Contacts Plus publishes personal information accessed from the following databases:
- Telephone directory
- Property ownership
- Company directorship and shareholding
Telephone directory: This is a national telephone directory service, which is licensed to Data Zoo by Yellow Pages Group. Yellow collects information from the telecommunications providers of all listed telephone numbers. The information collected is name, address and telephone number. If you wish that your details do not appear in directories such as Data Zoo/Contacts Plus you should contact your telephone service provider to suppress your information from all public directories. It should be noted that in New Zealand, it is illegal to provide or perform a reverse searching capability. Data Zoo/Contacts Plus does not allow this action to be performed on any of its systems.
Property Ownership: This database is a list of all property owners as collated and administrated by Land Information NZ (LINZ). The Information collected includes name, address, title number and encumbrance and lodgement date. This data cannot be used for marketing activities.
Company Directors and Shareholders Database: This database is a list of all New Zealand company directors and shareholders, which is collected and administered by the New Zealand Companies office. The Information collected includes name, address, and lodgement/appointment date. Only under certain circumstances will the New Zealand Companies Offices suppress your personal information.
Data Security built to protect your data: Contacts Plus understands that your trust in us depends on how well we manage data and keep our Information and Systems secure. Our security is comprehensive, proactive and designed to ensure that all information is secure in your dealings with Contacts Plus. Contacts Plus conforms to the highest industry accepted security practices.
Firewalls and encryption are used to protect all data and our applications and databases have built-in security that prevents unauthorised access, as well as electronic auditing to monitor access.
Further information on our IT security policies can be provided on request or from our website.