Match and Fable Inc.’s Personal Identity Information Policy is our commitment to treat the information of employees, clients, candidates and other interested parties with the utmost care and confidentiality.
This policy ensures we gather, store and handle data fairly, transparently and with respect towards individual rights.
This policy refers to all parties (employees, clients, candidates etc.) who provide any amount of information to us.
Employees of Match and Fable, consultants, partners and any other external entities must follow this policy.
POLICY ELEMENTS
As part of our day-to-day operations, Match and Fable Inc. obtains and processes information. This information includes any data that makes a person identifiable such as names, addresses, contact numbers, resumes etc.
Match and Fable Inc. collects this information in a transparent way and only with the full cooperation and knowledge of interested parties. Once this information is available to us, the following rules apply.
OUR DATA WILL BE:
-
Accurate and kept up to date
-
Collected fairly and for lawful purposes, only
-
Processed by the company within its legal and moral boundaries
-
Protected against any unauthorized or illegal access by internal or external parties
OUR DATA WILL NOT BE:
-
Communicated informally
-
Transferred to external organizations, states or countries that do not have adequate data protection policies
-
Distributed to any party other than those agreed upon by the data’s owner (exempting legitimate law enforcement requests)
In addition to handling the data, Match and Fable Inc. has obligations towards the individuals to whom the data belongs.
-
Let people know which of their data is collected
-
Inform people about how we’ll process their data
-
Inform people about who has access to their information
-
Have provisions in cases of lost, corrupted or compromised data
-
Allow people to request we modify, erase, reduce or correct data contained in our databases
ACTIONS:
To exercise data protection, we’re committed to:
-
Restrict and monitor access to sensitive data
-
Develop transparent data collection procedures
-
Train employees in online privacy and security measures
-
Utilize our partners’ secure networks to protect online data from cyberattacks
-
Establish clear procedures for reporting privacy breaches or data misuse
-
Establish data protection practices (document shredding, secure locks, data encryption, backups, access authorization etc.)