When you place a request with Wirestork, your data undergoes a carefully managed process to ensure its security and compliance with data protection regulations. Here is a detailed explanation of what happens to your data after you place a request with us:
Data Collection
Initial Data Capture:
When you place a request, we collect the necessary personal information required to fulfill the request. This may include your name, contact details, and specific information related to the nature of the request (e.g., background checks, travel ban checks).
Consent and Legal Basis:
We ensure that we have a legal basis for collecting your data, typically through obtaining your explicit consent. We provide clear information on how your data will be used, stored, and processed, in line with our privacy policy.
Data Processing
Secure Transmission:
Your data is transmitted securely to our servers using encryption protocols (e.g., TLS) to prevent unauthorized access during transmission.
Data Entry and Verification:
Upon receipt, your data is entered into our secure system and verified for accuracy and completeness. This process may involve cross-referencing with publicly available databases or other verification methods.
Task Execution:
Our team processes your request, utilizing your data to perform the required checks or services. This stage involves accessing relevant external databases or contacting third-party sources, always ensuring compliance with legal and contractual obligations.
Data Storage
Secure Storage Solutions:
Your data is stored in encrypted databases within secure data centers that comply with industry standards for data protection. Access to these databases is restricted to authorized personnel only.
Data Segregation:
We implement data segregation practices to ensure that your data is isolated from other clients’ data, reducing the risk of data breaches and ensuring data integrity.
Redundancy and Backup:
Regular backups are performed to ensure data availability and integrity. Backup data is also encrypted and stored securely.
Data Access and Security
Role-Based Access Control:
Access to your data is granted based on the principle of least privilege, ensuring that only authorized personnel who need to access the data to fulfill your request can do so.
Monitoring and Auditing:
We continuously monitor access logs and conduct regular audits to detect and prevent unauthorized access or misuse of your data.
Incident Response:
In the event of a security incident, we have a robust incident response plan in place to quickly identify, contain, and mitigate any potential data breaches, with timely notification to affected parties and regulatory authorities as required.
Data Sharing and Disclosure
Third-Party Sharing:
If your request involves sharing data with third parties (e.g., for background checks or legal verifications), we ensure that these third parties comply with our stringent data protection standards. Contracts with third parties include specific data protection clauses.
Data Transfers:
For any international data transfers, we adhere to applicable data protection regulations, such as GDPR’s standard contractual clauses, to ensure the same level of data protection.
Data Retention and Disposal
Retention Policy:
We retain your data only for as long as necessary to fulfill the purpose of your request and to comply with legal and regulatory requirements. Our data retention policies are designed to minimize data retention periods wherever possible.
Data Anonymization:
Where feasible, we anonymize personal data to reduce the risk of identification. Anonymized data is used for statistical and analytical purposes without identifying individual clients.
Secure Disposal:
When data is no longer needed, it is securely disposed of using industry-standard methods. Digital data is permanently deleted from our systems, while physical data (if any) is shredded or otherwise destroyed to prevent unauthorized access.
Client Rights and Transparency
Access and Control:
You have the right to access your personal data and to request corrections or deletions if the data is inaccurate or no longer needed. We provide clear and simple mechanisms for you to exercise these rights.
Transparency and Communication:
We maintain transparency about our data processing activities and are committed to communicating any significant changes to our data protection practices. Our privacy policy and data protection notices are kept up-to-date and readily accessible.