Privacy and Data Handling Policy
1 Purpose
To establish clear guidelines for collecting, processing, storing, retaining, and sharing personal and sensitive data while ensuring compliance with data protection laws.
2 Scope
Covers all forms of personal data handled by Tribird AS, including electronic, paper-based, and verbal data.
3 Data Privacy Principles
- Lawfulness and Transparency: Process data in a fair and lawful manner.
- Purpose Limitation and Minimization: Collect and use personal data strictly for legitimate, clearly defined purposes and only to the extent necessary.
- Accuracy and Storage Limitation: Keep data accurate and retain it only as long as needed.
- Integrity and Confidentiality: Protect data from unauthorized access and breaches.
- Accountability: Maintain compliance and conduct regular reviews of data handling practices.
4 Data Handling Procedures
4.1 Data Collection
- Consent and Lawful Basis: Collect personal data only on a lawful basis and with necessary consent when required.
- Data Inventory: Maintain an up-to-date record of the personal data collected and its processing purposes.
4.2 Data Processing and Use
- Purpose Specification: Clearly define and document the reasons for processing personal data.
- Restricted Processing: Use the data solely for its stated purposes.
4.3 Data Storage and Retention
- Secure Storage: Ensure all personal data is stored securely using encryption and access controls as needed.
- Retention for Order Shipments:
- Retention Period: Retain Personally Identifiable Information (PII) associated with order shipments for 31 to 90 days after the shipment date.
- Data Masking: After the retention period, perform data masking to remove sensitive PII while retaining non-identifiable data for analysis or audit purposes.
- Secure Disposal: Dispose of personal data securely when it is no longer required.
4.4 Data Transmission
- Encryption: Encrypt sensitive data in transit using industry-standard protocols.
- Secure Channels: Transmit data only over secure, authorized channels.
4.5 Data Access and Sharing
- Access Controls: Limit access to personal data using role-based controls.
- Third-Party Sharing: Ensure any sharing of personal data is done under strict contractual obligations and secure transmission methods.
- Data Anonymization: Where possible, anonymize or pseudonymize data to further protect privacy.
5 Roles and Responsibilities
- Executive Management: Oversee data protection efforts and allocate resources.
- Data Protection Officer (DPO): Monitor compliance, handle data subject requests, and serve as the primary contact for privacy issues.
- Department Managers: Ensure adherence to this policy within their teams.
- All Employees: Follow the policy and report any data protection issues.
6 Data Subject Rights
Data subjects have rights to access, correct, delete, restrict processing, and receive data in a portable format. They may also lodge complaints with supervisory authorities.
7 Incident Response and Breach Management
- Detection and Reporting: Immediately report any suspected data breaches.
- Investigation and Mitigation: Conduct thorough investigations and take corrective measures.
- Notification: Notify affected data subjects and regulatory bodies as required.
8 Training and Auditing
- Employee Training: Provide regular training on data privacy and handling procedures.
- Internal Audits: Regularly audit data handling practices to ensure compliance.
9 Policy Review and Updates
This policy is a living document and will be reviewed at least annually or when significant changes occur. All updates require executive management approval.