The Data Importer (Processor) implements the following policies:
• Information Security Policy
• Internal Data Protection Policy
• Policy on answering data subjects requests
• Incident Response Policy
• Retention Policy
• Process of controlled dismissal
• DPIA Policy
• Approval procedure
• Access Control Policy
Other safeguards include:
• Each Staff member signs a contract, non-disclosure agreement, privacy obligation and list of familiarization with internal corporate confidentiality, information security, privacy policies.
• Measures for ensuring the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
• Upon detection of any suspicious or non-standard event that could be a personal data breach or information security incident, the Staff is required by internal policy to report it in respective corporate ticket-system. The report is automatically assigned to an Incident Response Team (DPO, ISO, CTO, legal).
• Implementation of log access management and data breach reporting processes to timely define, manage and report all personal data breaches in accordance with respective corporate policies.
• Regular data backups in electronic form on a daily basis.
• Storage of backups on an external secure server.
• Protection of backed up data with the same security level as data stored on corporate servers by organising storage by contractually regulating an outsourced backup service.
• Staff is instructed to store users' data in corporate backed-up systems and storages.
• Staff is instructed not to store its access credentials (login/password) in an easily accessible form (unencrypted file, paper, sticker, etc.).
• There are requirements to complexity of passwords.
• An automatic logout procedure of locking the workstations not-used for a given period of time.
• Encryption of data before sending it on a physical medium (DVD, USB stick, portable hard drive) or to a third party.
• External networks are used exclusively (VPN, dedicated line).
• Encryption of sensitive data before sending, if this transmission uses electronic messaging.
• Use of a protocol guaranteeing the confidentiality and authentication of the recipient server for file transfers, for example SFTP or HTTPS, by using the most recent version of protocols.
• Ensuring the confidentiality of secrets (encryption keys, passwords, etc.) by sending them via a separate channel (for example, sending an encrypted file by email and communicating the password by phone or SMS).
• When exchanging information inside and outside the companies using any means of communication (email, messenger, internet, voice, media, etc.), the Staff follows the rules preventing unauthorized information distribution (e.g. prohibiting store confidential information outside of corporate infrastructure).
• For sensitive information an additional security measures are applied like secure storage place, encrypted channels etc.
• Information stored on USB/HDD/SSD and other read/write drives should be deleted by utilizing the wipe functions (through the file manager, system formatting utilities).
• It is prohibited by corporate policy to use illegal software, particularly: unlicensed software, hacked/pirated software, software unrelated to company business (for example, crypto miners), etc.
• All valuable information assets are regularly backed up. Corporate network is protected with Firewall. Regular monitoring of network activities is established.
• Vulnerability assessment and regular software updating for most critical infrastructure is established.
• The security updates are carried out automatically and regularly.
• Implemented specific access methods to archived data, due to the fact that the use of an archive is made in a specific and exceptional manner.
• With regard to the destruction of archives, there is a procedure guaranteeing that the archive has been destroyed in its entirety.
• Corporate systems and websites/Apps are structured to collect only minimum of necessary data.
• Measures for ensuring system configuration, including default configuration.
• Measures for allowing data portability and ensuring erasure.
The abovementioned measures are also applicable to the transfers to sub-processors