AH Professional Services
AH Professional services have provided people, products and services to many organisations since 1991 and we have recently expanded our operations to include service provided by our offshore operations. We however offer a Western Australian based service provider in many of the areas that many organisations have indicated that they have an interest in managed services.
Given the emergence of disruptive technologies and their influence on how customers are engaged, it is important to stay current, agile and stable with the rapidly changing state of your industry. It is also important to take advantage of emerging technology platforms such as social media, mobile technologies, big data analytics and cloud-to drive business and performance. AH Professional Service’s Enterprise Architecture services focus on ensuring that our customers achieve both of these goals.
Enterprise Architecture Program Enablement
Our service starts with an assessment of the existing Enterprise Architecture Program against a Reference EA Operating Model and a Maturity Model. Based on the objectives and needs of the customer, a roadmap towards a target maturity level is developed. We help establish the program with:
- Starter repository of architectural principles, standards and artifact templates
- Enterprise Architecture processes, including governance, roles and responsibilities
- Optionally offer an innovation lab to help in keeping up with technological advancements
- Support the path to the desired maturity by providing our own consultants to fill skills, resource gaps and cross-training
Architecture Blueprinting Service
Our service helps detail all the necessary stakeholder views of any state of an Enterprise Architecture, current state, future state or any transitional state.
Views may include:
- A Core diagram showing how the Application Architecture, Information Architecture and Technology Architecture support the Business Capabilities
- Integration View
- Information Security View
- Other Views as needed
Innovation as a Service
This service leverages AH Professional Service’s technology R&D and maintenance of a Technology Radar. We are constantly looking at emerging technologies and researching their application.
We plan, setup and test at our cutting edge innovation lab for the customer where testing and certification is done using targeted pilot innovation concepts. After that, we provide ongoing managed services to operate the lab.
IT Asset and Financial Management
We help companies reduce and control IT equipment costs dramatically.
Through standardization, proper documentation and loss detection, you can mitigate risk, improve your inventory control and support strategic decision-making.
Business and IT Strategy Alignment
Our service provides advice on creating competitive advantages by leveraging IT to transform business operations. Our consultants speak the language of business and IT to provide:
- Holistic analyses of an IT organization, including business-IT alignment, technology, operations, governance and processes
- End-state definition, including target portfolio, infrastructure, governance, Program Management Office, architecture, strategic sourcing and staffing models
- Cost-benefit analysis to evaluate value proposition
- Near-term and long-term implementation roadmap from current to desired future state
Application Portfolio Rationalization
Our systematic approach to portfolio rationalization helps determine the best option for each IT application or asset analyzed based upon its value. Options range from retention, to application phase-out, to remediation (rewrite) or outsource. Services include:
- Align business-IT so that IT works on what’s most valuable
- Establish a quantitative baseline of the efficiency and effectiveness of the current application landscape for better decisions
- Effect changes in the application portfolio (retirements, consolidation) for immediate payback
- Provide valuable input to senior management to improve IT organizational effectiveness
Information Architecture Services
From strategy to delivery, our Enterprise Information Management practice offers:
- Strategic, advisory and management consulting across Enterprise Information Management, Business Intelligence and Analytics
- Strategic, advisory and implementation services for next‑generation technologies such as Big Data Analytics, Mobile and Cloud BI
- Enterprise performance management solutions spanning business strategy and enterprise metrics definitions
- End-to-end information management services including data management, data integration, data quality and data governance
Other Enterprise Architecture Services
Many other architectural domain-specific and pattern-specific services available.
Security Architecture is about ensuring all of the loose ends are tied up. That is the developers have the knowledge about the amount of protection that the infrastructure can provide and the infrastructure and network teams understand the risks that new software will be to the organisations.
Security for most organisations is an afterthought that comes after functionality and price negotiations of a new product or development. AH Professional Services encourages the organisation to identify the information assets that the product will store, process or create and make a determination of the value of the asset in terms of loss, corruption and unauthorised disclosure. This risk based process takes in the consequence and likelihood of each and then factors to give a protection value. This value is used to determine what technology, processes or procedures are required to protect the asset. Information assets should be treated in a similar way to physical assets and human assets, that is protect them from the risks that they are exposed to in normal operation.
Information assets differ in the following ways to other assets:-
- Information assets duplication do not increase their value;
- There are many unknown actors that are in play that are not business stakeholders;
- Information assets can both be stolen and still in its original location;
- Information assets can be both working for and against your organisation
- The organisation may only be the custodian of the Information Asset not its owner
- The owner of the Information Asset values the Asset differently to the Organisation
AH Professional Services encourages organisations to treat security in a similar way they do to safety. Safety is about the protection of humans and security is about the protection of other assets including information assets.
For CBH the outcomes of an annualised engagement will be to peer review issues, artefacts and responses the CBH ICT Security Officer and general consulting on how to achieve an improved security stance each and every year within budget constraints and the assistance in creating project outlines and business cases to achieve this improved information security. With our penetration and security assessment services we are able to use this information to better prepare for emerging threats.
These services can be consumed at the general daily rate of $1,500 or an annualised fee. The annualised fee is paid monthly in advanced and equates 0.5 days offshore and 0.5 day local services per week.
AH Professional services can provide solution architecture services across a large cross-section of technologies. This cross-section expands the possible solutions across the People, Process and Systems and generally is in response to a business requirements document, request for architecture document, a business engaged workshop or adhoc requests.
Depending on the organisations internal architecture focus these solutions can be driven on the “EA Gaps & Goals”, “Business Capability” or others methods. “EA Gap & Goals” compares each request to the EA Principles, stated long term objectives and maps these to the business requirements. The analysis then determines if the Enterprise Architecture should be expanded or waivers given to achieve the outcomes of the requirements. It also attempts to cost the waivers and provide the business stakeholders with a true cost to achieve the benefit requested. In this manner the business and ICT can make informed decisions on the enterprise debt being accumulated by issuing waivers. The solution clearly articulates the method that each requirement is achieved and which of these require waivers or change in architecture.
The “Business Capability” method maps the current and required state across the business capability and then maps these capabilities to the Enterprise Architecture view of each capability. The EA principles, practises and guidelines should have already been applied to the capability for the short, medium and longer term. This then enables the solution to identify either required changes to the EA view of the capability, the requirement of a waiver to the EA view and the costs involved.
AH Professional Solution undertakes this work on a case-by-case basis and can provide fixed cost engagements or an estimate and time and materials billing at the organisations discounted hourly or daily rate.
The Strategy, Policy and Planning services seeks to assist Senior IT Management achieve develop, plan, communicate and measure key IT strategic initiatives. AH Professional Services is able to bring best practise principles, process and methodologies to Western Australian organisations in a pragmatic way. Cutting through the hype and ensuring that the essence on the best practise is conserved with the right level of governance, implementation and monitoring for your organisations size, complexity and maturity level.
AH Professional Services has working with the following frameworks to varying levels:
Most organisations however work in a hybrid world of frameworks, some of these are mandatory for compliance; others are to ensure governance, architectural, security and/or operational efficiency. AH Professional services can assist in taking the mix match of frameworks and create a unifying framework for your organisation.
We tend to recommend:-
• The adoption of Cobit as the governance framework
• ITIL be adopted and adapted used for IT operations
• TOGAF and Prince2/PMBOK or Agile methodologies for IT delivery (most organisations use a mix depending on the complexity of the projects)
These recommendations are based on current best practise, availability of resources and experience in organisations of various sizes.
Each of these is implemented as pragmatically as possible without “Throwing the baby out with the bath water”. We believe that cutting frameworks to their essence while maintaining some of the rigor that framework gives, allows organisations to clearly articulate what they doing, why they are doing it and show meaningful measures and benefits to the business executives.
Many IT managers understand what is required to maintain or improve their areas but lack the skills to create the required impact in presentations and business cases to communication the needs and the benefits the initiative will create. AH Professional Services can assist with the capture of these important initiatives and assist with creation of presentation materials and business case with corporate strategic goals in mind.
We find that a continuous engagement with limited hours gives the highest benefit for this type of service. This annual service is based on one to three days per week with a mix of onsite and remote achieves the benefits required. At times of high strategy development, budget and project estimate periods the mix is more onsite with other periods being balanced to match requirement.
With extensive financial modelling skills and experience AH Professional services can perform data and informational analysis to ensure these documents and backed by solid modelling and can be articulated with confidence by IT senior managers.
Some offshore documentation, presentation creation, data entry and graphics is included in this service but under the direction of Daniel Kikalis who would be the onshore resource for this service. Daniel is also available to assist with vendor, meetings and can assist with contract assessment and negotiation tasks in conjunction with or on behalf of the client.
IT organisations are under constant pressure to develop and implement policies. AH Professional Services had had extensive experience in creating IT related frameworks, policies and guidelines. Rarely do we start from scratch and use our library of other organisations policies to get a head start. We then consult with the organisation to fine-tune them and socialise the content. Some policies require education, training, promotional materials to be created to help communication the message.
Our design team offshore handle much of this in cooperation with the clients design teams.
Cloud & Infrastructure Services
Success in the cloud begins with a sound strategy
AH Professional Services help you choose the optimal cloud environment to maximise value and minimise risk. With Cloud Strategy and Roadmap services, we will enable you to better understand what Cloud is to your business, and have the confidence to decide on moving forward with a strategy plan. We’ll help you in developing and adopting a Cloud Strategy aligned to your key business objectives and, together with you, create a Cloud Roadmap that gets you where you need to be sooner.
Amazon Web Services
Mix and match both public and Private cloud technologies to best suit your business needs
AH Professional Services provides Office 365 consulting services to enable multifaceted cloud collaboration in your enterprise. With years of SharePoint consulting and development experience coupled with hands-on expertise in Microsoft Azure, we help our customers create powerful cloud-hosted solutions comprising various Office 365 features.Under Development.
We help your businesses
- Migrate Email to o365 Exchange Online
- Migrate Documents to Sharepoint Online
- Untangle with Sharepoint, Teams & Onedrive
- Implement Teams and/or Skype for business
- Integrate Teams or Skype to your phone system
Converged telecommunications is more than a buzz word. AH Professional Services will assist your organisations achieve the right communications strategy across your user and device base. Voice and video integrated into your business base
Knowing how vulnerable you are is the first step in creating and managing a robust security policy. AH Professional Services can help you identify vulnerabilities and how to manage them. AH Professional Servicdes gathers information on the target in several ways using its proprietary methodology. All publicly accessible information is collected and documented. Once sufficient information is collected about the client, the information is verified to ensure that the assessment is performed against the correct targets. The selected hosts are then scanned to reveal the exposed services.
The exposed services are compared against business requirements. Services which are not provided to meet a defined business need are documented. If there is a more secure method of providing the same business function at lower risk, this is also documented at this stage. The exposed services are then interrogated for useful information.
This information is used to increase the probability of discovering a vulnerability which may be exploited. Any disclosure of sensitive information will be highlighted at this point. The client is then presented with a report showing:
- The difficulty and likelihood of the vulnerability being exploited;
- The reason why an attacker may desire to exploit the vulnerability; and
- The impact on the business should the vulnerability be exploited
Over the years, we have developed an impressive list of clients who trust us to provide them with security products and services.
Every company uses information technology in a unique way to enable and empower their business. Securing that technology is just as important. There is no point applying the same tests to a law firm, that we would to a merchant bank, or apply the commerce tests we do for an online store against a local council. Beware of companies that offer you a penetration test with no more than a few quick questions on what you are running!
Penetration testing should go far beyond proving it is possible to break into a system. It should explore the impact of the compromise and give a business answer to the threats an organisation faces. A client may not care that a development SQL server is vulnerable – but if that server is joined to the domain, we can demonstrate that it almost always allows an attacker to gain full access to the entire network. Likewise, a vulnerable firewall might not be important if the vulnerability cannot cause loss or embarrassment to the business. This type of analysis will assist you in directing security strategies and efforts. This makes penetration testing a need rather than an optional endeavour.
Our ethical hackers can perform a range of assessments that simulate attack testing scenarios from individuals with varying degrees of knowledge and access to your systems:
Internal Penetration Testing: In this type of penetration testing, our security consultants try to break in to your network from within the company intranet. This is useful for organisations that separate different resources to different network segments. This is also to see if your network is susceptible to disgruntled or careless employees or contractors with legitimate access to the corporate network.
External Penetration Testing: In this type of penetration testing, our security consultants try to break into your network from outside or another network. This service is useful to ensure that your public facing networks are secured and cannot be breached by hackers.
Wireless Penetration Testing: In this type of testing, we try to ensure that your wireless is secure and separated from your network so that intruders cannot access your network through a wireless link. This is useful for organisations that have a large-scale wireless network infrastructure.
Application Penetration Testing: We test your custom public-facing web applications to ensure that they are not exploitable by intruders, and can test it right down to the software code.
Firewall Auditing Services
An organisation’s firewall is only effective if it has been implemented properly with a thorough and accurate rule-base. As hackers become more vicious and threats become more ubiquitous, it is essential that companies routinely evaluate their firewall’s success at keeping these threats at bay.
Is your firewall meeting expectations?
Have you inherited new or legacy firewalls through technology transfers or acquisitions?
AH Professional Services’ Firewall Auditing Services provide answers to these questions and more. This service audits your firewall and your firewall rule-base through a methodology that recommends techniques to optimize and enhance your firewall’s robustness.
For any company that doesn’t have a dedicated security expert, analyzing the output of firewalls can be daunting. Differentiating between suspicious traffic and malicious traffic can be difficult.
A good firewall audit goes beyond checking your rule base for insecure and unused rules. Have you considered:
- Whether your VPNs are using broken encryption and hashing protocols?
- Whether unsafe services like SNMP and telnet are running?
- Whether your firewall has over-ridden unsafe defaults?
- Whether you are logging sufficient details to prosecute a hacker if something goes wrong?
- Whether your administration accounts and all their passwords are configured to best practices?
AH Professional Service’s Firewall Audit is a two-phased process. The initial data-gathering phase evaluates the firewall setup, rule-base and exposed services. In the second phase, a comprehensive reporting of all phase-one findings are detailed, documented and reviewed with the customer.
AH Professional Services’ industry-certified security professionals will meet with you to determine the state of the current network, usage policies, expected application data flows and to define specific goals related to the firewall audit.
To learn more about the AH Professional Services’ Firewall Auditing Services and how we can deliver results to your organization, contact us today.
Our services and solutions are considered “best of breed” by leading bodies within the IT security space. Furthermore, by conducting in – depth evaluation, Content Security ensures that we are providing high value to our clients, who include federal and state government, large enterprise, local government, healthcare, small and medium business and other leading institutions in Australia.
Data Protection & Management
- Data Encryption
- Database Security & Auditing
- Data Loss Prevention
- Managed File Transfer
Device Protection & Management
- End Point & Gateway Security
- Patch Management
- Mobile Device Security & Management
- Virtualisation Security
Network Protection & Management
Web Protection & Management
Identity and Access
AH Professional Services understands that support and implementation services for the Identity and Access management tools from most of the major vendors, most clients voice concerns with the lack of skilled people available within WA and the cost of interstate services being very prohibitive.
To this end, AH Professional Services propose that at our cost, our consultants, undertake adequate training to a level suitable to support the implementation and the ongoing support and maintenance services for the products owned by our clients. These skills will also be transferred to our offshore staff for day-to-day tasks and development activities as required by our clients.
Further AH Professional Services, with the initial support of client Infrastructure, will configure and keep current a virtual playpen with client’s configuration at our premises or on our hosting partners. This playpen will be used to do a proof of concepts and also assist with the development of new automated services for the clients self-service Identity and Access Management portals.
At the client’s option, AH Professional Services in an expanded security context will perform and report any re-certification of key security accounts such as administration accounts, computer room access, developer and test access and any other service provided by the selected identity and access management tool. This could include regular reports to ICT management on accounts that have different access to those given by the product.
Over time we could move this to an automatic block of the account or removal of the additional access. The goal is to ensure that the identity manager is the source of truth for access fulfilment.
As new services are added, to the solution AH Professional Services will also look at fully automating the account and access fulfilment. These services can be consumed at the general daily rate of $2,000 or an annualised fee. The annualised fee is paid monthly in advanced and equates two days offshore and half a day local support.
In most organisations there are legacy systems that have no natural upgrade path and the platform may no longer be supported, however are still consider necessary for the business. History shows that these systems are expensive to maintain and support as the skill base is getting smaller every year. AH Professional Services has an innovative offer to resolve this issue.
If the organisation owns the intellectual property or can gain approval from its owner, AH Professional Services will scope an application that will do all of the key requirements for a migration to our cloud systems. It should be noted that this is not a one-to-one functional replacement of the current system only the key components.
A prototype of the new application will be developed with dummy data and manual processes that can be automated later. The idea of this prototype is to ensure that we are on the right track and that it caters for the core requirements.
At this stage we will be able to provide a few options:-
- Cost to fully develop the solution for internal deployment. This will also include a maintenance component.
- Cost to fully develop the solution for hosting on our cloud service as developed software. This cost is usually a pure cost plus maintenance.
- Cost to fully develop the solution for hosting on our cloud service as a software as a service. This cost is usually in the form of a two year contract paid monthly for use of the software and our compute and storage. We are told this has some beneficial tax treatment for the organisation but AH Professional Service recommends that you investigate this with your tax professional.
It should be noted that AH Professional services uses rapid development tools and code generation for much of these solutions so our cost of development is very different to normal bespoke developed applications. Our applications are not designed to give every user or user group customisations. While this can be done we feel that a 70%-90% fit at a significant price differential is better than a theoretical 100% at a significantly higher price.
Our solutions offer maintenance access to master and reference data and also the ability to import the same. Should automated master and reference data updates be required, these can be achieved via a secure web service. The cost of this integration development will also be included in the above pricing scenarios.
Australian Holdings Pty Ltd holds and exclusive license for the MyPhoneVouchers Membership rewards platform. The platform allows organisations to reward their stakeholders with offers and discounts from thousands of businesses across Australia. This License includes the option to create white label version of the Mobile Apps for Larger member based organisations and to assist those organisations integrate to the MPV infrastructure.
Australian Holdings Pty Ltd holds and exclusive license for the NoterFi Messaging Platform. The platform provides a cost effective communications channel for corporates. his License includes the option to create white label version of the Mobile Apps for larger organisations and to assist those organisations integrate to the NoterFI infrastructure.
Your privacy is important to us. It is AH Professional Services’ policy to respect your privacy regarding any information we may collect from you across our website, http://www.austhold.com.au, and other sites we own and operate.
We only ask for personal information when we truly need it to provide a service to you. We collect it by fair and lawful means, with your knowledge and consent. We also let you know why we’re collecting it and how it will be used.
We only retain collected information for as long as necessary to provide you with your requested service. What data we store, we’ll protect within commercially acceptable means to prevent loss and theft, as well as unauthorised access, disclosure, copying, use or modification.
We don’t share any personally identifying information publicly or with third-parties, except when required to by law.
Our website may link to external sites that are not operated by us. Please be aware that we have no control over the content and practices of these sites, and cannot accept responsibility or liability for their respective privacy policies.
You are free to refuse our request for your personal information, with the understanding that we may be unable to provide you with some of your desired services.
Your continued use of our website will be regarded as acceptance of our practices around privacy and personal information. If you have any questions about how we handle user data and personal information, feel free to contact us.
This policy is effective as of 1 February 2019.
The AH Professional Services website located at www.austhold.com.au is a copyrighted work belonging to AH Professional Services. Certain features of the Site may be subject to additional guidelines, terms, or rules, which will be posted on the Site in connection with such features.
All such additional terms, guidelines, and rules are incorporated by reference into these Terms.
Access to the Site
Subject to these Terms. Company grants you a non-transferable, non-exclusive, revocable, limited license to access the Site solely for your own personal, noncommercial use.
Certain Restrictions. The rights approved to you in these Terms are subject to the following restrictions: (a) you shall not sell, rent, lease, transfer, assign, distribute, host, or otherwise commercially exploit the Site; (b) you shall not change, make derivative works of, disassemble, reverse compile or reverse engineer any part of the Site; (c) you shall not access the Site in order to build a similar or competitive website; and (d) except as expressly stated herein, no part of the Site may be copied, reproduced, distributed, republished, downloaded, displayed, posted or transmitted in any form or by any means unless otherwise indicated, any future release, update, or other addition to functionality of the Site shall be subject to these Terms. All copyright and other proprietary notices on the Site must be retained on all copies thereof.
Company reserves the right to change, suspend, or cease the Site with or without notice to you. You approved that Company will not be held liable to you or any third-party for any change, interruption, or termination of the Site or any part.
No Support or Maintenance. You agree that Company will have no obligation to provide you with any support in connection with the Site.
Excluding any User Content that you may provide, you are aware that all the intellectual property rights, including copyrights, patents, trademarks, and trade secrets, in the Site and its content are owned by Company or Company’s suppliers. Note that these Terms and access to the Site do not give you any rights, title or interest in or to any intellectual property rights, except for the limited access rights expressed in Section 2.1. Company and its suppliers reserve all rights not granted in these Terms.
Third-Party Links & Ads; Other Users
Third-Party Links & Ads. The Site may contain links to third-party websites and services, and/or display advertisements for third-parties. Such Third-Party Links & Ads are not under the control of Company, and Company is not responsible for any Third-Party Links & Ads. Company provides access to these Third-Party Links & Ads only as a convenience to you, and does not review, approve, monitor, endorse, warrant, or make any representations with respect to Third-Party Links & Ads. You use all Third-Party Links & Ads at your own risk, and should apply a suitable level of caution and discretion in doing so. When you click on any of the Third-Party Links & Ads, the applicable third party’s terms and policies apply, including the third party’s privacy and data gathering practices.
Other Users. Each Site user is solely responsible for any and all of its own User Content. Because we do not control User Content, you acknowledge and agree that we are not responsible for any User Content, whether provided by you or by others. You agree that Company will not be responsible for any loss or damage incurred as the result of any such interactions. If there is a dispute between you and any Site user, we are under no obligation to become involved.
You hereby release and forever discharge the Company and our officers, employees, agents, successors, and assigns from, and hereby waive and relinquish, each and every past, present and future dispute, claim, controversy, demand, right, obligation, liability, action and cause of action of every kind and nature, that has arisen or arises directly or indirectly out of, or that relates directly or indirectly to, the Site. If you are a California resident, you hereby waive California civil code section 1542 in connection with the foregoing, which states: “a general release does not extend to claims which the creditor does not know or suspect to exist in his or her favor at the time of executing the release, which if known by him or her must have materially affected his or her settlement with the debtor.”
Cookies and Web Beacons. Like any other website, AH Professional Services uses ‘cookies’. These cookies are used to store information including visitors’ preferences, and the pages on the website that the visitor accessed or visited. The information is used to optimize the users’ experience by customizing our web page content based on visitors’ browser type and/or other information.
The site is provided on an “as-is” and “as available” basis, and company and our suppliers expressly disclaim any and all warranties and conditions of any kind, whether express, implied, or statutory, including all warranties or conditions of merchantability, fitness for a particular purpose, title, quiet enjoyment, accuracy, or non-infringement. We and our suppliers make not guarantee that the site will meet your requirements, will be available on an uninterrupted, timely, secure, or error-free basis, or will be accurate, reliable, free of viruses or other harmful code, complete, legal, or safe. If applicable law requires any warranties with respect to the site, all such warranties are limited in duration to ninety (90) days from the date of first use.
Some jurisdictions do not allow the exclusion of implied warranties, so the above exclusion may not apply to you. Some jurisdictions do not allow limitations on how long an implied warranty lasts, so the above limitation may not apply to you.
Limitation on Liability
To the maximum extent permitted by law, in no event shall company or our suppliers be liable to you or any third-party for any lost profits, lost data, costs of procurement of substitute products, or any indirect, consequential, exemplary, incidental, special or punitive damages arising from or relating to these terms or your use of, or incapability to use the site even if company has been advised of the possibility of such damages. Access to and use of the site is at your own discretion and risk, and you will be solely responsible for any damage to your device or computer system, or loss of data resulting therefrom.
To the maximum extent permitted by law, notwithstanding anything to the contrary contained herein, our liability to you for any damages arising from or related to this agreement, will at all times be limited to a maximum of fifty U.S. dollars (u.s. $50). The existence of more than one claim will not enlarge this limit. You agree that our suppliers will have no liability of any kind arising from or relating to this agreement.
Some jurisdictions do not allow the limitation or exclusion of liability for incidental or consequential damages, so the above limitation or exclusion may not apply to you.
Term and Termination. Subject to this Section, these Terms will remain in full force and effect while you use the Site. We may suspend or terminate your rights to use the Site at any time for any reason at our sole discretion, including for any use of the Site in violation of these Terms. Upon termination of your rights under these Terms, your Account and right to access and use the Site will terminate immediately. You understand that any termination of your Account may involve deletion of your User Content associated with your Account from our live databases. Company will not have any liability whatsoever to you for any termination of your rights under these Terms. Even after your rights under these Terms are terminated, the following provisions of these Terms will remain in effect: Sections 2 through 2.5, Section 3 and Sections 4 through 10.
Company respects the intellectual property of others and asks that users of our Site do the same. In connection with our Site, we have adopted and implemented a policy respecting copyright law that provides for the removal of any infringing materials and for the termination of users of our online Site who are repeated infringers of intellectual property rights, including copyrights. If you believe that one of our users is, through the use of our Site, unlawfully infringing the copyright(s) in a work, and wish to have the allegedly infringing material removed, the following information in the form of a written notification (pursuant to 17 U.S.C. § 512(c)) must be provided to our designated Copyright Agent:
- your physical or electronic signature;
- identification of the copyrighted work(s) that you claim to have been infringed;
- identification of the material on our services that you claim is infringing and that you request us to remove;
- sufficient information to permit us to locate such material;
- your address, telephone number, and e-mail address;
- a statement that you have a good faith belief that use of the objectionable material is not authorized by the copyright owner, its agent, or under the law; and
- a statement that the information in the notification is accurate, and under penalty of perjury, that you are either the owner of the copyright that has allegedly been infringed or that you are authorized to act on behalf of the copyright owner.
Please note that, pursuant to 17 U.S.C. § 512(f), any misrepresentation of material fact in a written notification automatically subjects the complaining party to liability for any damages, costs and attorney’s fees incurred by us in connection with the written notification and allegation of copyright infringement.
These Terms are subject to occasional revision, and if we make any substantial changes, we may notify you by sending you an e-mail to the last e-mail address you provided to us and/or by prominently posting notice of the changes on our Site. You are responsible for providing us with your most current e-mail address. In the event that the last e-mail address that you have provided us is not valid our dispatch of the e-mail containing such notice will nonetheless constitute effective notice of the changes described in the notice. Any changes to these Terms will be effective upon the earliest of thirty (30) calendar days following our dispatch of an e-mail notice to you or thirty (30) calendar days following our posting of notice of the changes on our Site. These changes will be effective immediately for new users of our Site. Continued use of our Site following notice of such changes shall indicate your acknowledgement of such changes and agreement to be bound by the terms and conditions of such changes.
Dispute Resolution. Please read this Arbitration Agreement carefully. It is part of your contract with Company and affects your rights. It contains procedures for MANDATORY BINDING ARBITRATION AND A CLASS ACTION WAIVER.
Applicability of Arbitration Agreement. All claims and disputes in connection with the Terms or the use of any product or service provided by the Company that cannot be resolved informally or in small claims court shall be resolved by binding arbitration on an individual basis under the terms of this Arbitration Agreement. Unless otherwise agreed to, all arbitration proceedings shall be held in English. This Arbitration Agreement applies to you and the Company, and to any subsidiaries, affiliates, agents, employees, predecessors in interest, successors, and assigns, as well as all authorized or unauthorized users or beneficiaries of services or goods provided under the Terms.
Notice Requirement and Informal Dispute Resolution. Before either party may seek arbitration, the party must first send to the other party a written Notice of Dispute describing the nature and basis of the claim or dispute, and the requested relief. A Notice to the Company should be sent to: Ballajura Western Australia. After the Notice is received, you and the Company may attempt to resolve the claim or dispute informally. If you and the Company do not resolve the claim or dispute within thirty (30) days after the Notice is received, either party may begin an arbitration proceeding. The amount of any settlement offer made by any party may not be disclosed to the arbitrator until after the arbitrator has determined the amount of the award to which either party is entitled.
Arbitration Rules. Arbitration shall be initiated through the American Arbitration Association, an established alternative dispute resolution provider that offers arbitration as set forth in this section. If AAA is not available to arbitrate, the parties shall agree to select an alternative ADR Provider. The rules of the ADR Provider shall govern all aspects of the arbitration except to the extent such rules are in conflict with the Terms. The AAA Consumer Arbitration Rules governing the arbitration are available online at adr.org or by calling the AAA at 1-800-778-7879. The arbitration shall be conducted by a single, neutral arbitrator. Any claims or disputes where the total amount of the award sought is less than Ten Thousand U.S. Dollars (US $10,000.00) may be resolved through binding non-appearance-based arbitration, at the option of the party seeking relief. For claims or disputes where the total amount of the award sought is Ten Thousand U.S. Dollars (US $10,000.00) or more, the right to a hearing will be determined by the Arbitration Rules. Any hearing will be held in a location within 100 miles of your residence, unless you reside outside of the United States, and unless the parties agree otherwise. If you reside outside of the U.S., the arbitrator shall give the parties reasonable notice of the date, time and place of any oral hearings. Any judgment on the award rendered by the arbitrator may be entered in any court of competent jurisdiction. If the arbitrator grants you an award that is greater than the last settlement offer that the Company made to you prior to the initiation of arbitration, the Company will pay you the greater of the award or $2,500.00. Each party shall bear its own costs and disbursements arising out of the arbitration and shall pay an equal share of the fees and costs of the ADR Provider.
Additional Rules for Non-Appearance Based Arbitration. If non-appearance based arbitration is elected, the arbitration shall be conducted by telephone, online and/or based solely on written submissions; the specific manner shall be chosen by the party initiating the arbitration. The arbitration shall not involve any personal appearance by the parties or witnesses unless otherwise agreed by the parties.
Time Limits. If you or the Company pursues arbitration, the arbitration action must be initiated and/or demanded within the statute of limitations and within any deadline imposed under the AAA Rules for the pertinent claim.
Authority of Arbitrator. If arbitration is initiated, the arbitrator will decide the rights and liabilities of you and the Company, and the dispute will not be consolidated with any other matters or joined with any other cases or parties. The arbitrator shall have the authority to grant motions dispositive of all or part of any claim. The arbitrator shall have the authority to award monetary damages, and to grant any non-monetary remedy or relief available to an individual under applicable law, the AAA Rules, and the Terms. The arbitrator shall issue a written award and statement of decision describing the essential findings and conclusions on which the award is based. The arbitrator has the same authority to award relief on an individual basis that a judge in a court of law would have. The award of the arbitrator is final and binding upon you and the Company.
Waiver of Jury Trial. THE PARTIES HEREBY WAIVE THEIR CONSTITUTIONAL AND STATUTORY RIGHTS TO GO TO COURT AND HAVE A TRIAL IN FRONT OF A JUDGE OR A JURY, instead electing that all claims and disputes shall be resolved by arbitration under this Arbitration Agreement. Arbitration procedures are typically more limited, more efficient and less expensive than rules applicable in a court and are subject to very limited review by a court. In the event any litigation should arise between you and the Company in any state or federal court in a suit to vacate or enforce an arbitration award or otherwise, YOU AND THE COMPANY WAIVE ALL RIGHTS TO A JURY TRIAL, instead electing that the dispute be resolved by a judge.
Waiver of Class or Consolidated Actions. All claims and disputes within the scope of this arbitration agreement must be arbitrated or litigated on an individual basis and not on a class basis, and claims of more than one customer or user cannot be arbitrated or litigated jointly or consolidated with those of any other customer or user.
Confidentiality. All aspects of the arbitration proceeding shall be strictly confidential. The parties agree to maintain confidentiality unless otherwise required by law. This paragraph shall not prevent a party from submitting to a court of law any information necessary to enforce this Agreement, to enforce an arbitration award, or to seek injunctive or equitable relief.
Severability. If any part or parts of this Arbitration Agreement are found under the law to be invalid or unenforceable by a court of competent jurisdiction, then such specific part or parts shall be of no force and effect and shall be severed and the remainder of the Agreement shall continue in full force and effect.
Right to Waive. Any or all of the rights and limitations set forth in this Arbitration Agreement may be waived by the party against whom the claim is asserted. Such waiver shall not waive or affect any other portion of this Arbitration Agreement.
Survival of Agreement. This Arbitration Agreement will survive the termination of your relationship with Company.
Small Claims Court. Nonetheless the foregoing, either you or the Company may bring an individual action in small claims court.
Emergency Equitable Relief. Anyhow the foregoing, either party may seek emergency equitable relief before a state or federal court in order to maintain the status quo pending arbitration. A request for interim measures shall not be deemed a waiver of any other rights or obligations under this Arbitration Agreement.
Claims Not Subject to Arbitration. Notwithstanding the foregoing, claims of defamation, violation of the Computer Fraud and Abuse Act, and infringement or misappropriation of the other party’s patent, copyright, trademark or trade secrets shall not be subject to this Arbitration Agreement.
In any circumstances where the foregoing Arbitration Agreement permits the parties to litigate in court, the parties hereby agree to submit to the personal jurisdiction of the courts located within Netherlands County, California, for such purposes.
The Site may be subject to U.S. export control laws and may be subject to export or import regulations in other countries. You agree not to export, re-export, or transfer, directly or indirectly, any U.S. technical data acquired from Company, or any products utilizing such data, in violation of the United States export laws or regulations.
Company is located at the address in Section 10.8. If you are a California resident, you may report complaints to the Complaint Assistance Unit of the Division of Consumer Product of the California Department of Consumer Affairs by contacting them in writing at 400 R Street, Sacramento, CA 95814, or by telephone at (800) 952-5210.
Electronic Communications. The communications between you and Company use electronic means, whether you use the Site or send us emails, or whether Company posts notices on the Site or communicates with you via email. For contractual purposes, you (a) consent to receive communications from Company in an electronic form; and (b) agree that all terms and conditions, agreements, notices, disclosures, and other communications that Company provides to you electronically satisfy any legal obligation that such communications would satisfy if it were be in a hard copy writing.
Entire Terms. These Terms constitute the entire agreement between you and us regarding the use of the Site. Our failure to exercise or enforce any right or provision of these Terms shall not operate as a waiver of such right or provision. The section titles in these Terms are for convenience only and have no legal or contractual effect. The word “including” means “including without limitation”. If any provision of these Terms is held to be invalid or unenforceable, the other provisions of these Terms will be unimpaired and the invalid or unenforceable provision will be deemed modified so that it is valid and enforceable to the maximum extent permitted by law. Your relationship to Company is that of an independent contractor, and neither party is an agent or partner of the other. These Terms, and your rights and obligations herein, may not be assigned, subcontracted, delegated, or otherwise transferred by you without Company’s prior written consent, and any attempted assignment, subcontract, delegation, or transfer in violation of the foregoing will be null and void. Company may freely assign these Terms. The terms and conditions set forth in these Terms shall be binding upon assignees.
Copyright/Trademark Information. Copyright ©. All rights reserved. All trademarks, logos and service marks displayed on the Site are our property or the property of other third-parties. You are not permitted to use these Marks without our prior written consent or the consent of such third party which may own the Marks.
Address: Ballajura Western Australia
Email: [email protected]
The purpose of this policy is to establish controls to ensure compliance with all applicable anti-bribery and corruption regulations, and to ensure that the Company’s business is conducted in a socially responsible manner.
Bribery is the offering, promising, giving, accepting or soliciting of an advantage as an inducement for action which is illegal or a breach of trust. A bribe is an inducement or reward offered, promised or provided in order to gain any commercial, contractual, regulatory or personal advantage.
It is our policy to conduct all of our business in an honest and ethical manner. We take a zero tolerance approach to bribery and corruption. We are committed to acting professionally, fairly and with integrity in all our business dealings and relationships by implementing and enforcing effective systems to counter bribery.
We will uphold all laws relevant to countering bribery and corruption in Australia.
Scope – Who is covered by the policy?
In this policy, third party means any individual or organisation you come into contact with during the course of your work for us, and includes actual and potential clients, business contacts, agents, and government and public bodies.
This policy applies to all employees and contractors engaged by AWI, collectively referred to as personnel.
This policy covers:
- Gifts and hospitality
- Charitable contributions
Personnel must not engage in any form of bribery, either directly or indirectly.
Gifts and hospitality
Personnel must not offer or give any gift or hospitality:
which could be regarded as illegal or improper, or which violates the recipient’s policies or
to any public employee or government officials or representatives.
Employees may not accept any gift or hospitality from any business associates unless previously authorised by one of the directors.
Charitable support and donations are acceptable (and indeed are encouraged), whether of knowledge, time, or direct financial contributions. However, personnel must be careful to ensure that charitable contributions are not used as a scheme to conceal bribery.
You must ensure that you read, understand and comply with this policy. The prevention, detection and reporting of bribery and other forms of corruption are the responsibility of all those working for AWI.
All employees are required to avoid any activity that might lead to, or suggest, a breach of this policy. You must notify your manager as soon as possible if you believe or suspect that a conflict with or breach of this policy has occurred, or may occur in the future.
Personnel who breaches this policy will face disciplinary action, which could result in dismissal for gross misconduct. We reserve our right to terminate our contractual relationship with other workers if they breach this policy.
How to raise a concern
You are encouraged to raise concerns about any issue or suspicion of malpractice at the earliest possible stage. If you are unsure whether a particular act constitutes bribery or corruption, or if you have any other queries or concerns, these should be raised with your manager
What to do if you are a victim of bribery or corruption
It is important that you tell your manager as soon as possible if you are offered a bribe by a third party, are asked to make one, suspect that this may happen in the future, or believe that you are a victim of another form of unlawful activity.
Personnel who refuse to accept or offer a bribe, or those who raise concerns or report another’s wrongdoing, are sometimes worried about possible repercussions. We aim to encourage openness and will support anyone who raises genuine concerns in good faith under this policy, even if they turn out to be mistaken.
We are committed to ensuring no one suffers any detrimental treatment as a result of refusing to take part in bribery or corruption, or because of reporting in good faith their suspicion that an actual or potential bribery or other corruption offence has taken place, or may take place in the future.
Training and communication
Training on this policy forms part of the induction process for all new employees. All existing employees will receive regular, relevant training on how to implement and adhere to this policy. In addition, all employees will be asked to formally accept conformance to this policy on an annual basis. Our zero-tolerance approach to bribery and corruption must be communicated to all suppliers, contractors and business partners at the outset of our business relationship with them and as appropriate thereafter.
Who is responsible for the policy?
The directors have overall responsibility for ensuring this policy complies with our legal and ethical obligations, and that all personnel comply with it.
The General Manager has primary and day-to-day responsibility for implementing this policy, and for monitoring its use and effectiveness and dealing with any queries on its interpretation.
Monitoring and review
The General Manager will monitor the effectiveness and review the implementation of this policy, regularly considering its suitability, adequacy and effectiveness. Any improvements identified will be made as soon as possible. Internal control systems and procedures will be subject to regular audits to provide assurance that they are effective in countering bribery and corruption.
All personnel are responsible for the success of this policy and should ensure they use it to disclose any suspected danger or wrongdoing.
Personnel are invited to comment on this policy and suggest ways in which it might be improved. Comments, suggestions and queries should be addressed to the General Manager.