Seva Dekho Data Safety Policy
1. Introduction
Seva Dekho is committed to protecting the privacy and security of personal and sensitive data. This Data Safety Policy outlines our protocols for safeguarding data, ensuring compliance with relevant laws and regulations, and maintaining the trust of our clients and employees.
2. Scope
This policy applies to all employees, contractors, and third-party service providers who handle data on behalf of Seva Dekho. It covers all types of data, including but not limited to personal, financial, and confidential business information.
3. Data Collection and Use
3.1 Data Collection
- We collect only the data necessary for our operations and for providing our services effectively.
- Data collected may include personal information (name, address, contact details) and other relevant details.
3.2 Data Use
- Data is used solely for the purpose for which it was collected and in accordance with our privacy policy.
- We do not sell or share personal data with third parties except as required by law or with the individuals explicit consent.
4. Data Protection Principles
4.1 Lawfulness, Fairness, and Transparency
- Data is processed lawfully, fairly, and in a transparent manner.
- Individuals are informed about how their data will be used at the time of collection.
4.2 Purpose Limitation
- Data is collected for specified, explicit, and legitimate purposes and not further processed in a manner that is incompatible with those purposes.
4.3 Data Minimization
- Only data that is adequate, relevant, and necessary is collected and processed.
4.4 Accuracy
- Reasonable steps are taken to ensure that data is accurate and, where necessary, kept up to date.
4.5 Storage Limitation
- Data is retained only for as long as necessary for the purposes for which it was collected.
4.6 Integrity and Confidentiality
- Appropriate technical and organizational measures are in place to ensure the security of data, including protection against unauthorized or unlawful processing and against accidental loss, destruction, or damage.
5. Data Security Measures
5.1 Technical Measures
- Encryption: Data is encrypted both in transit and at rest.
- Access Controls: Access to data is restricted to authorized personnel only, using multi-factor authentication and other secure methods.
- Regular Audits: Regular security audits and vulnerability assessments are conducted to identify and mitigate risks.
5.2 Organizational Measures
- Training: Employees receive regular training on data protection and security best practices.
- Policies: Clear policies and procedures are in place for data handling, breach response, and incident reporting.
6. Data Breach Response
6.1 Identification and Reporting
- Any suspected data breach must be reported immediately to the Data Protection Officer (DPO) or designated individual.
- An investigation is initiated promptly to assess the breach and its impact.
6.2 Containment and Recovery
- Measures are taken to contain the breach and prevent further unauthorized access.
- Affected systems are restored, and normal operations are resumed as quickly as possible.
6.3 Notification
- If a breach is likely to result in a high risk to the rights and freedoms of individuals, affected parties and relevant authorities are notified without undue delay.
7. Data Subject Rights
7.1 Access
- Individuals have the right to access their personal data and obtain information about how it is processed.
7.2 Rectification
- Individuals have the right to request correction of inaccurate or incomplete data.
7.3 Erasure
- Individuals have the right to request the deletion of their data under certain conditions.
7.4 Restriction of Processing
- Individuals can request the restriction of processing of their data under specific circumstances.
7.5 Data Portability
- Individuals have the right to receive their data in a structured, commonly used, and machine-readable format and to transmit it to another controller.
8. Third-Party Services
- Third-party service providers are carefully vetted to ensure they comply with data protection standards.
- Data Processing Agreements are in place with all third-party providers to ensure the security and confidentiality of data.
9. Compliance and Monitoring
- Regular reviews and audits are conducted to ensure compliance with this policy and applicable data protection laws.
- Non-compliance with this policy may result in disciplinary action, up to and including termination of employment or contract.
10. Policy Review
This policy is reviewed periodically and updated as necessary to ensure it remains effective and compliant with applicable laws and regulations.
11. Contact Information
For questions or concerns about this policy or to report a data breach, please contact:
- Data Protection Officer (DPO): seva@sevadekho.com
- Office Address: Sisotar, Sikanderpur, Ballia Uttar Pradesh