Information Security Protocol

Handling client assets

Client assets are handled by dedicated project managers and translated by a fixed team of translators, who are obliged to sign non-disclosure agreements. Every project is subject to standard security procedures.

Data categories

GroupObtainingBasis for processingTypes of dataStorageFormatAccess byTransfer
Customers       
Corporate, institutions (contact persons)E-mail from clientperformance of contract Article 6(1)(b) and legal interest Article 6(1)(f) – in order to update the client or make inquiries regarding the ongoing project, payment, satisfactionFull name, e-mail, phone number, Skype IDMail – Microsoft365, BMS – SpaceTMSdatabaseemployeesSpaceTMS, Microsoft365
Individual clientsE-mail from client, phone conversation, personal visit to the officeperformance of contract Article 6(1)(b) and legal interest Article 6(1)(f) – in order to update the client or make inquiries regarding the ongoing project, payment, satisfactionFull name, address, phone number, e-mail, Skype ID, business name, NIP, Regon

Mail – Microsoft365, BMS – SpaceTMS, Invoicing – Saldeo, Financial system, local file serverdatabase and electronic documents (invoices)employeesSpaceTMS, Microsoft365, Saldeo
Prospective clientscontact form on www.diuna.bizconsentFull name, e-mail, phone numberWordPress, Microsoft365 mail, CRM-Bitrix24databaseemployeesMicrosoft365
Suppliers       
Vendorsrecruitment process – applicationperformance of contract Article 6(1)(b)Full name, address, business name and address, phone numbers, e-mail address, NIP, REGON, bank account details, other payment detailsMicrosoft365 mail, SpaceTMS (vendor owned account), Autenti, Saldeo, local file serverdatabase, documents (contracts)employeesMicrosoft365, SpaceTMS, Autenti, Saldeo
Employeesaplikacja      
Employeesjob applicationperformance of contract Article 6(1)(b) and statutory obligation Article 6(1)(c)Full name, address, mailing address, parents’ names, date of birth, tax office, NIP, Pesel, bank accountMicrosoft365, payroll system – Asseco, Bitrix24 (only name and contact information)documents, contractsGeneral Manager, Office Manager, HR Managermail, file server
Apprentices and traineesapprenticeship applicationperformance of contract Article 6(1)(b) and statutory obligation Article 6(1)(c)Full name, address, mailing address, parents’ names, date of birth, tax office, NIP, Pesel, bank accountMicrosoft365 mail, Bitrix24 (only name and contact information)documentsOffice Manager, Vendor Managermail
Translated content       
personal data in translated contentshared by clients via email or otherwise (ftp)data processing agreementas per delivered contentMicrosoft365 mail, SpaceTMS, translation memoriesdatabase, fileemployees, shared with vendors employed to do specific tasksMicrosoft365 mail, SpaceTMS

Data processing

TypeProviderEEA onlyBackupAccessScope of data
MailMicrosoft365 – cloudYesProvider 30 daysPersonal, Two way authenticationClient data (including personal), client content, vendor data (including personal)
Mail 2Home.pl – cloudYesProvider – 3 daysPersonal, 2 way auth.Client data (including personal), client content, vendor data (including personal)
File serverLocal onsiteYesDIUNAAccording to user rightsClient content in TM, vendor data (contracts and invoices)
PCLocal onsite / with userYesNOPersonal/ passwordNo permanent storage, only for the time of processing, type of data depends on the role in DIUNA
Project management systemSpaceTMS.com – cloudYesProvider, weekly backupsPersonal/ passwordClient data (including personal data), client content, vendors (on accounts owned by vendors)
Translation management system ™Trados – local file serverMemsource – cloudYesDIUNA, ProviderAccording to user rightsClient content
Machine translation TMTilde – cloudYes Through translation management systemClient content
InvoicingSaldeo – cloud, outsourced accountantYesProviderAuthorised usersVendors’ personal data
CRM, internal communicationBitrix24 – cloudYesProviderAuthorised usersEmployees, trainees, apprentices – names, emails, phone numbers
Document editorsMicrosoft365 – OnedriveYesProviderIndividual usersClient content (only on client’s explicit request)

Purpose of processing

GroupPurpose of processing
Customers 
Corporate, institutions and individual clientsTo send a quoteto perform a contractto deliver servicesto process paymentto inquire about client satisfactionto improve client experienceto improve quality of servicesto offer additional or new product and servicesto update our database
Prospective clientsTo send a quoteto offer additional or new product and servicesto improve services and client experience
Suppliers 
Vendorsto offer tasksto negotiate ratesto inform about procedures and requirementsto process payments
Employees 
Employeesto perform employment contractto comply with employment regulations
Apprentices and traineesto perform contractto give tasks and feedback

Anti-virus software

Our IT resources are secured by anti-virus software with the following functions:

a) securing the IT resources against malware with a residential module that scans the entire computer system; 

b) updating the virus signature database on an ongoing basis; 

c) automated reaction in case new and unknown malware is detected, e.g. blocking all communications with the infected computer.

The software we are currently using is ESET and Windows Defender.

Handling of confidential information

Desktop workstations are secured with a password that is changed every few months. Passwords are comprised of 9 characters or more, including at least one special character, and are never simple. Unlocked workstations are never left unsupervised. Daily work is done on an account without administrator privileges.

Access to the network drive is secured with a password, and access to it via a VPN, with an additional password and certificates.

Desktop workstations are protected with a firewall and anti-virus software.

Protection of premises

 Chain of custody

  1. Collection of evidence – identification and recording of information about the security incident
  2. Examination and analysis of the aforementioned information
  3. Documentation of the above steps

Breach protocol

Rights of the data subject

Under the GDPR (General Data Protection Regulation), data subjects whose personal data is processed have a number of rights. Here are some of the key rights of data subjects in relation to data protection:

  1. Right to information: The data subject has the right to receive clear, comprehensible and exhaustive information about the processing of their personal data, such as the purpose of the processing, the categories of data, the storage period, and information about the controller.
  2. Right of access: The data subject has the right to obtain confirmation as to whether or not personal data is being processed and access to such data and information relating to it.
  3. Right to rectification of data: The data subject has the right to request the rectification or completion of their inaccurate or incomplete personal data.
  4. The right to erasure (the so-called „right to be forgotten”): The data subject may request the erasure of their personal data if there is a legitimate reason, e.g. when the data is no longer needed for the purposes for which it was collected.
  5. Right to restriction of processing: The subject has the right to request the restriction of the processing of their personal data in certain situations, for example in the case of verifying the accuracy of the data or objecting to the processing.
  6. Right to data portability: In some cases, the data subject has the right to receive their personal data in a structured format that is commonly used and machine-readable and to transmit this data to another controller.
  7. Right to object: The data subject has the right to object to the processing of their personal data on grounds relating to their particular situation, unless the controller demonstrates the existence of compelling legitimate grounds for the processing which override the interests, rights and freedoms of the data subject.

 

For matters relating to the exercise of these rights, please contact: GDPR@diuna.biz

Last update July 2024

small_c_popup.png

Zadaj nam dowolne pytanie – nasz konsultant skontaktuje się z Tobą szybciej niż możesz się tego spodziewać.

Szybki kontakt