Privacy Policy
Effective Date: 15 January 2025
syrenolivar operates syrenolivar.com — a budget monitoring platform designed for individuals seeking clarity around their financial patterns. What follows explains how information about you enters our system, what happens during its time with us, and the boundaries we maintain around its movement and retention.
How Information Arrives
Your details reach us through three distinct pathways, each serving different operational needs.
Direct Provision
When creating an account or adjusting settings, you hand over specifics: name components, contact coordinates, authentication credentials. Payment processing requires financial instrument details and billing locations. Reaching out through support channels brings correspondence content and any attachments you choose to include.
Automatic Capture
System interactions generate technical records without conscious input from you. Device fingerprints, network identifiers, software versions, and access timestamps accumulate as you navigate. Budget entries, category assignments, and feature usage patterns create behavioral maps of how you employ our tools.
External Sources
Third-party authentication services (when you authorize connection) transmit profile elements they hold. Payment processors confirm transaction outcomes and fraud indicators. Australian financial institutions, when you've granted integration permissions, deliver transaction feeds and account balance snapshots.
Why This Information Matters
Every category serves defined functions. We don't gather for gathering's sake.
Service Delivery Functions
Account credentials authenticate your identity. Budget data enables calculations, trend analysis, and alert generation. Contact details facilitate password recovery and account notifications. Payment information processes subscriptions and manages billing disputes.
Operational Requirements
Technical logs diagnose system failures and identify security anomalies. Usage patterns guide feature development priorities. Support correspondence history prevents repetitive troubleshooting. Behavioral analytics reveal where users struggle or succeed with our interface.
Performance optimization depends on understanding which tools get ignored and which become daily habits. When server response times lag in Sydney versus Melbourne, network logs expose infrastructure bottlenecks. If budget import failures spike on Tuesday mornings, transaction records pinpoint the culprit bank feed.
Information Movement Beyond Our Walls
Your details don't stay confined to our servers exclusively. Strategic disclosure happens under specific circumstances.
Service Infrastructure Partners
Cloud hosting providers in Australian data centres store your encrypted records. Email delivery services transmit password resets and budget alerts. Payment gateways process subscription charges and refunds. These entities operate under contractual restrictions about secondary use and retention limits.
Mandatory Legal Disclosures
Valid Australian court orders, subpoenas with proper jurisdiction, or regulatory investigations can compel production of account records. Tax authorities examining financial platform compliance might request aggregated transaction patterns (stripped of personal identifiers where legally permissible). We challenge overbroad requests but ultimately comply with enforceable legal process.
Business Transition Scenarios
Should syrenolivar merge with another entity, get acquired, or restructure ownership, your information travels with the asset transfer. Successor organizations inherit the obligations outlined here unless they secure your explicit consent for changes.
What We Don't Do: Sell your budget details to data brokers. Rent email lists to marketing platforms. Share spending patterns with advertisers. Provide unencrypted access to third parties without contractual safeguards.
Security Measures and Honest Limitations
Protection mechanisms span multiple layers, yet absolute invulnerability doesn't exist in networked systems.
Financial records stay encrypted at rest using AES-256 standards. Transmission between your device and our servers travels through TLS 1.3 channels. Authentication requires password complexity meeting current OWASP guidelines, with optional two-factor reinforcement. Database access gets restricted to credential-holding personnel with legitimate operational needs. Intrusion detection systems monitor for suspicious access patterns.
Despite these controls, determined adversaries sometimes breach defences. Australian banks with billion-dollar security budgets suffer occasional compromises. We're candid that risks persist: insider threats, zero-day exploits, social engineering attacks targeting our staff. Should a breach occur affecting your information, you'll receive notification within timeframes Australian Privacy Principles mandate — typically 72 hours after we've confirmed the scope.
What Control You Retain
Australian privacy law grants specific rights over information we hold about you. Exercise varies by circumstance.
- Access Requests: You can demand copies of what we've stored. We'll provide exports in common formats (CSV, JSON) within 30 days unless volume requires reasonable extension.
- Correction Rights: Spot inaccuracies in your profile or budget records? Flag them through account settings or support channels. We'll update within 10 business days after verification.
- Deletion Demands: Request account closure and information purging. Within 60 days, we'll erase records unless retention serves legitimate dispute resolution (e.g., outstanding payment conflicts) or legal compliance needs.
- Processing Objections: Object to specific uses like analytics for feature development. We'll cease unless processing serves essential service delivery (can't deliver budget alerts without analyzing your spending data).
- Export Portability: Retrieve your budget data in structured formats compatible with competitor platforms. Available within 14 days of request.
To invoke these rights, email support@syrenolivar.com with "Privacy Request" in the subject line. Include account email and specific action desired. We'll verify identity before proceeding — sometimes requiring additional confirmation if the request originates from unfamiliar locations or devices.
How Long Information Persists
Retention spans vary by category and purpose. Not everything vanishes the moment you close your account.
| Information Type | Active Account Retention | Post-Closure Retention |
|---|---|---|
| Budget transactions and categories | Duration of account life | 90 days (dispute resolution window) |
| Authentication credentials | Until password change | Immediate hash deletion |
| Payment history and invoices | Full account history | 7 years (Australian tax requirements) |
| Support correspondence | 3 years from last message | 1 year (quality improvement analysis) |
| System access logs | 18 months rolling | 6 months (security investigation needs) |
| Marketing preferences | Until you change settings | Immediate removal |
After retention periods expire, deletion happens through automated purge routines. Backup systems maintain copies for additional 30 days before overwriting. Once backups cycle through, recovery becomes technically impossible.
Legal Foundations for Processing
Australian Privacy Principles and applicable state legislation establish when organizations can handle personal details. Our justifications vary by activity type.
Contractual Necessity: Delivering budget monitoring requires processing your financial data — you can't use the service otherwise. This forms the bedrock justification for core feature operations.
Legitimate Interests: Fraud prevention, system security, and service improvement represent valid organizational needs that typically override minor privacy intrusions. We balance these against your reasonable expectations.
Legal Obligations: Tax record retention, suspicious activity reporting (under Anti-Money Laundering legislation), and court-ordered disclosures create mandatory processing scenarios regardless of your preferences.
Explicit Consent: Optional features like third-party analytics integration or beta program participation require your affirmative agreement. You can withdraw consent anytime through account settings without affecting core service access.
Geographic Considerations
syrenolivar operates from Australia, storing information on servers within Australian data centres. Our primary legal obligations arise under Australian Privacy Principles within the Privacy Act 1988.
If you access syrenolivar.com from locations outside Australia, your information still flows to Australian infrastructure. Some service providers (particularly cloud hosting and content delivery networks) maintain distributed systems that might temporarily cache data across multiple regions for performance reasons. These arrangements include contractual terms requiring Australian privacy law compliance.
International users should recognize that Australian privacy protections might differ from their home jurisdiction — sometimes more stringent, occasionally less so. European Union residents, for instance, enjoy GDPR rights that exceed Australian Privacy Principle requirements in certain areas. Where practical, we accommodate stronger protections regardless of technical legal obligations.
Young Users and Capacity
syrenolivar's services target adults managing independent financial lives. We don't knowingly collect information from individuals under 18 without parental or guardian consent.
If you're a parent discovering your child created an account without permission, contact us immediately. We'll delete the account and associated records within 72 hours of verification. Australian law regarding digital consent for minors remains somewhat ambiguous — we've adopted conservative interpretations favouring protection over access.
Changes to These Terms
Privacy practices evolve as regulations shift, threats emerge, and features expand. When modifications affect how we handle your information, you'll receive advance notice.
Significant changes trigger email notifications to your registered address at least 30 days before taking effect. Minor clarifications (fixing typos, updating contact details) happen without fanfare. The effective date at the top of this document reflects the most recent update.
Continued use after changes take effect constitutes acceptance. If updates prove unacceptable, you can close your account before the effective date — we'll apply previous terms to your information during the transition period.
Reaching Our Privacy Team
16/7 Salisbury Rd
Castle Hill NSW 2154
Australia
(Subject line: Privacy Inquiry for faster routing)
(Business hours: Monday-Friday, 9:00-17:00 AEST)