AML3D Supplier Hub
Site Visitors
Site visitors are any individuals who visit any of AML3D's Company sites.
When You Visit Our Sites
If you visit any of our sites as a visitor, we process certain information about you. If you are accompanied by a dependent under the age of 18, you (as their parent, guardian, or responsible adult) will make decisions regarding their personal information on their behalf.
Quick Links: Access Logs | CCTV | Insurance | Denied Party Screening
Access Logs
How Do We Process Your Information?
We maintain access logs at all our sites to record visitor details. We ask you to provide your information to populate these logs voluntarily.
What Information Do We Collect?
The information we process may include:
- Personal details: Name, contact information, and emergency contact details.
- Professional details: Business affiliation and role.
- Engagement data: Information related to your interactions with our Company.
- Citizenship: Nationality information.
In limited cases, and only where permitted by law, we may process sensitive information such as criminal records (e.g., for security clearance purposes).
Why Do We Process This Information?
We use your information to:
- Maintain a secure and accurate record of site visitors for health and safety purposes, including emergency response.
- Protect our sites, assets, and personnel.
How Do We Collect Information About Dependents?
For visitors under 18, we collect their information directly from their parent, guardian, or responsible adult. We may also receive information from other sources as described in our full Privacy Notice.
Who Do We Share Your Information With?
Your information may be shared:
- Internally: With relevant teams to fulfil the purposes above.
- Externally: With our security partners, or emergency responders as needed for safety, legal compliance, or site protection.
CCTV
How Do We Use CCTV?
To maintain safety and security, we operate Closed-Circuit Television (CCTV) systems across our premises, including building exteriors, perimeter areas, walkways, roads, and adjacent public spaces. This includes:
- Recording footage to monitor site activity.
- Investigating security incidents or suspicious behaviour when necessary.
What Information Do We Collect?
Our CCTV systems may capture
- Visual images of individuals onsite or in surrounding areas.
- Vehicle registration details (where applicable).
We may also process sensitive information to the extent permitted by applicable laws.
Why Do We Use CCTV?
We use CCTV to:
- Protect our staff, visitors, property, and systems.
- Ensuring compliance with health and safety and other legal requirements to operate in Australia and the United States.
- Detecting and preventing loss of our confidential and proprietary information.
- Detecting and preventing crimes or criminal activity.
- Defending legal claims and cooperating with national and government authorities.
You didn't get this information from me. How did you collect it?
- Directly from CCTV systems: Footage is generated automatically by our cameras.
- Third parties: We may receive data from security partners, suppliers, or authorities.
Who Do We Share CCTV Footage With?
We restrict access to CCTV data and only share it when necessary, including with:
- Internal teams who are responsible for security, safety, or compliance.
Law enforcement, government agencies, or legal authorities (when legally required).
Insurance
What types of processing involve my information?
We process your information to administer and manage our insurance policies, which include activities related to insurance claims, risk assessments, and mitigating potential risks.
What categories of information do you process?
We may process any information we hold about you, such as:
- Identity and contact details (e.g., name, address, email)
- Business-related information (e.g., role, professional interactions)
- Sensitive information, including criminal records data, where legally permitted.
Why is this information processed?
Processing your information ensures the Company maintains adequate insurance coverage to manage operational risks, enables AML3D to administer policies, assess claims, and fulfil legal or contractual obligations.
How is this information collected if not directly from me?
Information may originate from:
- Internal Company sources (e.g., employee reports, business communications)
- External parties, including customers, suppliers, partners, insurers, or other entities referenced in this Notice.
Who has access to my information?
Your information may be disclosed:
- Internally to authorised personnel for the purposes stated above.
- Externally to our Parent Company, insurers, brokers, and third-party service providers, as necessary to fulfil the activities described in this Notice.
Denied Party Screening
How is my information used for security and compliance checks?
We conduct vetting procedures when you visit our facilities. This may include:
- Denied party screening to comply with legal obligations.
- Cross-referencing official sanctions lists (e.g., Australian, United States, UK, UN Security Council Consolidated Lists).
- Verifying eligibility against export control license requirements.
What types of information are processed?
To perform these checks, we process:
- Visitor details: Name, date of birth, country of residence, and contact information.
- Compliance-related data: Cross-checked against:
- Sanctions lists (e.g., Australian, United States, UK, UN Security Council Consolidated Lists).
- Regulatory, financial, and adverse media databases.
- Politically Exposed Persons (PEPs), state-owned entities, and exclusion lists.
- Enhanced risk profiles, ownership structures, and associations (e.g., relatives, close contacts).
Processing adheres strictly to applicable laws, including sensitive data where authorised.
Why are these checks necessary?
These activities ensure:
- Legal compliance: Adherence to export control laws and international trade regulations.
- Security: Protecting classified or export-controlled technologies and infrastructure.
- Operational integrity: Safeguarding business operations, workforce safety, and customer trust.
How is this information collected if not provided directly?
Data sources may include:
- Internal records: Information provided by your employer or through prior interactions.
- Public sources: Publicly available databases, sanctions lists, or regulatory filings.
Who has access to this information?
Your data may be shared with:
- Internal teams: Authorised personnel managing security and compliance.
- Third-party providers: Screening partners may be engaged in certain circumstances to conduct checks.
- Regulatory bodies: Authorities in Australia, the UK, the US, or other jurisdictions as required by law.
- Customers: Where contractual obligations or project requirements necessitate disclosure.