Privacy Shield Policy
Risk Based Security, Inc. Privacy Shield Policy
Risk Based Security, Inc., (“Risk Based Security”) has adopted this Privacy Shield Policy (“Policy”) to establish and maintain an adequate level of Personal Data privacy protection. This Policy adheres to the Privacy Shield Principles and applies to the processing of Personal Data that Risk Based Security obtains from Customers located in the European Union and Switzerland.
The Federal Trade Commission (FTC) has jurisdiction over Risk Based Security’s compliance with the Privacy Shield.
All Risk Based Security Employees who handle Personal Data from Europe and Switzerland are required to comply with the Principles stated in this Policy.
Capitalized terms are defined in Section XIV of this Policy.
This Policy applies to the processing of Individual Customer Personal Data that Risk Based Security receives in the United States concerning Individual Customers who reside in the European Union and Switzerland. Risk Based Security provides products and services only to businesses.
This Policy does not cover data from which individual persons cannot be identified or situations in which pseudonyms are used. (The use of pseudonyms involves the replacement of names or other identifiers with substitutes so that identification of individual persons is not possible.)
II. RESPONSIBILITIES AND MANAGEMENT
Risk Based Security has designated the CISO to oversee its information security program, including its compliance with the EU and Swiss Privacy Shield program. The CISO shall review and approve any material changes to this program as necessary. Any questions, concerns, or comments regarding this Policy also may be directed to [email protected].
Risk Based Security will maintain, monitor, test, and upgrade information security policies, practices, and systems to assist in protecting the Personal Data that it collects. Risk Based Security personnel will receive training, as applicable, to effectively implement this Policy. Please refer to Section VII for a discussion of the steps that Risk Based Security has undertaken to protect Personal Data.
III. RENEWAL / VERIFICATION
Risk Based Security will renew its US-EU Privacy Shield and Swiss-US Privacy Shield certifications annually, unless the CISO determines that it no longer needs such certification or if the company employs a different adequacy mechanism.
Prior to the re-certification, Risk Based Security will conduct an in-house verification to ensure that its attestations and assertions about its treatment of Individual Customer Personal Data are accurate and that the company has appropriately implemented these practices. Specifically, as part of the verification process, Risk Based Security will undertake the following:
- Ensure that this Policy continues to comply with the Privacy Shield principles.
- Confirm that Individual Customers are made aware of the process for addressing complaints and any independent dispute resolution process (Risk Based Security may do so through its publicly posted website, Individual Customer contract, or both).
- Review its processes and procedures for training Employees about Risk Based Security’s participation in the Privacy Shield programs and the appropriate handling of Individual’s Personal Data.
Risk Based Security will prepare an internal verification statement on an annual basis.
IV. COLLECTION AND USE OF PERSONAL DATA
Risk Based Security provides various solutions to its Individual Customers who purchase its products. Risk Based Security collects Personal Data from Individual Customers when they purchase its products, register with our website, log-in to their account, complete surveys, request information or otherwise communicate with us.
The Personal Data that we collect may vary based on the Individual Customer’s interaction with our website and request for our services. As a general matter, Risk Based Security collects the following types of Personal Data from its Individual Customers: contact information, including, a contact person’s name, work email address, work mailing address, work telephone number, title, and company name. Individual customers have the option to request reports or access to services online, and we will collect information that they choose to provide to us through these portals.
When Individual Customers use our services online, we will collect their IP address and browser type. We may associate IP address and browser type with a specific customer. We also may collect Personal Data from persons who contact us through our website to request additional information; in such a situation, we would collect contact information (as discussed above) and any other information that the person chooses to submit through our website.
The information that we collect from Individual Customers is used for selling the products and services they buy from us, managing transactions, reporting, invoicing, renewals, other operations related to providing services and products to the Individual Customer.
Risk Based Security uses Personal Data that it collects directly from its Individual Customers and for its partners indirectly in its role as a service provider for the following business purposes, without limitation:
- maintaining and supporting its products, delivering and providing the requested products/services, and complying with its contractual obligations related thereto (including managing transactions, reporting, invoices, renewals, and other operations related to providing services to a Customer);
- satisfying governmental reporting, tax, and other requirements (e.g., import/export);
- storing and processing data, including Personal Data, in computer databases and servers located in the United States;
- verifying identity (e.g., for online access to accounts);
- as requested by the Customer;
- for other business-related purposes permitted or required under applicable local law and regulation;
- and as otherwise required by law.
Risk Based Security does not disclose personal information to third parties for purposes that are materially different than what it was originally collected for. Should this change in the future, we will provide individuals with the option to opt-out.
V. DISCLOSURES / ONWARD TRANSFERS OF PERSONAL DATA
Except as otherwise provided herein, Risk Based Security discloses Personal Data only to Third Parties who reasonably need to know such data only for the scope of the initial transaction and not for other purposes. Such recipients must agree to abide by confidentiality obligations.
Risk Based Security may provide Personal Data to Third Parties that act as agents, consultants, and contractors to perform tasks on behalf of and under our instructions. For example, Risk Based Security may store such Personal Data in the facilities operated by Third Parties. Such Third Parties must agree to use such Personal Data only for the purposes for which they have been engaged by Risk Based Security and they must either:
- comply with the Privacy Shield principles or another mechanism permitted by the applicable EU & Swiss data protection law(s) for transfers and processing of Personal Data;
- or agree to provide adequate protections for the Personal Data that are no less protective than those set out in this Policy;
Risk Based Security also may disclose Personal Data for other purposes or to other Third Parties when a Data Subject has consented to or requested such disclosure. Please be aware that Risk Based Security may be required to disclose an individual’s personal information in response to a lawful request by public authorities, including to meet national security or law enforcement requirements. Risk Based Security is liable for appropriate onward transfers of personal data to third parties.
VI. SENSITIVE DATA
Risk Based Security does not collect Sensitive Data from its Individual Customers.
VII. DATA INTEGRITY AND SECURITY
Risk Based Security uses reasonable efforts to maintain the accuracy and integrity of Personal Data and to update it as appropriate. Risk Based Security has implemented physical and technical safeguards to protect Personal Data from loss, misuse, and unauthorized access, disclosure, alternation, or destruction. For example, electronically stored Personal Data is stored on a secure network with firewall protection, and access to Risk Based Security’s electronic information systems requires user authentication via password or similar means. Risk Based Security also employs access restrictions, limiting the scope of Employees who have access to Individual Customer Personal Data.
Further, Risk Based Security uses secure encryption technology to protect certain categories of personal data. Despite these precautions, no data security safeguards guarantee 100% security all of the time.
IX. ACCESSING PERSONAL DATA
Risk Based Security personnel may access and use Personal Data only if they are authorized to do so and only for the purpose for which they are authorized.
X. RIGHT TO ACCESS, CHANGE OR DELETE PERSONAL DATA
- Right to Access. Individual Customers have the right to know what Personal Data about them is included in the databases and to ensure that such Personal Data is accurate and relevant for the purposes for which Risk Based Security collected it. Individual Customers may request a copy of their own Personal Data stored in the databases and upon reasonable request and as required by the Privacy Shield principles, Risk Based Security allows Individual Customers to correct or amend such data where inaccurate. In requesting modifications to their Personal Data, Data Subjects must provide only truthful, complete, and accurate information. To request changes or deletion of Personal Data, Individual Customers should submit a written request to: [email protected].
- Requests for Personal Data. Risk Based Security will track each of the following and will provide notice to the appropriate parties under law and contract when either of the following circumstances arise: (a) legally binding request for disclosure of the Personal Data by a law enforcement authority unless prohibited by law or regulation; or (b) requests received from the Data Subject.
- Satisfying Requests for Access, Modifications, and Corrections. Risk Based Security will endeavor to respond in a timely manner to all reasonable written requests to view, modify, or inactivate Personal Data.
- Lawful Requests for Personal Data. Risk Based Security will disclose personal information in response to lawful requests by public authorities, including to meet national security or law enforcement requirements.
XI. CHANGES TO THIS POLICY
This Policy may be amended from time to time, consistent with the Privacy Shield Principles and applicable data protection and privacy laws and principles. We will make Employees available of changes to this policy either by posting to our intranet, through email, or other means. We will notify Customers if we make changes that materially affect the way we handle Personal Data previously collected, and we will allow them to choose whether their Personal Data may be used in any materially different manner.
XII. QUESTIONS OR COMPLAINTS
EU and Swiss Individual customers may contact Risk Based Security with questions or complaints concerning this Policy at the following address: [email protected].
XIII. ENFORCEMENT AND DISPUTE RESOLUTION
In compliance with the Privacy Shield Principles, Risk Based Security commits to resolve complaints about our collection or use of your personal information. EU and Swiss individuals with inquiries or complaints regarding our Privacy Shield policy should first contact Risk Based Security at: [email protected]
Risk Based Security has further committed to cooperate with the panel established by the EU data protection authorities (DPAs) and the Swiss Federal Data Protection and Information Commissioner (FDPIC) with regard to unresolved Privacy Shield complaints concerning both non-human resources data transferred from the EU and Switzerland and human resources data transferred from the EU and Switzerland in the context of employment. Risk Based Security has further committed to inform individuals about the possibility, under certain conditions, for the individual to invoke binding arbitration.
XIV. DEFINED TERMS
“CISO” means Risk Based Security’s Chief Information Security Officer.
“Individual Customer” means an Individual customer or client of Risk Based Security from EU or Switzerland. The term also shall include any individual agent, representative, of an individual customer of Risk Based Security and all Employee of Risk Based Security where Risk Based Security has obtained his or her Personal Data from such Individual Customer as part of its business relationship with Risk Based Security.
“Data Subject” means an identified or identifiable natural living person. An identifiable person is one who can be identified, directly or indirectly, by reference to a name, or to one or more factors unique to his or her personal physical, psychological, mental, economic, cultural or social characteristics. For Customers residing in Switzerland, a Data Subject also may include a legal entity.
“Employee” means an employee (whether temporary, permanent, part-time, or contract), former employee, independent contractor, or job applicant of Risk Based Security or any of its affiliates or subsidiaries, who is also a resident of a country within the European Economic Area.
“Europe” or “European” refers to a country in the European Union.
“Personal Data” as defined under the European Union Directive 95/46/EC means data that personally identifies or may be used to personally identify a person, including an individual’s name in combination with country of birth, marital status, emergency contact, salary information, terms of employment, job qualifications (such as educational degrees earned), address, phone number, e-mail address, user ID, password, and identification numbers. Personal Data does not include data that is de-identified, anonymous, or publicly available. For Switzerland, the term “person” includes both a natural person and a legal entity, regardless of the form of the legal entity.
“Sensitive Data” means Personal Data that discloses a Data Subject’s medical or health condition, race or ethnicity, political, religious or philosophical affiliations or opinions, sexual orientation, or trade union membership.
“Third Party” means any individual or entity that is neither Risk Based Security nor a Risk Based Security Employee, agent, contractor, or representative.