You must read this policy because it gives important information about:
• the data protection principles with which the Company must comply;
• what is meant by personal information (or data) and sensitive personal information (or data);
• how we gather, use and (ultimately) delete personal information and sensitive personal information in accordance with the data protection principles;
• where more detailed privacy information can be found, eg about the personal information we gather and use about you, how it is used, stored and transferred, for what purposes, the steps taken to keep that information secure and for how long it is kept;
• your rights and obligations in relation to data protection; and
• the consequences of failure to comply with this policy.
1.1 The Company obtains, keeps and uses personal information (also referred to as data) about customers for a number specific lawful purposes, as set out in the Company’s Data protection privacy notices.
1.2 This policy sets out how we comply with our data protection obligations and seek to protect personal information.
1.3 We are committed to complying with our data protection obligations, and to being concise, clear and transparent about how we obtain and use personal information, and how (and when) we delete that information once it is no longer required.
1.4 The Company’s data protection officer, The General Manager is responsible for informing and advising the Company and its staff on its data protection obligations, and for monitoring compliance with those obligations and with the Company’s policies. If you have any questions or comments about the content of this policy or if you need further information, you should contact: email@example.com
2.1 This policy applies to the personal information of customers and current and former staff.
2.2 We will review and update this policy in accordance with our data protection obligations.
Data breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal information;Data subject means the individual to whom the personal information relates; Personal information(sometimes known as personal data) means information relating to an individual who can be identified (directly or indirectly) from that information;Processing information means obtaining, recording, organising, storing, amending, retrieving, disclosing and/or destroying information, or using or doing anything with it; Pseudonymised means the process by which personal information is processed in such a way that it cannot be used to identify an individual without the use of additional information, which is kept separately and subject to technical and organisational measures to ensure that the personal information cannot be attributed to an identifiable individual.
4 Data protection principles
4.1 The Company will comply with the following data protection principles when processing personal information:
4.1.1 we will process personal information lawfully, fairly and in a transparent manner;
4.1.2 we will collect personal information for specified, explicit and legitimate purposes only, and will not process it in a way that is incompatible with those legitimate purposes;
4.1.3 we will only process the personal information that is adequate, relevant and necessary for the relevant purposes;
4.1.4 we will keep accurate and up to date personal information, and take reasonable steps to ensure that inaccurate personal information are deleted or corrected without delay;
4.1.5 we will keep personal information for no longer than is necessary for the purposes for which the information is processed; and
4.1.6 we will take appropriate technical and organisational measures to ensure that personal information are kept secure and protected against unauthorised or unlawful processing, and against accidental loss, destruction or damage.
5 Basis for processing personal information
5.1 In relation to any processing activity we will, before the processing starts for the first time, and then regularly while it continues:
5.1.1 review the purposes of the particular processing activity, and select the most appropriate lawful basis (or bases) for that processing, ie:
(a) that the data subject has consented to the processing;
(b) that the processing is necessary for the performance of a contract to which the data subject is party or in order to take steps at the request of the data subject prior to entering into a contract;
(c) that the processing is necessary for compliance with a legal obligation to which the Company is subject;
(d) that the processing is necessary for the protection of the vital interests of the data subject
(e) that the processing is necessary for the performance of a task carried out in the public interest
(f) that the processing is necessary for the purposes of legitimate interests of the Company, except where those interests are overridden by the interests of fundamental rights and freedoms of the data subject—see clause 5.2 below.
5.1.2 except where the processing is based on consent, satisfy ourselves that the processing is necessary for the purpose of the relevant lawful basis (ie that there is no other reasonable way to achieve that purpose);
5.1.3 document our decision as to which lawful basis applies, to help demonstrate our compliance with the data protection principles;
5.1.4 include information about both the purposes of the processing and the lawful basis for it in our relevant privacy notice(s);
5.1.5 where sensitive personal information is processed, also identify a lawful special condition for processing that information (see paragraph 6.2.2 below), and document it; and
5.2 When determining whether the Company’s legitimate interests are the most appropriate basis for lawful processing, we will:
5.2.1 conduct a legitimate interests assessment (LIA) and keep a record of it, to ensure that we can justify our decision;
5.2.2 if the LIA identifies a significant privacy impact, consider whether we also need to conduct a data protection impact assessment (DPIA);
5.2.3 keep the LIA under review, and repeat it if circumstances change; and
5.2.4 include information about our legitimate interests in our relevant privacy notice(s).
6 Data protection impact assessments (DPIAs)
6.1 Where processing is likely to result in a high risk to an individual’s data protection rights (eg where the Company is planning to use a new form of technology), we will, before commencing the processing, carry out a DPIA to assess:
6.1.1 whether the processing is necessary and proportionate in relation to its purpose;
6.1.2 the risks to individuals; and
6.1.3 what measures can be put in place to address those risks and protect personal information.
6.2 Before any new form of technology is introduced, the manager responsible should therefore contact the general manager in order that a DPIA can be carried out.
6.3 During the course of any DPIA, the employer will seek the advice of the general manager and the views of [a representative group of] employees and any other relevant stakeholders.
7 Documentation and records
7.1 We will keep written records of processing activities, including:
7.1.1 the name and details of the employer's organisation (and where applicable, of other controllers, the employer's representative and DPO);
7.1.2 the purposes of the processing;
7.1.3 a description of the categories of individuals and categories of personal data;
7.1.4 categories of recipients of personal data;
7.1.5 where relevant, details of transfers to third countries, including documentation of the transfer mechanism safeguards in place;
7.1.6 where possible, retention schedules; and
7.1.7 where possible, a description of technical and organisational security measures.
7.2 As part of our record of processing activities we document, or link to documentation, on:
7.2.1 information required for privacy notices;
7.2.2 records of consent;
7.2.3 controller-processor contracts;
7.2.4 the location of personal information;
7.2.5 DPIAs; and
7.2.6 records of data breaches.
7.3 We will conduct regular reviews of the personal information we process and update our documentation accordingly. This may include:
7.3.1 carrying out information audits to find out what personal information the Company holds;
7.3.2 distributing questionnaires and talking to staff across the Company to get a more complete picture of our processing activities; and
7.3.3 reviewing our policies, procedures, contracts and agreements to address areas such as retention, security and data sharing.]
7.4 We document our processing activities in electronic form so we can add, remove and amend information easily.
8 Privacy notice
8.1 The Company may issue privacy notices from time to time, informing you about the personal information that we collect and hold relating to you, how you can expect your personal information to be used and for what purposes.
8.2 We will take appropriate measures to provide information in privacy notices in a concise, transparent, intelligible and easily accessible form, using clear and plain language.
9 Individual rights
9.1 You have the following rights in relation to your personal information:
9.1.1 to be informed about how, why and on what basis that information is processed—see the Company’s data protection privacy notice
9.1.2 to obtain confirmation that your information is being processed and to obtain access to it and certain other information, by making a subject access request—see the Company’s subject access request policy;
9.1.3 to have data corrected if it is inaccurate or incomplete;
9.1.4 to have data erased if it is no longer necessary for the purpose for which it was originally collected/processed, or if there are no overriding legitimate grounds for the processing (this is sometimes known as ‘the right to be forgotten’);
9.1.5 to restrict the processing of personal information where the accuracy of the information is contested, or the processing is unlawful (but you do not want the data to be erased), or where the employer no longer needs the personal information but you require the data to establish, exercise or defend a legal claim; and
9.1.6 to restrict the processing of personal information temporarily where you do not think it is accurate (and the employer is verifying whether it is accurate), or where you have objected to the processing (and the employer is considering whether the organisation’s legitimate grounds override your interests).
9.2 If you wish to exercise any of the rights in paragraphs 11.1.3 to 11.1.6, please contact the general manager
10 Individual obligations
10.1 Individuals are responsible for helping the Company keep their personal information up to date. You should let us know if the information you have provided to the Company changes.
11 Information security
11.1 The Company will use appropriate technical and organisational measures [in accordance with the Company’s policies] to keep personal information secure, and in particular to protect against unauthorised or unlawful processing and against accidental loss, destruction or damage. These may include:
11.1.1 making sure that, where possible, personal information is pseudonymised or encrypted;
11.1.2 ensuring the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
11.1.3 ensuring that, in the event of a physical or technical incident, availability and access to personal information can be restored in a timely manner; and
11.1.4 a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.
12 Storage and retention of personal information
12.1 Personal information will be kept securely in accordance with the Company’s information security policy
12.2 Personal information should not be retained for any longer than necessary. The length of time over which data should be retained will depend upon the circumstances, including the reasons why the personal information was obtained.
12.3 Personal information that is no longer required will be deleted permanently from our information systems and any hard copies will be destroyed securely.
13 Data breaches
13.1 A data breach may take many different forms, for example:
13.1.1 loss or theft of data or equipment on which personal information is stored;
13.1.2 unauthorised access to or use of personal information either by a member of staff or third party;
13.1.3 loss of data resulting from an equipment or systems (including hardware and software) failure;
13.1.4 human error, such as accidental deletion or alteration of data;
13.1.5 unforeseen circumstances, such as a fire or flood;
13.1.6 deliberate attacks on IT systems, such as hacking, viruses or phishing scams; and
13.1.7 ‘blagging’ offences, where information is obtained by deceiving the organisation which holds it.
13.2 The Company will:
13.2.1 make the required report of a data breach to the Information Commissioner’s Office without undue delay and, where possible within 72 hours of becoming aware of it, if it is likely to result in a risk to the rights and freedoms of individuals; and
13.2.2 notify the affected individuals, if a data breach is likely to result in a high risk to their rights and freedoms and notification is required by law.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.