GDPR

  1. 1. Introduction

Trident Security Solutions Ltd. Solutions Ltd (“Trident Security Solutions Ltd.”) is committed to conducting its business in accordance with all applicable data Protection laws and regulations and in line with the highest standards of ethical conduct.

This policy sets forth the expected behaviours of Trident Security Solutions Ltd. Employees and Third Parties in relation to the collection, use, retention, transfer, disclosure and destruction of any personal data belonging to a Trident Security Solutions Ltd. Contact (i.e. the data Subject). Personal data is any information (including opinions and intentions) which relates to an identified or Identifiable Natural Person or any company data, i.e. Customers.

Personal data is subject to certain legal safeguards and other regulations, which impose restrictions on how organisations may process personal data. An organisation that handles personal data and makes decisions about its use is known as a data Controller. Trident Security Solutions Ltd., as a data Controller, is responsible for ensuring compliance with the data Protection requirements outlined in this policy. Non-compliance may expose Trident Security Solutions Ltd. to complaints, regulatory action, fines and/or reputational damage.

Trident Security Solutions Ltd.’s leadership is fully committed to ensuring continued and effective implementation of this policy, and expects all Trident Security Solutions Ltd. Employees and Third Parties to share in this commitment. Any breach of this policy will be taken seriously and may result in disciplinary action or business sanction.

This policy has been approved by Trident Security Solutions Ltd. Solutions’ Managing Director, Roman Yuriychuk.

Name: Roman Yuriychuk

Signature:

 

 

 

  1. Scope

This policy applies to all Trident Security Solutions Ltd. Individuals where a data subject’s personal data is processed:

  • In the context of the business activities of the Trident Security Solutions Ltd. Solutions Ltd.
  • For the provision or offer of goods or services to individuals (including those provided or offered free-of-charge) by a Trident Security Solutions Ltd. Solutions Ltd. Individual.
  • To actively monitor the behaviour of individuals.

Monitoring the behaviour of individuals includes using data processing techniques such as persistent web browser cookies or dynamic IP address tracking to profile an individual with a view to:

  • Taking a decision about them.

Analysing or predicting their personal preferences, behaviours and attitudes. This policy applies to all processing of personal data in electronic form (including electronic mail and documents created with word processing software) or where it is held in manual files that are structured in a way that allows ready access to information about individuals.

This policy has been designed to establish a global baseline standard for the processing and protection of personal data by all Trident Security Solutions Ltd. Solutions Ltd. entities. Where national law imposes a requirement which is stricter than imposed by this policy, the requirements in national law must be followed.

Furthermore, where national law imposes a requirement that is not addressed in this policy, the relevant national law must be adhered to. If there are conflicting requirements in this policy and national law, please consult with the Compliance Manager. The protection of personal data belonging to Trident Security Solutions Ltd. Solutions employees is not within the scope of this policy. It is covered in the Trident Security Solutions Ltd. ‘data Protection for Employee data’ policy.

  1. Definitions

Employee an individual who works part-time or full-time for Trident Security Solutions Ltd. Solutions Ltd. under a contract of employment or sub contract, whether oral or written, express or implied, and has recognised rights and duties. Includes temporary employees and independent contractors.

Third Party an external organisation with which Trident Security Solutions Ltd. Solutions Ltd. conducts business and is also authorised to, under the direct authority of Trident Security Solutions Ltd. Solutions Ltd., process the personal data of Trident Contacts. Personal data any information (including opinions and intentions) which relates to an identified or identifiable natural person. Contact any past, current or prospective Trident Security Solutions Ltd. Solutions Ltd. customer. Identifiable natural person anyone who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier, or one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.

Data controller a natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data.

Trident Security Solutions Ltd. Solutions Ltd. entity a Trident Security Solutions Ltd. Solutions Ltd. establishment, including subsidiaries and joint ventures over which Trident Security Solutions Ltd. Solutions Ltd. exercise management control.

3.1 Definitions Data Subject

The identified or identifiable natural person to which the data refers. Process, processed, processing, any operation or set of operations performed on personal data or on sets of personal data, whether or not by automated means. Operations performed may include collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.

Data protection the process of safeguarding personal data from unauthorised or unlawful disclosure, access, alteration, processing, transfer or destruction. Data protection authority an independent public authority responsible for monitoring the application of the relevant data protection regulation set forth in national law. Data processors a natural or legal person, public authority, agency or other body which processes personal data on behalf of a data controller.

Consent any freely given, specific, informed and unambiguous indication of the data subject’s wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her. Special categories of data personal data pertaining to or revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership; data concerning health or sex life and sexual orientation; genetic data or biometric data.

3.2 Definitions of a Third Country

Any country not recognised as having an adequate level of legal protection for the rights and freedoms of data Subjects in relation to the processing of personal data. Profiling any form of automated processing of personal data where personal data is used to evaluate specific or general characteristics relating to an identifiable natural person.

In particular to analyse or predict certain aspects concerning that natural person’s performance at work, economic situations, health, personal preferences, interests, reliability, behaviour, location or movement. Binding corporate rules the personal data protection policies used for the transfer of personal data to one or more third countries within a group of undertakings, or group of enterprises engaged in a joint economic activity. Personal data breach, a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed. Encryption the process of converting information or data into code, to prevent unauthorised access.

Pseudonymisation -data amended in such a way that no individuals can be identified from the data (whether directly or indirectly) without a “key” that allows the data to be re-identified. Anonymisation -data amended in such a way that no individuals can be identified from the data (whether directly or indirectly) by any means or by any person.

  1. Policy

Purpose of the policy and background to the General Data Protection Regulation

This policy explains to staff about GDPR. Personal data must be processed lawfully, fairly and transparently; collected for specified, explicit and legitimate purposes; be adequate, relevant and limited to what is necessary for processing; be accurate and kept up to date; be kept only for as long as is necessary for processing and be processed in a manner that ensures its security. This policy updates any previous data protection policy and procedures to include the additional requirements of GDPR which apply in the UK from 25th May 2018. The Government have confirmed that despite the UK leaving the EU, GDPR will still be a legal requirement. This policy explains the duties and responsibilities, and it identifies the means by which we will meet its obligations.

Identifying the roles and minimising risk

GDPR requires that everyone must understand the implications of GDPR and that roles and duties must be assigned. The company will assign a key staff member to take on the role as the Data Controller Data Protection Officer (DPO). It is the DPO’s duty to undertake an information audit and to manage the information collected, the issuing of privacy statements, dealing with requests and complaints raised and also the safe disposal of information.

Appointing a member as the DPO must avoid a conflict of interests, in that the DPO should not determine the purposes or manner of processing personal data.

GDPR requires continued care by everyone, in the sharing of information about individuals, whether as a hard copy or electronically. A breach of the regulations could result in the company facing a fine from the Information Commissioner’s Office (ICO) for the breach itself and also to compensate the individual(s) who could be adversely affected.

Therefore, the handling of information is seen as high / medium risk (both financially and reputation) and one which must be included in the Risk Management. Such risk can be minimised by undertaking an information audit, issuing privacy statements, maintaining privacy impact assessments (an audit of potential data protection risks with new projects), minimising who holds data protected information and the undertaking training in data protection awareness.

Data Breaches

One of the duties assigned to the DPO is the investigation of any breaches. Personal data breaches should be reported to the DPO for investigation. The DPO will conduct this with the support of the board. Investigations must be undertaken within one month of the report of a breach. Procedures are in place to detect, report and investigate a personal data breach. The ICO will be advised of a breach (within 3 days) where it is likely to result in a risk to the rights and freedoms of individuals – if, for example, it could result in discrimination, damage to reputation, financial loss, loss of confidentiality, or any other significant economic or social disadvantage.

Where a breach is likely to result in a high risk to the rights and freedoms of individuals, the DPO will also have to notify those concerned directly. It is unacceptable for employees to use IT in any way that may cause problems for the company.

Privacy Notices

Being transparent and providing accessible information to individuals about how the company uses personal data is a key element of the Data Protection Act 1998 (DPA) and the EU General Data Protection Regulation (GDPR). The most common way to provide this information is in a privacy notice. This is a notice to inform individuals about what a council does with their personal information. A privacy notice will contain the name and contact details of the data controller and Data Protection Officer, the purpose for which the information is to be used and the length of time for its use. It should be written clearly and should advise the individual that they can, at any time, withdraw their agreement for the use of this information. Issuing of a privacy notice must be detailed on the Information Audit kept by the company. The company will adopt a privacy notice to use, although some changes could be needed depending on the situation, for example where children are involved. All privacy notices must be verifiable.

Information Audit

The DPO must undertake an information audit which details the personal data held, where it came from, the purpose for holding that information and with whom the company will share that information with. This will include information held electronically or as a hard copy. Information held could change from year to year with different activities, and so the information audit will be reviewed at least annually or when the company undertakes a new activity. The information audit review should be conducted ahead of the review of this policy and the reviews should be recorded.

Individuals’ Rights

GDPR gives individuals rights with some enhancements to those rights already in place:

  • The right to be informed
  • The right of access
  • The right to rectification
  • The right to erasure
  • The right to restrict processing
  • Right to data portability
  • The right to object
  • The right not to be subject to automated decision-making including profiling.

The two enhancements of GDPR are that individuals now have a right to have their personal data erased (sometime known as the ‘right to be forgotten’) where their personal data is no longer necessary in relation to the purpose for which it was originally collected and data portability must be done free of charge. Data portability refers to the ability to move, copy or transfer data easily between different computers.

If a request is received to delete information, then the DPO must respond to this request within a month. The DPO has the given authority and following the ‘Data Retention Schedule’ from the company to delete information. If a request is considered to be manifestly unfounded then the request could be refused or a charge may apply.

4.1 Governance

GDPR Governance Structure – In its response to the GDPR, the management team needs two governance structures. The first covering the period of the implementation project and the second for the post implementation period to ensure high standards are maintained. In both phases, there will be a prominent role for the Data Protection Officer (DPO). This is a role that the Council is required to introduce under the GDPR, in common with all public authorities.

The governance objectives during this period will be to:

  • ensure a successful implementation process so that the requirements of the GDPR are met and implemented prior to the deadline of 25 May 2018

and

  • provide assurance for the Executive Management Team regarding the progress of the implementation project.

The management team already has a structure of working groups responsible for the oversight of its governance arrangements, ultimate responsibility for governance lies with the management team. However, there are two groups already in place to provide support and ongoing monitoring in this area; the Information Risk Group (IRG) and the Governance Group (GG).

The Information Risk Group (IRG) The IRG’s role is to oversee the Council’s response to all information risks. This includes Data Protection and covers Information Rights and the security of records. The group meets every 8 weeks and its members are:

Managing Director (MD) / Senior Information Risk Owner (SIRO)

ICT Manager

Chief Internal Auditor (CIA)

The Governance Group (GG) The GG monitors the standards of governance, including information issues. The group meets quarterly and its members are:

Human Resources (HR)

MD

Finance Manager

Data Protection Officer (DPO)

For the period of the project, there will be a Project Board. The Board will meet monthly and be chaired by the DPO.

The Board members will be:

Data Protection Officer (DPO)

Human Resources

ICT Manager

The board will include at least one representative from each directorate. Ideally,

these will be officers responsible for the company’s ICT network.

During the project, the GDPR will be a standing item on Company’s Management Team (CMT) and directorate management team agendas. This will allow progress to be monitored at a service level and issues to be raised through departmental representatives to the project board.

Allowing the ICT Manager to produce standardised monitoring reports for the IRG, GG and CMT. These reports will provide the opportunity for questions to be raised and concerns escalated to senior management where required.

The GDPR also requires that there is NO conflict of interest between a DPO’s role regarding data protection and any other duties they may have. This precludes the DPO being a member of ICT..

GDPR Action Plan: 12 Key Steps

1: Awareness of the GDPR and its impact To ensure decision makers and key people in the Council are aware the law is changing and to understand the impact this will have. Launch awareness campaign across the Council and establish a Project Board consisting of key stakeholders.

2: Information we hold Conduct an information audit. Document the personal data held by the Council, know where the data came from, also who the Council shares it with.

3: Communicating privacy information Review the Council’s current privacy notices and put a plan in place for making any necessary changes in time for GDPR implementation.

4: Individual’s rights Check Council procedures to ensure they cover all the rights individuals will have under the GDPR. For example procedures to cover how the Council would delete personal data or how the Council would provide data electronically and in a commonly used format.

5: Subject Access Requests Update the Council’s procedures and plan how the Council will handle requests within the new timescales.

6: Lawful basis for processing personal data To identify the lawful basis for the Council’s processing activity under the GDPR, to document that and update privacy notices to explain it.

7: Consent To review how the Council seeks, records and manages consent and decide whether any changes are required.

8: Children To consider whether the Council needs to put in place systems to verify an individual’s age to obtain parental or guardian consent for any data processing activity.

9: Data breaches To ensure procedures are in place to detect, report and investigate a personal data breach.

10: Data protection by design and Data Protection Impact Assessments (DPIA) To work out how and when to implement data protection by design and DPIAs within the Council

11: Data Protection Officers (DPO) To designate a DPO to monitor the Council’s compliance with the GDPR.

12: International To confirm whether the Council carries out any cross-border processing and if applicable determine the lead data protection supervisory authority.

4.1.1 Compliance Manager

To demonstrate our commitment to data protection, and to enhance the effectiveness of our compliance efforts, Trident Security Solutions Ltd. Solutions Ltd. has established an office of data protection. The office operates with independence and is staffed by suitability skilled individuals granted all necessary authority. The office of data protection reports to Trident Security Solutions Ltd.’s managing director. The office of data protection includes regional Data Protection Officers (DPOs) whose duties include:

  • Informing and advising Trident Security Solutions Ltd. Solutions Ltd. and its employees who carry out processing pursuant to data protection regulations
  • Ensuring the alignment of this policy with data protection regulations.
  • Providing guidance with regards to carrying out Data Protection Impact Assessments (DPIAs);
  • Acting as a point of contact for and cooperating with Data Protection Authorities (DPAs);
  • Determining the need for notifications to one or more DPAs as a result of Trident Security Solutions Ltd. Solutions Ltd. current or intended personal data processing activities;
  • Making and keeping current notifications to one or more DPAs as a result of Trident Security Solutions Ltd.’s current or intended personal data processing activities;
  • The establishment and operation of a system providing prompt and appropriate responses to data subject requests;
  • Informing senior managers, officers, and directors of Trident Security Solutions Ltd. Solutions Ltd. of any potential corporate, civil and criminal penalties which may be levied against the company and/or its employees for violation of applicable data protection laws.

Ensuring establishment of procedures and standard contractual provisions for obtaining compliance with this Policy by any Third Party who:

  • provides personal data to a Trident Security Solutions Ltd. Solutions Ltd. entity
  • receives personal data from a Trident Security Solutions Ltd. Solutions Ltd. entity
  • has access to personal data collected or processed by a Trident Security Solutions Ltd. Solutions Ltd. entity.

4.1.2 Policy Dissemination & Enforcement

The management team of each Trident Security Solutions Ltd. Solutions Ltd. entity must ensure that all Trident Security Solutions Ltd. Solutions Ltd. employees responsible for the processing of personal data are aware of and comply with the contents of this policy. In addition, each Trident Security Solutions Ltd. Solutions Ltd. entity will make sure all third parties engaged to process personal data on their behalf (i.e. their data processors) are aware of and comply with the contents of this policy. Assurance of such compliance must be obtained from all third parties, whether companies or individuals, prior to granting them access to personal data controlled by Trident Security Solutions Ltd..

4.1.3 Data Protection by Design

To ensure that all data protection requirements are identified and addressed when designing new systems or processes and/or when reviewing or expanding existing systems or processes, each of them must go through an approval process before continuing. Each Trident Security Solutions Ltd. Solutions Ltd. entity must ensure that a data protection impact assessment (DPIA) is conducted, in cooperation with the office of data protection, for all new and/or revised systems or processes for which it has responsibility.

The subsequent findings of the DPIA must then be submitted to the Compliance Manager for review and approval. Where applicable, the Information Technology (IT) department, as part of its IT system and application design review process, will cooperate with the office of data protection to assess the impact of any new technology uses on the security of personal data.

4.1.4 Compliance Monitoring

To confirm that an adequate level of compliance that is being achieved by all Trident Security Solutions Ltd. Solutions Ltd. entities in relation to this policy, the office of data protection will carry out an annual data protection compliance audit for all such entities. Each audit will, as a minimum, assess:

Compliance with policy in relation to the protection of personal data, including:

  • The assignment of responsibilities.
  • Raising awareness.
  • Training of Employees.

The effectiveness of data Protection related operational practices, including:

  • Data Subject rights.
  • Personal data transfers.
  • Personal data incident management.
  • Personal data complaints handling.
  • The level of understanding of data Protection policies and Privacy Notices.
  • The currency of data Protection policies and Privacy Notices.
  • The accuracy of personal data being stored.

 

4.1.5 The conformity of data Processor activities.

The adequacy of procedures for redressing poor compliance and personal data breaches. The Office of data protection, will devise a plan with a schedule for correcting any identified deficiencies within a defined and reasonable time frame. Any major deficiencies identified will be reported to and monitored by the Trident Security Solutions Ltd. Solutions Ltd. Executive Management team.

4.2 Data Protection Principles

Trident Security Solutions Ltd. Solutions Ltd. has adopted the following principles to govern its collection, use, retention, transfer, disclosure and destruction of personal data:

Principle 1: Lawfulness, fairness and transparency personal data shall be processed lawfully, fairly and in a transparent manner in relation to the data Subject. This means, Trident Security Solutions Ltd. must tell the data subject what processing will occur (transparency), the processing must match the description given to the data Subject (fairness), and it must be for one of the purposes specified in the applicable data protection regulation (lawfulness).

Principle 2: Purpose Limitation personal data shall be collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes. This means Trident Security Solutions Ltd. must specify exactly what the personal data collected will be used for and limit the processing of that personal data to only what is necessary to meet the specified purpose.

Principle 3: data minimisation personal data shall be adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed. This means Trident Security Solutions Ltd. must not store any personal data beyond what is strictly required.

Principle 4: Accuracy personal data shall be accurate and, kept up to date. This means Trident Security Solutions Ltd. must have in place processes for identifying and addressing out of date, incorrect and redundant personal data.

Principle 5: Storage limitation personal data shall be kept in a form which permits identification of data Subjects for no longer than is necessary for the purposes for which the personal data is processed. This means Trident Security Solutions Ltd. must, wherever possible, store personal data in a way that limits or prevents identification of the data Subject.

Principle 6: Integrity & Confidentiality personal data shall be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful Processing, and against accidental loss, destruction or damage. Trident Security Solutions Ltd. must use appropriate technical and organisational measures to ensure the integrity and confidentiality of personal data is maintained at all times.

Principle 7: Accountability The data controller shall be responsible for, and be able to demonstrate compliance. This means Trident Security Solutions Ltd. must demonstrate that the six data Protection Principles (outlined above) are met for all personal data for which it is responsible.

4.3 Data Sources

Personal data should be collected only from the data Subject unless one of the following apply:

  • The nature of the business purpose necessitates collection of the personal data from other persons or bodies.

The collection must be carried out under emergency circumstances in order to protect the vital interests of the data Subject or to prevent serious loss or injury to another person. If personal data is collected from someone other than the data Subject, the data Subject must be informed1 of the collection unless one of the following apply:

  • The data Subject has received the required information by other means.
  • The information must remain confidential due to a professional secrecy obligation

A national law expressly provides for the collection, Processing or transfer of the personal data. Where it has been determined that notification to a data Subject is required, notification should occur promptly, but in no case later than:

  • list of the disclosures that need to be made available to the data Subject is provided in Appendix A

4.3.1 Data Subject Consent

Each Trident Security Solutions Ltd. entity will obtain personal data only by lawful and fair means and, where appropriate with the knowledge and consent of the individual concerned. Where a need exists to request and receive the consent of an individual prior to the collection, use or disclosure of their personal data, Trident Security Solutions Ltd. is committed to seeking such consent. The office of data protection, in cooperation with executive members, the ‘Risk Assessment Officer’ – Leroy Richards, the Head of Data Protection Officer – Raj Kantelia

The Head of Data Protection Officer, and other relevant business representatives, shall establish a system for obtaining and documenting data Subject consent for the collection, processing, and/or transfer of their personal data.

The system must include provisions for:

  • Determining what disclosures should be made in order to obtain valid consent.
  • Ensuring the request for consent is presented in a manner which is clearly distinguishable from any other matters, is made in an intelligible and easily accessible form, and uses clear and plain language.
  • Ensuring the consent is freely given (i.e. is not based on a contract that is conditional to the processing of personal data that is unnecessary for the performance of that contract).
  • Documenting the date, method and content of the disclosures made, as well as the validity, scope, and volition of the consents given.
  • Providing a simple method for a data subject to withdraw their consent at any time.
  • One calendar month from the first collection or recording of the personal data
  • At the time of first communication if used for communication with the data Subject
  • At the time of disclosure if disclosed to another recipient.

4.3.2 Data Subject Notification

Each Trident Security Solutions Ltd. entity will, when required by applicable law, contract, or where it considers that it is reasonably appropriate to do so, provide data Subjects with information as to the purpose of the processing of their personal data.

When the data subject is asked to give consent to the processing of personal data and when any personal data is collected from the data subject, all appropriate disclosures will be made, in a manner that draws attention to them, unless one of the following apply:

  • The Data Subject already has the information3

A legal exemption applies to the requirements for disclosure and/or consent. The disclosures may be given orally, electronically or in writing. If given orally, the person making the disclosures should use a suitable script or form approved in advance by the office of data protection. The associated receipt or form should be retained, along with a record of the facts, date, content, and method of disclosure.

4.3.3 External Privacy Notices

Each external website provided by a Trident Security Solutions Ltd. Entity will include an ‘Internet Privacy Notice’ and an online ‘Internet Cookie Notice’ fulfilling the requirements of applicable law. Refer to Trident Security Solutions Ltd.’s ‘Internet Privacy Notice’ and ‘Internet Cookie Notice’ standard templates for guidance.

All Privacy and Cookie Notices must be approved by the Compliance Manager prior to publication on any Trident Security Solutions Ltd. external website.

4.4 Data Processing

Trident Security Solutions Ltd. uses the personal data of its contacts for the following broad purposes:

  • The general running and business administration of Trident Security Solutions Ltd. entities.
  • To provide services to Trident Security Solutions Ltd. customers list of the disclosures that need to be made available to the data Subject is provided in Appendix A.
  • The Trident Security Solutions Ltd. entity collecting the information, in cooperation with the office of data protection, must establish means for documenting the fact that the data subject already has the information and how it has been obtained.
  • The ongoing administration and management of customer services.
  • The use of a contact’s information should always be considered from their perspective and whether the use will be within their expectations or if they are likely to object.
  • For example, it would clearly be within a contact’s expectations that their details will be used by Trident Security Solutions Ltd. to respond to a contact request for information about the products and services on offer.
  • However, it will not be within their reasonable expectations that Trident Security Solutions Ltd. would then provide their details to third parties for marketing purposes.
  • Each Trident Security Solutions Ltd. entity will process personal data in accordance with all applicable laws and applicable contractual obligations.

More specifically, Trident Security Solutions Ltd. will not process personal data unless at least one of the following requirements are met:

  • The data subject has given consent to the processing of their personal data for one or more specific purposes.
  • Processing is necessary for the performance of a contract to which the data subject is party or in order to take steps at the request of the data subject prior to entering into a contract.
  • Processing is necessary for compliance with a legal obligation to which the data controller is subject.
  • Processing is necessary in order to protect the vital interests of the data subject or of another natural person.
  • Processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the data controller.
  • Processing is necessary for the purposes of the legitimate interests pursued by the data controller or by a third party (except where such interests are overridden by the interests or fundamental rights and freedoms of the data subject, in particular where the data subject is a child).

There are some circumstances in which personal data may be further processed for purposes that go beyond the original purpose for which the personal data was collected.

When making a determination as to the compatibility of the new reason for processing, guidance and approval must be obtained from the office of data protection before any such processing may commence.

Data Processing In any circumstance where consent has not been gained for the specific processing in question, Trident Security Solutions Ltd. will address the following additional conditions to determine the fairness and transparency of any processing beyond the original purpose for which the personal data was collected:

Any link between the purpose for which the personal data was collected and the reasons for intended further Processing.

The context in which the personal data has been collected, in particular regarding the relationship between data Subject and the data controller.

The nature of the personal data, in particular whether special categories of data are being Processed, or whether personal data related to criminal convictions and offences are being Processed.

The possible consequences of the intended further Processing for the data Subject.

The existence of appropriate safeguards pertaining to further processing, which may include:

  • Encryption
  • Anonymisation OR
  • Pseudonymisation

4.4.1 Special Categories of Data

Trident Security Solutions Ltd. will only process special categories of data (also known as sensitive data) where the data subject expressly consents to such processing or where one of the following conditions apply:

  • The processing relates to personal data which has already been made public by the data subject.
  • The processing is necessary for the establishment, exercise or defence of legal claims.
  • The processing is specifically authorised or required by law.
  • The processing is necessary to protect the vital interests of the data subject or of another natural person where the data subject is physically or legally incapable of giving consent.
  • Further conditions, including limitations, based upon national law related to the processing of genetic data, biometric data or data concerning health.

In any situation where special categories of data are to be processed, prior approval must be obtained from the office of data protection and the basis for the processing clearly recorded with the personal data in question. Where special categories of data are being processed, Trident Security Solutions Ltd. will adopt additional protection measures.

Each Trident Security Solutions Ltd. entity may also adopt additional measures to address local custom or social expectation over the processing of special categories of data.

4.4.2 Children’s Data

Children are unable to consent to the processing of personal data for information society services. consent must be sought from the person who holds parental responsibility over the child. However, it should be noted that where processing is lawful under other grounds, consent need not be obtained from the child or the holder of parental responsibility.

Should any Trident Security Solutions Ltd. entity foresee a business need for obtaining parental consent for information society services offered directly to a child, guidance and approval must be obtained from the Compliance Manager before any processing of a child’s personal data may commence.

4.4.3 Data Quality

Each Trident Security Solutions Ltd. entity will adopt all necessary measures to ensure that the personal data it collects and processes is complete and accurate in the first instance, and is updated to reflect the current situation of the data Subject.

The measures adopted by Trident Security Solutions Ltd. to ensure data quality include:

  • The age by which an individual is designated a child varies between 13 and 16 in accordance with national law.
  • Any service normally provided for remuneration, at a distance, by electronic means and at the individual request of a recipient of services.
  • Correcting personal data known to be incorrect, inaccurate, incomplete, ambiguous, misleading or outdated, even if the data subject does not request rectification.
  • Keeping personal data only for the period necessary to satisfy the permitted uses or applicable statutory retention period.
  • The removal of personal data if in violation of any of the data protection principles or if the personal data is no longer required.

Restriction, rather than deletion of personal data, insofar as:

  • A law prohibits erasure.
  • Erasure would impair legitimate interests of the data Subject.
  • The data Subject disputes that their personal data is correct and it cannot be clearly ascertained whether their information is correct or incorrect.

4.4.4 Profiling & Automated Decision-Making

Trident Security Solutions Ltd. will only engage in profiling and automated decision making where it is necessary to enter into, or to perform, a contract with the data subject or where it is authorised by law.

Where a Trident Security Solutions Ltd. entity utilises profiling and automated decision making, this will be disclosed to the relevant data subjects. In such cases the data subject will be given the opportunity to:

  • Express their point of view.
  • Obtain an explanation for the automated decision.
  • Review the logic used by the automated system.
  • Supplement the automated system with additional data.
  • Have a human carry out a review of the automated decision.
  • Contest the automated decision.

Object to the automated decision making being carried out. Each Trident Security Solutions Ltd. Entity must also ensure that all profiling and automated decision making relating to a data subject is based on accurate data. Correction may include data erase and replacement with corrected or supplemented data.

4.4.5 Digital Marketing

As a general rule Trident Security Solutions Ltd. will not send promotional or direct marketing material to a Trident Security Solutions Ltd. Contact through digital channels such as mobile phones, email and the Internet, without first obtaining their consent.

Any Trident Security Solutions Ltd. entity wishing to carry out a digital marketing campaign without obtaining prior consent from the data subject must first have it approved by the office of data protection. Where personal data processing is approved for digital marketing purposes, the data Subject must be informed at the point of first contact that they have the right to object, at any stage, to having their data processed for such purposes.

If the data subject puts forward an objection, digital marketing related processing of their personal data must cease immediately and their details should be kept on a suppression list with a record of their opt-out decision, rather than being completely deleted.

It should be noted that where digital marketing is carried out in a ‘business to business’ context, there is no legal requirement to obtain an indication of consent to carry out digital marketing to individuals provided that they are given the opportunity to opt-out.

 

4.5 Data Retention

To ensure fair processing, personal data will not be retained by Trident Security Solutions Ltd. for longer than necessary in relation to the purposes for which it was originally collected, or for which it was further processed. The length of time for which Trident Security Solutions Ltd. entities need to retain personal data is set out in the Trident Security Solutions Ltd. ‘Personal Data Retention Schedule’.

This takes into account the legal and contractual requirements, both minimum and maximum, that influence the retention periods set forth in the schedule. All personal data should be deleted or destroyed as soon as possible where it has been confirmed that there is no longer a need to retain it.

4.6 Data Protection

Each Trident Security Solutions Ltd. Entity will adopt physical, technical, and organisational measures to ensure the security of personal data.

This includes the prevention of loss or damage, unauthorised alteration, access or processing, and other risks to which it may be exposed by virtue of human action or the physical or natural environment.

The minimum set of security measures to be adopted by each Trident Security Solutions Ltd. entity is provided in the Trident Security Solutions Ltd. ‘Information Security Policy’. A summary of the personal data related security measures is provided below:

  • Prevent unauthorised persons from gaining access to data processing systems in which personal data are processed.
  • Prevent persons entitled to use a data processing system from accessing personal data beyond their needs and authorisations.
  • Ensure that personal data in the course of electronic transmission during transport cannot be read, copied, modified or removed without authorisation.
  • Ensure that access logs are in place to establish whether, and by whom, the personal data was entered into, modified on or removed from a data processing system.
  • Ensure that in the case where processing is carried out by a data processor, the data can be processed only in accordance with the instructions of the data controller.
  • Ensure that personal data is protected against undesired destruction or loss.
  • Ensure that personal data collected for different purposes can and is processed separately.
  • Ensure that personal data is not kept longer than necessary.

4.7 Data Subject Requests

The office of data protection will establish a system to enable and facilitate the exercise of data Subject rights related to:

  • Information access.
  • Objection to Processing.
  • Objection to automated decision-making and profiling.
  • Restriction of Processing.
  • Data portability.
  • Data rectification.

4.7.1 Data Erasure.

If an individual makes a request relating to any of the rights listed above, Trident Security Solutions Ltd. will consider each such request in accordance with all applicable data Protection laws and regulations. No administration fee will be charged for considering and/or complying with such a request unless the request is deemed to be unnecessary or excessive in nature.

Data Subjects are entitled to obtain, based upon a request made in writing to the Compliance Manager and upon successful verification of their identity, the following information about their own personal data:

  • The purposes of the collection, Processing, use and storage of their personal data.
  • The source(s) of the personal data, if it was not obtained from the data Subject;
  • The categories of personal data stored for the data Subject.
  • The recipients or categories of recipients to whom the personal data has been or may be transmitted, along with the location of those recipients.
  • The envisaged period of storage for the personal data or the rationale for determining the storage period.

The use of any automated decision making, including Profiling.

The right of the data subject to:

  • Object to Processing of their personal data.
  • Lodge a complaint with the data Protection Authority.
  • Request rectification or erasure of their personal data.
  • Request restriction of Processing of their personal data.

All requests received for access to or rectification of personal data must be directed to the office of data protection, who will log each request as it is received. A response to each request will be provided within 30 days of the receipt of the written request from the data subject.

Appropriate verification must confirm that the requestor is the data subject or their authorised legal representative. Data subjects shall have the right to require Trident Security Solutions Ltd. to correct or supplement erroneous, misleading, outdated, or incomplete personal data. If Trident Security Solutions Ltd. cannot respond fully to the request within 30 days, the office of data protection shall nevertheless provide the following information to the data subject.

Details of any requested information or modifications which will not be provided to the data subject, the reason(s) for the refusal, and any procedures available for appealing the decision.

An estimated date by which any remaining responses will be provided.

An estimate of any costs to be paid by the data subject (e.g. where the request is excessive in nature).

The name and contact information of the Trident Security Solutions Ltd. individual who the data subject should contact for follow up.

4.7.2 Data Subject Requests

It should be noted that situations may arise where providing the information requested by a data Subject would disclose personal data about another individual. In such cases, information must be redacted or withheld as may be necessary or appropriate to protect that person’s rights.

Detailed guidance for dealing with requests from data subjects can be found in the Trident Security Solutions Ltd. ‘Data Subject Request Handling Procedures’ document.

4.8 Law Enforcement Requests & Disclosures

In certain circumstances, it is permitted that personal data be shared without the knowledge or Consent of a data Subject.

This is the case where the disclosure of the personal data is necessary for any of the following purposes:

  • The prevention or detection of crime.
  • The apprehension or prosecution of offenders.
  • The assessment or collection of a tax or duty.

By the order of a court or by any rule of law. If a Trident Security Solutions Ltd. entity processes personal data for one of these purposes, then it may apply an exception to the processing rules

outlined in this policy but only to the extent that not doing so would be likely to prejudice the case in question.

If any Trident Security Solutions Ltd. entity receives a request from a court or any regulatory or law enforcement authority for information relating to a Trident Security Solutions Ltd. contact, you must immediately notify the Compliance Manager who will provide comprehensive guidance and assistance.

4.9 Data Protection Training

All Trident Security Solutions Ltd. employees that have access to personal data will have their responsibilities under this policy outlined to them as part of their staff induction training as to what they have access to.

In addition, each Trident Security Solutions Ltd. entity will provide regular data protection training and procedural guidance for their staff.

The training and procedural guidance set forth will consist of, at a minimum, the following elements:

  • The data Protection Principles set forth in Section 4.2 above.
  • Each employee’s duty to use and permit the use of personal data only by authorised persons and for authorised purposes.
  • The need for, and proper use of, the forms and procedures adopted to implement this policy.
  • The correct use of passwords, security tokens and other access mechanisms.
  • The importance of limiting access to personal data, such as by using password protected screen savers and logging out when systems are not being attended by an authorised person.
  • Securely storing manual files, print outs and electronic storage media.
  • The need to obtain appropriate authorisation and utilise appropriate safeguards for all transfers of personal data outside of the internal network and physical office premises.
  • Proper disposal of personal data by using secure shredding facilities.
  • Any special risks associated with particular departmental activities or duties.

4.10 Data Transfers

Trident Security Solutions Ltd. entities may transfer personal data to internal or third party recipients located in another country where that country is recognised as having an adequate level of legal protection for the rights and freedoms of the relevant data subjects.

Where transfers need to be made to countries lacking an adequate level of legal protection (i.e. third countries), they must be made in compliance with an approved transfer mechanism

Trident Security Solutions Ltd. entities may only transfer personal data where one of the transfer scenarios list below applies:

  • The data Subject has given Consent to the proposed transfer.
  • The transfer is necessary for the performance of a contract with the data Subject.
  • For a list of countries recognised as having an adequate level of legal protection see Appendix B.
  • For a list of Third Country transfer mechanisms recognised as providing adequate protection see Appendix B.
  • The transfer is necessary for the implementation of pre-contractual measures taken in response to the data Subject’s request.
  • The transfer is necessary for the conclusion or performance of a contract concluded with a Third Party in the interest of the data Subject.
  • The transfer is legally required on important public interest grounds.
  • The transfer is necessary for the establishment, exercise or defence of legal claims.
  • The transfer is necessary in order to protect the vital interests of the data Subject.

4.10.1 Transfers between Trident Security Solutions Ltd. Entities

In order for Trident Security Solutions Ltd. to carry out its operations effectively across it’s various Trident Security Solutions Ltd. Entities, there may be occasions when it is necessary to transfer personal data from one Trident Security Solutions Ltd. Entity to another, or to allow access to the personal data from an overseas location. Should this occur, the Trident Security Solutions Ltd. Entity sending the personal data remains responsible for ensuring protection for that personal data.

Trident Security Solutions Ltd. handles the transfer of personal data between Trident Security Solutions Ltd. Entities, where the location of the recipient Entity is a Third Country, using the Binding Corporate Rules transfer mechanism. Binding Corporate Rules provide legally binding, enforceable rights on data Subjects with regard to the Processing of their personal data and must be enforced by each approved Trident Security Solutions Ltd. Entity, including their Employees.

When transferring personal data to another Trident Security Solutions Ltd. Entity located in a Third Country, you must:

  • Ensure that the recipient Trident Security Solutions Ltd. entity is included on the approved list of Trident Security Solutions Ltd. entities subject to the Trident Security Solutions Ltd. The approved list is held and maintained by the Compliance Manager.
  • Only transfer the minimum amount of personal data necessary for the particular purpose of the transfer (for example, to fulfil a transaction or carry out a particular service).

Ensure adequate security measures are used to protect the personal data during the transfer (including password-protection and Encryption, where necessary).

4.10.2 Transfers to Third Parties

Trident Security Solutions Ltd. Entity will only transfer personal data to, or allow access by, third parties when it is assured that the information will be processed legitimately and protected appropriately by the recipient.

Where third party processing takes place, each Trident Security Solutions Ltd. entity will first identify if, under applicable law, the third party is considered a data controller or a data processor of the personal data being transferred. Where the third party is deemed to be a data controller, the Trident

Security Solutions Ltd. entity will enter into, in cooperation with the Compliance Manager, an appropriate agreement with the controller to clarify each party’s responsibilities in respect to the personal data transferred.

Where the third party is deemed to be a data processor, the Trident Security Solutions Ltd. entity will enter into, in cooperation with the Compliance Manager, an adequate processing agreement with the data processor. The agreement must require the data processor to protect the personal data from further disclosure and to only process personal data in compliance with Trident Security Solutions Ltd. instructions. In addition, the agreement will require the data processor to implement appropriate technical and organisational measures to protect the personal data as well as procedures for providing notification of personal data breaches.

Trident Security Solutions Ltd. has a ‘Standard data Processing Agreement’ document that should be used as a baseline. When a Trident Security Solutions Ltd. entity is outsourcing services to a third party they will identify whether the third party will process personal data on its behalf and whether the outsourcing will entail any third country transfers of personal data. In either case, it will make sure to include, in cooperation with the office of data protection, adequate provisions in the outsourcing agreement for such processing and third country transfers.

4.11 Complaints Handling

Data subjects with a complaint about the processing of their personal data, should put forward the matter in writing to the Compliance Manager. An investigation of the complaint will be carried out to the extent that is appropriate based on the merits of the specific case. The Compliance Manager will inform the data subject of the progress and the outcome of the complaint within a reasonable period.

If the issue cannot be resolved through consultation between the data subject and the Compliance Manager, then the data subject may, at their option, seek redress through mediation, binding arbitration, litigation, or via complaint to the data protection authority (This would be forward and handled by the Compliance Manager) within the applicable jurisdiction.

4.12 Breach Reporting

Any individual who suspects that a personal data breach has occurred due to the theft or exposure of personal data must immediately notify the office of data protection providing a description of what occurred. Notification of the incident can me made via e-mail, by calling, or by using the anonymous incident reporting form at.

The office of data protection will investigate all reported incidents to confirm whether or not a personal data breach has occurred. If a personal data breach is confirmed, the Compliance Manager will follow the relevant authorised procedure based on the criticality and quantity of the personal data involved. For severe personal data breaches, the Trident Security Solutions Ltd. will hold a executive meeting as an emergency meeting to coordinate and manage the personal data breach response with actions to be carried out.

  1. Policy Maintenance

All inquiries about this policy, including requests for exceptions or changes should be directed to the Compliance Manager via e-mail .

5.1 Publication

This policy shall be available to all Trident Security Solutions Ltd. Employees through the Trident Security Solutions Ltd. Policy or via alternative means as deemed appropriate by the Compliance Manager.

5.2 Effective Date

This policy is effective as of 1st May 2018.

5.2.3 Review Date

The policy will be reviewed on a yearly basis, next review is on 30th April 2019

5.3 Revisions

The Compliance Manager is responsible for the maintenance and accuracy of this policy. Notice of significant revisions shall be provided to Trident Security Solutions Ltd. employees through the Human Resources department. Changes to this policy will come into force when all employees have been notified. Listed below are documents that relate to and are referenced by this policy.

  • Internet Privacy Notice template
  • Internet Cookie Notice template
  • Information Security Policy
  • Data Subject Request Handling Procedure
  • Data Protection Policy for Employee data
  • Personal data Retention Schedule
  • Standard data Processing Agreement
  • Standard Provisions for Outsourcing Agreement
  1. Related Documents

Appendix A – Information Notification to Data Subjects

The table below outlines the various information elements that must be provided by the data controller to the data subject depending upon whether or not consent has not been obtained from the data subject. Information requiring notification with consent without consent.

The identity and the contact details of the data controller and, where applicable, of the data controller’s representative.

The original source of the personal data, and if applicable, whether it came from a publicly accessible source.

  • The contact details of the data protection officer, where applicable.
  • The purpose(s) and legal basis for processing the personal data.
  • The categories of personal data concerned.

The recipients or categories of recipients of the personal data.

Where the data controller intends to further Process the personal data for a purpose other than that for which the personal data was originally collected, the data controller shall provide the data subject, prior to that further processing, with information on that other purpose.

Where the data controller intends to transfer personal data to a recipient in a third country, notification of that intention and details regarding adequacy decisions taken in relation to the third country must be provided.

The period for which the personal data will be stored, or if that is not possible, the criteria used to determine that period.

Where applicable, the legitimate interests pursued by the data controller or by a third party.

The existence of data Subject rights allowing them to request from the data controller- information access, objection to processing, objection to automated decision-making and profiling, restriction of Processing, data portability, data rectification and data erasure.

Where Processing is based on consent, the existence of the right to withdraw consent at any time, without affecting the lawfulness of processing based on consent before its withdrawal.

The existence of automated decision-making (including Profiling) along with meaningful information about the logic involved and the significance of any envisaged consequences of such processing for the data subject.

Whether the provision of personal data is a statutory or contractual requirement, a requirement necessary to enter into a contract, as well as whether the data Subject is obliged to provide the personal data and if so the possible consequences of failure to provide such data.

Appendix B – Adequacy for Personal Data Transfers

The following are a list of countries recognised as having an adequate level of legal protection for the rights and freedoms of data Subjects in relation to the Processing of their personal data.

EU Countries (Austria, Belgium, Bulgaria, Croatia, Republic of Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden and the UK)

Iceland                                                                                                       Jersey

Liechtenstein                                                                                            New Zealand

Norway                                                                                                      Switzerland

Andorra                                                                                                     Uruguay

Argentina                                                                                                  United States (Privacy Shield certified organisations)

Canada (commercial organisations)

Faeroe Islands

Guernsey

Israel