention We retain your personal data only as long as necessary to fulfill the purposes outlined in this policy or as required by law.

Your Rights You have the right to:

  1. Access: Request access to your personal data.
  2. Rectification: Request correction of inaccurate data.
  3. Deletion: Request deletion of your data, subject to legal obligations.

Data Security Cully Systems implements a variety of security measures to maintain the safety of your personal data. These measures include encryption, access controls, and regular security audits in line with the Essential Eight strategies recommended by the Australian Cyber Security Centre.

Third-Party Disclosure We do not sell, trade, or otherwise transfer your personal data to outside parties without your consent, except as required by law.

International Data Transfers Cully Systems may transfer your personal data to countries outside of South Australia, provided that adequate protections are in place as required by applicable data protection laws.

Changes to this Privacy Policy We may update this Privacy Policy from time to time. Any changes will be posted here, and where appropriate, notified to you by email. Your continued use of our services after any changes indicates your acceptance of the updated policy.

For more information, please contact us directly.

Contact Us

We would love to hear from you!

Whether you have questions about our services, need support, or want to discuss a custom solution for your business, our team is here to help.

Experienced professionals providing expert IT solutions.

Reliable 24/7 support to keep your business running smoothly.

Tailored services to fit your unique business needs.

Send A Message

Fill in this form and we will get back to you soon to discuss what we can do for you.