MobiledotRep Solutions supports the right to privacy, including the rights of individuals to control the dissemination and use of personal data that describes them, their personal choices, or life experiences. MobiledotRep Solutions supports domestic and international laws and regulations that seek to protect the privacy rights of such individuals.
This policy applies to all MobiledotRep Solutions employees, contractors, temporaries, and consultants, and other workers. All of these people are expected to be familiar with and fully in compliance with these policies.
This policy also applies to outsourcing organizations that perform information-processing services on behalf of MobiledotRep Solutions. Use of outsourcing organizations to process personal data must always include a contractual commitment to consistently observe these policies and related MobiledotRep Solutions procedures and standards. All outsourcing organizations handling personal data provided by MobiledotRep Solutions must periodically issue certificates of compliance with this policy, and permit MobiledotRep Solutions to initiate independent audits to determine compliance with this policy.
Personal data—any information relating to an individual. Such data includes name, address, telephone number, address, social security number, driver’s license number, and personal business transaction details. For example, such a person could be a purchaser of MobiledotRep Solutions products. The following policies do not apply to statistical reports or other collections of information in which specific natural persons are not identifiable.
Processing of personal data or “processing”—Any operation or set of operations performed on personal data, whether by automatic means, such as collection, recording, organization, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, combination, blocking, erasure or destruction.
Data Owner—The Client Solutions manager or executive, who determines the purposes for processing personal data.
Custodian—The MobiledotRep Solutions manager, or third-party organization manager if processing is outsourced, who processes personal data according to the instructions provided by the Owner.
Third party—any person, partnership, corporation, public authority, government agency, or any other entity other than the individual, Owner, Custodian, and the persons who, under the direct authority of the Owner or the Custodian, are authorized to process the data.
Recipient—the person, public authority, government agency, or any other entity to whom personal data is disclosed, even if the recipient is a third party.
Consent—Any freely-given informed indication of his or her wishes by which the individual signifies his or her agreement to have his or her personal data processed, which may include disclosure.
Information to be given to the Individual (Right to Inspect)
The Owner or his or her representative must provide individuals with the following information:
Where personal data has not been obtained directly from the individual, the owner or his or her representative must notify the individual at the time when personal data will be processed. If a disclosure to a third party is anticipated, the individual must be notified no later than the time when the data is disclosed. The owner must provide the individual with at least the following information, except where the individual already knows it:
Upon request, the owner or his or her representative must provide all individuals with a brief written summary of the subject’s rights to learn about, get copies of, lodge objections to, and correct personal data. Trained personnel who can explain an individual’s rights must be available to subjects by telephone.
If MobiledotRep Solutions changes its privacy policy, an attempt to notify all individuals must be promptly initiated. As a part of this notification, MobiledotRep Solutions must provide individuals with a summary of the words that have changed and what these changes mean. Individuals also must be given an opportunity to be removed from MobiledotRep Solutions records.
Individual’s Right of Access to Data
Every individual has the right to obtain the following from the Custodian:
Individuals may object, free of charge, to the processing or possession of personal data In such cases data owners must provide prompt guideline to the Data custodian regarding the individual’s Objection for data processing or data usagage. Mobiledotrep, shall delete all the data of individuals who have objected.
Individuals must be informed before personal data is disclosed for the first time to third parties or used on their behalf for the purposes of Business and Research. Individuals must be expressly offered the right to object free of charge to such disclosures or uses. Owners must provide processing mechanisms that permit individuals who objected to block such a disclosure.
Disclosure of Personal Data to Third Parties
MobiledotRep Solutions may provide third parties with personal data processed on its systems for generally accepted business purposes such as court orders, subpoenas, employment verification, governmental licensing, underwriting, and other reasons. All recipients of such information must definitively identify themselves, certify in writing the legal and customary purposes for which the information is sought and certify that the personal data will be used for no other purposes.
Sufficient time must be provided between the receipt of such notice to the individual and the actual disclosure to the third party to permit the individual to object, should he or she so elect.
Processing Confidentiality and Security
The Owner must implement appropriate technical and organizational measures to protect personal data against accidental or unlawful destruction, accidental loss, unauthorized alteration, and unauthorized disclosure or access. These measures must be consistent with the standards and procedures issued by the Information Security department.
Transfers of private information to another country, no matter what technology is employed, must not take place unless prior approval of the Information Security manager has been obtained. An exception is made in those cases where the individual is, was, or will be located in the destination country, or when the individual has specifically requested such a transfer.
MobiledotRep Solutions information systems or staff must not link anonymous information about individual behavior or activities with personally-identifiable information unless the involved individuals have given their consent. For example, such a linkage could tie Internet shopping purchase information with web browsing logs.
The Owner or his or her designated representative must prepare a documented risk assessment to determine the privacy implications of all significantly new or different uses of personal data. Such a risk assessment must be completed before these uses take place, and must include all steps in the proposed processing, including access, storage, transmission, and destruction. Such a risk assessment must include not only consideration of the risks, but also the security measures to be employed such as access controls, encryption, logs, data retention schedules, and data destruction procedures.
When building, testing, enhancing, and maintaining processing systems, developers must not use actual personal data. Instead, they must use fictional or sanitized personal data that preserves the essential characteristics of the data, but that does not relate to identifiable individuals. In emergency situations where processing with actual personal data is required, use of such information is permitted under strict security procedures defined by Information Security.
All user access to processing systems and networks containing personal data must be logged so that every recent access to personal data can be traced to a specific user. Custodians of these systems and networks are responsible for the routine monitoring of such logs and the follow-up on potential security-relevant events.
When not in use, personal data must be stored in encrypted form if held in a computer or network, or in locked or similarly secured containers if held in paper, microfiche, or other non-computerized form. When sent over public computer networks such as the Internet, personal data must be protected by encryption. Procedures and standards issued by Information Security provide additional details on these topics.
When they are no longer needed, all copies of personal data, including those on backup tapes, must be irreversibly destroyed according to standards and procedures defined by the Compliance department. A document describing the personal data destroyed and the reasons for such destruction must be prepared for each destruction process, and promptly submitted to the relevant Owner. Permission to destroy personal data may be granted by only the Owner, and only if all legal retention requirements and related business purposes have been met.
The use of cookies, web bugs, images, and other techniques to covertly gather information about individuals who use the Internet is incompatible with this policy. Whenever MobiledotRep Solutions gathers information about individuals, these same subjects must have agreed upon the collection effort in advance. For this same reason, MobiledotRep Solutions does not deposit cookie files on individual hard drives or does not perform any other covert recording of the Internet activity in which individuals have engaged.
MobiledotRep Solutions streamlines and expedites all of its computerized business interactions with individuals, but at the same time to be forthright and clear about its privacy policies. To support these objectives and to encourage individuals to use Internet commerce sites and other computerized business systems, MobiledotRep Solutions adopts and supports all generally-accepted standards for web content rating, web site privacy protection, and Internet commerce security, including third-party seals of approval.
MobiledotRep Solutions does not use externally-meaningful identifiers as its own internal individual account numbers. For example, to prevent identity theft, MobiledotRep Solutions customer account numbers must never be equivalent to social security numbers, driver’s license numbers, or any other identifier that might be used in an unauthorized fashion by a third party.
Monitoring of Internal Activities
In general terms, MobiledotRep Solutions does not engage in blanket monitoring of internal communications. It does, however, reserve the right at any time to monitor, access, retrieve, read, or disclose internal communications when a legitimate business need exists that cannot be satisfied by other means, the involved individual is unavailable and timing is critical to a business activity, there is reasonable cause to suspect criminal activity or policy violation, or monitoring is required by law, regulation, or third-party agreement.
At any time, MobiledotRep Solutions may log web sites visited, files downloaded, and related information exchanges over the Internet. Department managers may receive reports detailing the usage of these and other internal information systems, and are responsible for determining that such usage is both reasonable and business-related.
All files and messages stored on MobiledotRep Solutions processing systems are routinely backed up to tape, disk, and other storage media. This means that information stored on MobiledotRep Solutions information processing systems, even if a worker has specifically deleted it, is often recoverable and may be examined at a later date by system administrators and others designated by management.
At any time and without prior notice, MobiledotRep Solutions management reserves the right to examine archived electronic mail, personal computer file directories, hard disk drive files, and other information stored on MobiledotRep Solutions information processing systems. This information may include personal data. Such examinations are typically performed to assure compliance with internal policies, support the performance of internal investigations, and assist with the management of MobiledotRep Solutions information processing systems.
Employees Engaged for MobiledotRep Solutions