Privacy Policy
This Privacy Policy outlines how Helm360 (“we,” “us,” “our”) collects, uses, maintains, and discloses information obtained from users (“you,” “your”) of the helm360.com website (“Website”). This policy applies to the Website and all services provided by Helm360.
- Purpose Of Policy
The purpose of this policy presents Helm360 commitment for privacy of user information and sensitive commercial/financial data. - Scope of Policy
This policy applies to all data that is either owned or managed by Helm360. - Supporting Documents
List of documents supporting this policy,
a) Information Security Policy - Responsibilities
- Chief Information Security Officer is responsible for development, implementation, maintenance and enforcement of the policy
- Helm360’s Internal Audit Team is responsible for conducting regular audits to ensure compliance to this policy
- Employees and non-employees of Helm360 are responsible and/or accountable to ensure adherence to the terms of this policy in the course of their job duties
- Policy Statements
The privacy policy displayed to the user must clearly communicate minimum of the following information:- Purpose for collection of personal information
- Manner in which the information will be processed
- Controls for protection of personal information
- Usage of tools such as cookies to collect personal information online
- Details of information such as IP address, Domain information captured about the user
- Sharing of information with third parties
- User rights to access of personal information
- Details to contact Helm360 for queries on processing personal information
- Helm360 commitment to privacy and security
- Period for which the terms and conditions are valid
- Helm360 information security standards and practices
- Policy on external links
- Helm360 will not use information about user activities on the Internet together with any information that would result in the user being identified without his consent.
- Helm360 will not associate the information collected by software utilities (cookies, single-pixel gif images) with username or email address, at the time of the user visiting the sites.
- Helm360 will implement policy guidelines to safeguard the privacy of the user identifiable information from unauthorised access or improper use, and will continue to enhance security procedures as new technology becomes available.
- Helm360 honour requests from users to review all personally identifiable information maintained in reasonably retrievable form, which currently consists of the users name, address, e-mail address, telephone number and will correct any such information which may be inaccurate. Users may verify that appropriate corrections have been made.
- Helm360 may use user identifiable information to investigate and help prevent potentially unlawful activity or activity that threatens the network or otherwise violates the user agreement for that service
- All kinds of data such as personally identifiable information shared by users shall be:
- Processed fairly, lawfully and securely
- Processed in relation to the purpose for which it is collected
- Maintained up to date and accurate as necessary
- Retained for no longer than is necessary for the purpose for which it is collected
- Users shall be provided with at least the following information before collecting personally identifiable information
- Purposes of processing the information
- Any further information regarding the specific circumstances in which personal information is collected, such as:
- The recipients of the information
- Whether submission of information is obligatory or voluntary, as well as the impact of failure to submit such information
- The existence of the right to access, update or remove personal information
- Whether personal information will be used for marketing purpose
- Enforcement
- Policy Violations
Violation of the policy will result in corrective action from the management. Disciplinary action will be consistent with the severity of the incident, as determined by the investigation, and may include, but not limited to- Loss of access privileges to information assets
- Termination of employment or contract
- Other actions deemed appropriate by management, HR division, Legal division and their relevant policies
- Policy Violations
- Policy Exceptions
Any exceptions to this policy have to be formally approved by the Chief Information Security Officer. All the exceptions shall be formally documented in the standard IT exceptions request form.
Data Protection Officer
Ashutosh Vashisht
[email protected]
[email protected]