RESOURCES USAGE POLICY

1. Purpose

This Resources Usage Policy establishes the guidelines for the secure and responsible use of digital tools within Resolute Strength and Conditioning, ensuring compliance with privacy regulations and data protection standards.

2. Approved Access

  • Access to all business resources is restricted to the sole trader, Liam Kiley.

  • No unauthorised individuals are permitted to access business accounts, client data or software platforms.

3. Client Information & Data Security

  • Client information is stored exclusively on OneDrive, protected by multi-factor authentication (MFA) on a personal computer.

  • Passwords are securely managed using 1Password, ensuring encrypted storage and access control.

  • Regular security checks and software updates must be performed to maintain data integrity and protection.

4. Digital Tools Usage Guidelines

  • Square – Used for payment processing, invoicing and financial transactions. No unauthorised purchases or personal transactions.

  • Hubfit – Utilised for client scheduling and workout tracking. Data must remain accurate and secure, accessible only to Liam Kiley.

  • Hostinger – Website management. No unauthorised content modifications. Any updates require verification for security and brand consistency.

  • Zoho Forms – Used exclusively for client data collection and administrative purposes. No personal storage or external usage of forms beyond business operations.

  • Apple & Microsoft – Apple devices enable mobile access to business tools, while Microsoft services manage document storage, emails and analytics. Regular security updates are mandatory.

5. Security & Compliance

  • Multi-factor authentication (MFA) is required for accessing client data and business accounts.

  • Liam Kiley must adhere to Australia’s Privacy Act 1988 and ensure client confidentiality is maintained.

  • Any unauthorised data access, breaches or security concerns must be reported and addressed immediately.

6. Violations & Accountability

  • Failure to comply with data security protocols may result in restrictions on software access or modifications to security controls.

  • Any breach of client confidentiality may lead to legal consequences under privacy regulations.