Data and Privacy
Data protection policies and privacy information
Data Protection
- Personal Information: Your personal data is protected and secure
- Access Control: Data access is restricted based on role and permissions
- Data Retention: Company follows data retention policies
- Privacy Rights: Contact HR for privacy-related questions
Data Accuracy
- Information Updates: Keep your information current and accurate
- Data Verification: Regularly verify your data is correct
- Correction Requests: Contact appropriate department for data corrections
- Data Backup: System maintains regular backups of all data
Compliance
- Company Policies: Follow all company data and privacy policies
- Regulatory Compliance: System meets all relevant regulatory requirements
- Audit Support: Data maintained for audit and compliance purposes
- Confidentiality: Maintain confidentiality of sensitive information
Data Security Measures
Technical Safeguards
- Encryption: All data is encrypted in transit and at rest
- Access Controls: Role-based access controls limit data access
- Audit Logging: All data access is logged and monitored
- Secure Infrastructure: Data hosted on secure, compliant infrastructure
- Regular Backups: Automated backups ensure data recovery capability
Administrative Safeguards
- Data Governance: Comprehensive data governance policies
- Privacy Training: Regular privacy training for all employees
- Incident Response: Established procedures for data incidents
- Vendor Management: Strict controls for third-party data access
- Regular Audits: Periodic security and privacy audits
Your Privacy Rights
Data Access Rights
- View Your Data: Request access to all personal data held about you
- Data Portability: Request export of your data in a portable format
- Data Correction: Request correction of inaccurate or incomplete data
- Data Deletion: Request deletion of your data (subject to legal requirements)
Privacy Controls
- Communication Preferences: Control how you receive communications
- Profile Visibility: Control who can see your profile information
- Data Sharing: Control what information is shared with managers
- Notification Settings: Control what notifications you receive
Data Types and Usage
Personal Information
Data We Collect
- • Name, employee ID, and contact information
- • Job title, department, and work location
- • Employment status and start date
- • Profile picture and personal preferences
- • Time and attendance records
- • Training completion and certification data
How We Use This Data
- • Provide portal services and functionality
- • Process requests and manage approvals
- • Track training and compliance requirements
- • Generate reports and analytics
- • Ensure security and proper access controls
System Information
Technical Data
- • Login times and session duration
- • Browser type and device information
- • IP address and network information
- • Feature usage and navigation patterns
- • System performance and error logs
Purpose of Collection
- • Ensure system security and prevent unauthorized access
- • Improve system performance and user experience
- • Troubleshoot technical issues and provide support
- • Monitor system usage and capacity planning
Data Retention and Deletion
Retention Policies
- Active Employment: Data retained while actively employed
- Post-Employment: Data retained according to legal requirements
- Audit Requirements: Some data retained for audit and compliance purposes
- Legal Holds: Data may be retained longer if subject to legal proceedings
Data Deletion
- Automated Deletion: System automatically deletes data per retention policies
- Manual Deletion: Request deletion of specific data (subject to legal requirements)
- Secure Deletion: All data deletion follows secure deletion procedures
- Backup Purging: Data also removed from backup systems
Data Sharing and Disclosure
Internal Sharing
- Role-Based Access: Data shared based on job roles and permissions
- Manager Access: Managers have access to direct report information
- HR Access: HR has access to employment-related data
- IT Access: IT has access for system administration and support
External Sharing
- Service Providers: Limited data sharing with trusted service providers
- Legal Requirements: Data may be shared to comply with legal obligations
- Audit Purposes: Data may be shared with auditors and regulators
- Emergency Situations: Data may be shared in emergency situations
Privacy Feedback and Improvement
User Feedback
- Privacy Concerns: Report privacy concerns to HR or IT support
- Data Accuracy: Report inaccurate data for correction
- Access Issues: Report inappropriate data access or permissions
- Improvement Suggestions: Suggest privacy and security improvements
Continuous Improvement
- Privacy Reviews: Regular reviews of privacy policies and practices
- Security Updates: Continuous security improvements and updates
- Training Updates: Regular updates to privacy training programs
- Policy Updates: Policies updated to reflect changing requirements
