Skip to content Skip to footer

Introduction

The Data Protection and Privacy Policy ensures that ThirdEye Data gathers, stores, and handles customer data fairly, transparently, and with respect to individual rights.

DATA PROTECTION PRINCIPLES

DPA requires that personal data shall be:

  • A. processed lawfully, fairly and in a transparent manner in relation to individuals
  • B. collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes; further processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes shall not be considered to be incompatible with the initial purposes;
  • C. adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed;
  • D. accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay;
  • E. kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed; personal data may be stored for longer periods insofar as the personal data will be processed solely for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes subject to implementation of the appropriate technical and organizational measures required by the DPA in order to safeguard the rights and freedoms of individuals;
  • F. processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organizational measures.

GENERAL PROVISIONS

  • A. This policy applies to all personal data processed by the Organization. 
  • B. The Responsible Person shall take responsibility for the Organization’s ongoing compliance with this policy. 
  • C. This policy shall be reviewed at least annually. 
  • D. The Organization shall register with the Information Commissioner’s Office as an organization that processes personal data. 

LAWFUL, FAIR AND TRANSPARENT PROCESSING 

  • A. To ensure its processing of data is lawful, fair and transparent, the Organization shall maintain a Register of Systems. 
  • B. The Register of Systems shall be reviewed at least annually. 
  • C. Individuals have the right to access their personal data and any such requests made to the Organization shall be dealt with in a timely manner. 

LAWFUL PURPOSES

  • A. All data processed by the Organization must be done on one of the following lawful bases: consent, contract, legal obligation, vital interests, public task or legitimate interests (see ICO guidance for more information). 
  • B. The Organization shall note the appropriate lawful basis in the Register of Systems.
  • C. Where consent is relied upon as a lawful basis for processing data, evidence of opt-in consent shall be kept with the personal data. 
  • D. Where communications are sent to individuals based on their consent, the option for the individual to revoke their consent should be clearly available and systems should be in place to ensure such revocation is reflected accurately in the Organization’s systems.  

DATA MINIMIZATION

The Organization shall ensure that personal data are adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed. 

ACCURACY

  • A. The Organization shall take reasonable steps to ensure personal data is accurate. 
  • B. Where necessary for the lawful basis on which data is processed, steps shall be put in place to ensure that personal data is kept up to date. 

ARCHIVING / REMOVAL

  • A. To ensure that personal data is kept for no longer than necessary, the Organization shall put in place an archiving policy for each area in which personal data is processed and review this process annually. 
  • B. The archiving policy shall consider what data should/must be retained, for how long, and why. 
  • C. Any data with Personal Information (i.e., name, email address, phone number, IP address, user location, user passwords) will be encrypted and stored securely until expiration or termination of the relevant agreement, whichever is later.
  • D. Any client Data in ThirdEye Data Product (any data provided, uploaded, or submitted by/from you to the product in the course of using the product, and data processed, stored, and presented in the product as a derivative of the transmitted data for your use) is kept for a minimum of the duration of the relevant agreement plus the time specified in the agreement for data retention.
  • E. Any Transactional Data of client is kept for until expiration or termination of the relevant agreement.

SECURITY

  • A. The Organization shall ensure that personal data is encrypted and stored securely using modern software that is kept-up-to-date.  
  • B. Access to personal data shall be limited to personnel who need access and appropriate security should be in place to avoid unauthorized sharing of information. 
  • C. When personal data is deleted, this should be done safely such that the data is irrecoverable. 
  • D. Appropriate back-up and disaster recovery solutions shall be in place. 

BREACH

In the event of a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data, the Organization shall promptly assess the risk to people’s rights and freedoms and if appropriate report this breach to the ICO (more information on the ICO website). 

ROLES AND RESPONSIBILITIES

  • A. Data owners are employees who have primary responsibility for maintaining information that they own, such as an executive, department manager or team leader.
  • B. Information Security Administrator is an employee designated by the IT management who provides administrative support for the implementation, oversight and coordination of security procedures and systems with respect to specific information resources.
  • C. Users include everyone who has access to information resources, such as employees, trustees, contractors, consultants, temporary employees and volunteers.
  • D. The Incident Response Team shall be chaired by an executive and include employees from departments such as IT Infrastructure, IT Application Security, Legal, Financial Services and Human Resources.
Talk To Us