The purpose of this policy is to maintain the privacy of and protect the personal information of employees, contractors, vendors, interns, associates, customers and business partners of JK Technosoft Limited and ensure compliance with laws and regulations applicable to JK Technosoft Limited (hereafter referred to as “JKT” or “the organization”).
This policy is applicable to all JKT employees, contractors, vendors, interns, associates, customers and business partners who may receive personal information, have access to personal information collected or processed, or who provide information to the organization.
All partner firms and any Third-Party working with or for JKT, and who have or may have access to personal information, will be expected to have read, understand and comply with this policy. No Third Party may access personal information held by the organization without having first entered into a confidentiality agreement.
shall be directed to the General Counsel.
In cases where non-compliance is identified, the General Counsel / Data Privacy officer shall review the reasons for such non-compliance along with a plan for remediation and report them to the Data Privacy Management Committee. Depending on the conclusions of the review, the need for a revision to
the policy may be identified. In instances of persistent non-compliance by the individuals concerned, they shall be subject to action in accordance with the JKT Disciplinary Policy
Data Privacy Principles
This Policy describes generally acceptable privacy principles (GAPP) for the protection and appropriate use of personal information at JKT. These principles shall govern the use, collection, disposal and transfer of personal information, except as specifically provided by this Policy or as
required by applicable laws:
- Notice: JKT shall provide data subjects with notice about how it collects, uses, retains, and discloses personal information about them.
- Choice and Consent: JKT shall give data subjects the choices and obtain their consent regarding how it collects, uses, and discloses their personal information.
- Rights of Data subject: JKT shall provide individuals with the right to control their personal information, which includes the right to access, modify, erase, restrict, transmit, or object to certain uses of their information and for withdrawal of earlier given consent to the notice
- Collection: JKT shall collect personal information from data subjects only for the purposes identified in the privacy notice / SoW / contract agreements and only to provide requested product or service.
- Use, Retention and Disposal:: JKT shall only use personal information that has been collected for the purposes identified in the privacy notice/SoW/contract agreements and in accordance with the consent that the data subject shall provide. JKT shall not retain personal information longer than is necessary to fulfill the purposes for which it was collected and to maintain reasonable business records. JKT shall dispose the personal information once it has served its intended purpose or as specified by the data subject.
- Access: JKT shall allow data subjects to make inquiries regarding the personal information about them, that JKT shall hold and, when appropriate, shall provide access to their personal information for review, and/or update.
- Disclosure to Third Parties: JKT shall disclose personal information to Third Parties / partner firms only for purposes identified in the privacy notice / SoW / contract agreements. JKT shall disclose personal information in a secure manner, with assurances of protection by those
parties, according to the contracts, laws and other segments, and, where needed, with the consent of the data subject.
- Obligations for Sub-processor: Where a processor (vendor or 3rd party acting on behalf of JKT’s data processor) engages another processor (Sub-processor) for carrying out specific processing activities on behalf of JKT (controller), the same data protection obligations as set out in the
contract or other legal act between JKT and the processor shall be imposed on the Subprocessor by way of a contract or other legal act under Union or Member State law, in particular providing sufficient guarantees to implement appropriate technical and organisational measures in such a manner that the processing will meet the requirements of GDPR. Where the Sub-processor fails to fulfill its data protection obligations, the initial processor (relevant vendor or 3rd party acting on behalf of JKT’s data processor) shall remain fully liable to JKT for the performance of that Sub-processor’s obligations.
- Security for Privacy: JKT shall protect personal information from unauthorized access, data leakage and misuse.
- Quality: JKT shall take steps to ensure that personal information in its records is accurate and relevant to the purposes for which it was collected.
- Monitoring and Enforcement: JKT shall monitor compliance with its privacy policies, both internally and with Third Parties, and establish the processes to address inquiries, complaints and disputes.
Notice shall be made readily accessible and available to data subjects before or at the time of collection of personal information or otherwise, notice shall be provided as soon as practical thereafter. Notice shall be displayed clearly and conspicuously and shall be provided through online
(e.g. by posting it on the intranet portal, website, sending mails, newsletters, etc.) and/or offline methods (e.g. through posts, couriers, etc.). All the web sites (including Intranet portals), and any product or service that collects personal information internally, shall have a privacy notice.
In case of any cross-border transfer of personal information, the data subjects shall be informed by a notice sufficiently prior to the transfer.
Privacy notices may include:
- the organization’s operating jurisdictions; Third Parties involved; business segments and affiliates; lines of business; locations;
- types of personal information collected; sources of information; who is collecting the personal information, including contact information;
- the purpose of collecting the personal information;
- assurance that the personal information will be used only for the purpose identified in the notice and only if the implicit and/or explicit consent is provided unless a law or regulation specifically requires otherwise;
- any choices the data subject have regarding the use or disclosure of the information; the process and the data subject shall follow to exercise the choices;
- the process for a data subject to change contact preferences and ways in which the consent is obtained.
- collection process and how the information is collected; how the information is used including any onward transfer to Third-Parties;
- retention and disposal process for personal information; assurance that the personal information to be retained only as long as necessary to fulfill the stated purposes, or for a period specifically required by law or regulation and will be disposed-off securely or made anonymous post the identified purpose is completed;
- process of accessing personal information; the costs associated for accessing personal information (if any); process to update/correct the personal information; the resolution of disagreements related to personal information; how the information is protected from unauthorized access or use;
- how users will be notified of any changes made to privacy notice;
- disclosure process for Third Parties; the assurance that the personal information is disclosed to Third Parties only for the purpose identified; the remedial actions in place for any misuse of personal information by the Third Parties;
- security measures in place to protect the personal information; ways of maintaining the quality of personal information;
- Consequences of not providing the requested information.
Choice and Consent
Choice refers to the options the data subjects are offered regarding the collection and use of their personal information. Consent refers to their agreement to the collection and uses, often expressed by the way in which they exercise a choice option.
- JKT shall establish systems for the collection and documentation of data subject consents to the collection, processing, and/or transfer of personal data.
- Data subjects shall be informed about the choices available to them with respect to the collection, use, and disclosure of personal information.
- Consent shall be obtained (in writing or electronically) from the data subjects before or at the time of collecting personal information or as soon as practical thereafter.
- The changes to a data subject’s preferences shall be managed and documented. Consent or withdrawal of consent shall be documented appropriately.
- The choices shall be implemented in a timely fashion and respected. If personal information is to be used for purposes not identified in the notice / SoW / contract agreements at the time of collection, the new purpose shall be documented, the data subject shall be notified, and consent shall be obtained prior to such new use or purpose.
- The data subject shall be notified if the data collected is used for marketing purposes, advertisements, etc.
- JKT shall review the privacy policies of the Third Parties and types of consent of Third Parties before accepting personal information from Third-Party data sources
Collection of Personal Information
Personal information may be collected online or offline. Regardless of the collection method, the same privacy protection shall apply to all personal information.
- Personal information shall not be collected unless either of the following is fulfilled:
- the data subject has provided a valid, informed and free consent;
- processing is necessary for the performance of a contract to which the data subject is a party or in order to take steps at the request of the data subject prior to entering into a contract;
- processing is necessary for compliance with the organizations legal obligation;
- processing is necessary in order to protect the vital interests of the data subject; or
- processing is necessary for the performance of a task carried out in the public interest
- Data subjects shall not be required to provide more personal information than is necessary for the provision of the product or service that data subject has requested or authorized. If any data not needed for providing a service or product is requested, such fields shall be clearly labelled as optional. Collection of personal information shall be avoided or limited when reasonably possible.
- Personal information shall be de-identified when the purposes of data collection can be achieved without personally identifiable information, at reasonable cost.
- When using vendors to collect personal information on the behalf of JKT, it shall ensure that the vendors comply with the privacy requirements of JKT as defined in this Policy
- JKT shall at minimum, annually review and monitor the information collected, the consent obtained and the notice / SoW / contract agreement identifying the purpose.
- The project team/support function shall obtain approval from the IT Security team before adopting the new methods for collecting personal information electronically.
- JKT shall review the privacy policies and collection methods of Third-Parties before accepting personal information from Third-Party data sources
Use, Retention and Disposal
- Personal information may only be used for the purposes identified in the notice / SoW / contract agreements and only if the data subject has given consent;
- Personal information shall be retained for as long as necessary for business purposes identified in the notice / SoW / contract agreements at the time of collection or subsequently authorized by the data subjects.
- When the use of personal information is no longer necessary for business purposes, a method shall be in place to ensure that the information is destroyed in a manner sufficient to prevent unauthorized access to that information or is de-identified in a manner sufficient to make the data non-personally identifiable.
- JKT shall have a documented process to communicate changes in retention periods of personal information required by the business to the data subjects who are authorized to request those changes.
- Personal information shall be erased if their storage violates any of the data protection rules or if knowledge of the data is no longer required by JKT or for the benefit of the data subject. Additionally, JKT has the right to retain the personnel information for legal and regulatory purpose and as per applicable data privacy laws.
JKT shall establish a mechanism to enable and facilitate exercise of data subject’s rights of access, blockage, erasure, opposition, rectification, and, where appropriate or required by applicable law, a system for giving notice of inappropriate exposure of personal information.
- Data subjects shall be entitled to obtain the details about their own personal information upon a request made and set forth in writing. JKT shall provide its response to a request within 72 hours of receipt of written request.
- The data subjects shall have the right to require JKT to correct or supplement erroneous, misleading, outdated, or incomplete personal information.
- Requests for access to or rectification of personal information shall be directed, at the data subject’s option, to the manager of the projects team or support function responsible for the personal information.
- The members of the compliance team shall record and document each access request as it is received and the corresponding action taken.
- JKT shall provide personal information to the data subjects in a plain simple format which is understandable (not in any code format).
Disclosure to Third Parties
Data Subject shall be informed in the privacy notice / SoW / contract agreement, if personal information shall be disclosed to Third Parties / partner firms, and it shall be disclosed only for the purposes described in the privacy notice / SoW / contract agreements and for which the data subject has provided consent.
- Personal information of data subjects may be disclosed to the Third Parties / partner firms only for reasons consistent with the purposes identified in the notice / SoW / contract agreements or other purposes authorized by law.
- JKT shall notify the data subjects prior to disclosing personal information to Third Parties / partner firms for purposes not previously identified in the notice / SoW / contract agreements.
- JKT shall communicate the privacy practices, procedures and the requirements for data privacy and protection to the Third Parties / partner firms.
- The Third Parties shall sign a NDA (Non-Disclosure Agreement) with JKT before any personal information is disclosed to the Third Parties partner firms. The NDA shall include the terms on non-disclosure of customer information.
Information security policy and procedures shall be documented and implemented to ensure reasonable security for personal information collected, stored, used, transferred and disposed by JKT.
- Information asset labelling and handling guidelines shall include controls specific to the storage, retention and transfer of personal information.
- Management shall establish procedures that maintain the logical and physical security of personal information.
- Management shall establish procedures that ensure protection of personal information against accidental disclosure due to natural disasters and environmental hazards.
- Incident response protocols are established and maintained in order to deal with incidents concerning personal data or privacy practices.
JKT shall maintain data integrity and quality, as appropriate for the intended purpose of personal data collection and use and ensure data is reliable, accurate, complete and current.
- For this purpose, the general counsel and the compliance team shall have systems and procedures in place to ensure that personal information collected is accurate and complete for the business purposes for which it is to be used.
- JKT shall perform an annual assessment on the personal information collected to check for accuracy, completeness and relevance of the personal information.
Monitoring and enforcement
Dispute Resolution and Recourse
JKT shall define and document an Incident and Breach Management policy which addresses the privacy related incidents and breaches.
- The incident and breach management program includes a clear escalation path up to the executive management, legal counsel, and the board based on type and/or severity of the privacy incident/breach. It shall define a process to register all the incidents/complaints and queries related to data privacy
- JKT shall perform a periodic review of all the complaints related to data privacy to ensure that all the complaints are resolved in a timely manner and resolutions are documented and communicated to the data subjects.
- An escalation process for unresolved complaints and disputes which shall be designed and documented.
- Communication of privacy incident / breach reporting channels and the escalation matrix shall be provided to all the data subjects.
Dispute Resolution and Escalation Process for Employees
Employees with inquiries or complaints about the processing of their personal information shall first discuss the matter with their immediate supervisor. If the employee does not wish to raise an inquiry or complaint with an immediate manager, or if the manager and employee are unable to
reach a satisfactory resolution of the issues raised, the employee shall bring the issue to the attention of the General Counsel. (Emailing at firstname.lastname@example.org)
Dispute Resolution and Escalation Process for Customer / Third Party
Customers / Third Party with inquiries or complaints about the processing of their personal information shall bring the matter to the attention of the General Counsel in writing. Any disputes concerning the processing of the personal information of non-employees shall be resolved through
Compliance Team shall conduct an internal audit annually (at minimum) to ensure compliance with the established privacy policies and applicable laws.
- The internal audit shall consist of the review of the following:
- personal information collected from data subjects;
- the purposes of the data collection and processing;
- the actual uses of the data;
- disclosures made about the purposes of the collection and use of such data;
- the existence and scope of any data subject consents to such activities;
- any legal obligations regarding the collection and processing of such data, and
- the scope, sufficiency, and implementation status of security measures.
- The Compliance team shall document all the instances of non-compliance with privacy policies and procedures and report the same with the Data Privacy Management committee.
- The General Counsel along with the Compliance Team shall take actions on the findings from the internal audit and work on the recommendations for improvement of the privacy posture.
- Any changes made to the policies shall be communicated to all the employees, the stakeholders and the customers / clients.
A data subject who is the subject of personal and sensitive personal data.
Personal data or Personally Identifiable Information (PII)
PII is any information about an individual (the data subject) which can
Examples included but not limited to: Name, Address, Date of birth etc.
Sensitive Personal Information (SPI)
Sensitive personal data means personal data consisting of information but not limited to the following attributes of the data subject:
Provided that, any information that is freely available or accessible in public domain or furnished under the Right to Information Act, 2005 or any other law for the time being in force shall not be regarded as sensitive personal data or information for the purposes of these rules.
All external parties – contractors, interns, summer trainees, vendors – who have access to JKT information assets or information systems.
Data protection and security
Anyone collecting personal and customer information must fairly and lawfully process it, process it only for limited, specifically stated purposes, use the information in a way that is adequate, relevant and not excessive, use the information accurately, keep the information on file no longer than absolutely necessary, process the information in accordance with your legal rights, keep the information secure and never transfer the information outside the country without adequate protection