{"id":93,"date":"2023-04-05T14:53:48","date_gmt":"2023-04-05T14:53:48","guid":{"rendered":"https:\/\/www.jobcontax.com\/blog\/?p=93"},"modified":"2023-04-05T14:58:34","modified_gmt":"2023-04-05T14:58:34","slug":"information-security-and-data-protection","status":"publish","type":"post","link":"https:\/\/www.jobcontax.com\/blog\/information-security-and-data-protection\/","title":{"rendered":"Information Security And Data Protection"},"content":{"rendered":"\n<p><strong>Policy on Information Security And Data Protection<\/strong><\/p>\n\n\n\n<p>As a recruitment company, JobContax processes personal data in relation to its own staff, work-seekers and individual client contacts. It is vitally important that we abide by the principles of the Data Protection Act 1998 set out below.<\/p>\n\n\n\n<p>JobContax holds data on individuals for the following general purposes:<\/p>\n\n\n\n<p>\u2022 Staff Administration<\/p>\n\n\n\n<p>\u2022 Advertising, marketing and public relations<\/p>\n\n\n\n<p>\u2022 Accounts and records<\/p>\n\n\n\n<p>\u2022 Administration and processing of work-seekers personal data for the purposes of work-finding services<\/p>\n\n\n\n<p>The Data Protection Act 1998 requires JobContax as data controller to process data in accordance with the principles of data protection. These require that data shall be: &#8211;<\/p>\n\n\n\n<p>1. Fairly and lawfully processed<\/p>\n\n\n\n<p>2. Processed for limited purposes<\/p>\n\n\n\n<p>3. Adequate, relevant and not excessive<\/p>\n\n\n\n<p>4. Accurate<\/p>\n\n\n\n<p>5. Not kept longer than necessary<\/p>\n\n\n\n<p>6. Processed in accordance with the data subjects rights<\/p>\n\n\n\n<p>7. Kept securely<\/p>\n\n\n\n<p>8. Not transferred to countries outside the European Economic Area without adequate protection.<\/p>\n\n\n\n<p>Personal data means data, which relates to a living individual who can be identified from the data or from the data together with other information, which is in the possession of, or is likely to come into possession of, JobContax.<\/p>\n\n\n\n<p>Processing means obtaining, recording or holding the data or carrying out any operation or set of operations on the data. It includes organising, adapting and amending the data, retrieval, consultation and use of the data, disclosing and erasure or destruction of the data. It is difficult to envisage any activity involving data, which does not amount to processing. It applies to any processing that is carried out on computer including any type of computer however described, main frame, desktop, laptop, palm top etc.<\/p>\n\n\n\n<p>Data should be reviewed on a regular basis to ensure that it is accurate, relevant and up to date and those people listed in the appendix shall be responsible for doing this.<\/p>\n\n\n\n<p>Data may only be processed with the consent of the person whose data is held. Therefore if they have not consented to their personal details being passed to a third party this may constitute a breach of the Data Protection Act 1998. By instructing JobContax to look for work and providing us with personal data contained in a CV work-seekers will be giving their consent to processing their details for work-finding purposes. If you intend to use their data for any other purpose you must obtain their specific consent.<\/p>\n\n\n\n<p>However caution should be exercised before forwarding personal details of any of the individuals on which data is held to any third party such as past, current or prospective employers; suppliers; customers and clients; persons making an enquiry or complaint and any other third party.<\/p>\n\n\n\n<p>Data in respect of the following is \u201csensitive personal data\u201d and any information held on any of these matters MUST not be passed on to any third party without the express written consent of the individual:<\/p>\n\n\n\n<p>\u2022 Any offence committed or alleged to be committed by them<\/p>\n\n\n\n<p>\u2022 Proceedings in relation to any offence and any sentence passed<\/p>\n\n\n\n<p>\u2022 Physical or mental health or condition<\/p>\n\n\n\n<p>\u2022 Racial or ethnic origins<\/p>\n\n\n\n<p>\u2022 Sexual life<\/p>\n\n\n\n<p>\u2022 Political opinions<\/p>\n\n\n\n<p>\u2022 Religious beliefs or beliefs of a similar nature<\/p>\n\n\n\n<p>\u2022 Whether someone is a member of a trade union<\/p>\n\n\n\n<p>From a security point of view, only those staff listed in the appendix should be permitted to add, amend or delete data from the database. However all staff are responsible for notifying those listed where information is known to be old, inaccurate or out of date. In addition all employees should ensure that adequate security measures are in place. For example:<\/p>\n\n\n\n<p>\u2022 Computer screens should not be left open by individuals who have access to personal data<\/p>\n\n\n\n<p>\u2022 Passwords should not be disclosed<\/p>\n\n\n\n<p>\u2022 Email should be used with care<\/p>\n\n\n\n<p>\u2022 Personnel files and other personal data should be stored in a place in which any unauthorised attempts to access them will be noticed. They should not be removed from their usual place of storage without good reason.<\/p>\n\n\n\n<p>\u2022 Personnel files should always be locked away when not in use and when in use should not be left unattended<\/p>\n\n\n\n<p>\u2022 Any breaches of security should be treated as a disciplinary issue.<\/p>\n\n\n\n<p>\u2022 Care should be taken when sending personal data in internal or external mail<\/p>\n\n\n\n<p>\u2022 Destroying or disposing of personal data counts as processing. Therefore care should be taken in the disposal of any personal data to ensure that it is appropriate. For example, it would have been more appropriate to shred sensitive data than merely to dispose of it in the dustbin.<\/p>\n\n\n\n<p>It should be remembered that the incorrect processing of personal data e.g. sending an individual\u2019s details to the wrong person; allowing unauthorised persons access to personal data; or sending information out for purposes for which the individual did not give their consent, may give rise to a breach of contract and\/or negligence leading to a claim against JobContax for damages from an employee, work-seeker or client contact. A failure to observe the contents of this policy will be treated as a disciplinary offence.<\/p>\n\n\n\n<p>Data subjects, i.e. those on whom personal data is held, are entitled to obtain access to their data on request and after payment of a fee. All requests to access data by data subjects i.e. staff, members, customers or clients, suppliers, students etc should be referred to Karen McHugh whose details are also listed here..<\/p>\n\n\n\n<p>Any requests for access to a reference given by a third party must be referred to Karen McHugh and should be treated with caution even if the reference was given in relation to the individual making the request. This is because the person writing the reference also has a right to have their personal details handled in accordance with the Data Protection Act 1998, and not disclosed without their consent. Therefore when taking up references an individual should always be asked to give their consent to the disclosure of the reference to a third party and\/or the individual who is the subject of the reference if they make a subject access request. However if they do not consent then consideration should be given as to whether the details of the individual giving the reference can be deleted so that they cannot be identified from the content of the letter. If so the reference may be disclosed in an anonymised form.<\/p>\n\n\n\n<p>Finally it should be remembered that all individuals have the following rights under the Human Rights Act 1998 and in dealing with personal data these should be respected at all times:<\/p>\n\n\n\n<p>\u2022 Right to respect for private and family life [Article 8]<\/p>\n\n\n\n<p>\u2022 Freedom of thought, conscience and religion [Article 9]<\/p>\n\n\n\n<p>\u2022 Freedom of expression [Article 10]<\/p>\n\n\n\n<p>\u2022 Freedom of assembly and association [Article 11]<\/p>\n\n\n\n<p>\u2022 Freedom from discrimination [Article 14]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Policy on Information Security And Data Protection As a recruitment company, JobContax processes personal data in relation to its own staff, work-seekers and individual client contacts. It is vitally important that we abide by the principles of the Data Protection<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-93","post","type-post","status-publish","format-standard","hentry","category-jobcontax"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security And Data Protection - JobContax Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.jobcontax.com\/blog\/information-security-and-data-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security And Data Protection - JobContax Blog\" \/>\n<meta property=\"og:description\" content=\"Policy on Information Security And Data Protection As a recruitment company, JobContax processes personal data in relation to its own staff, work-seekers and individual client contacts. It is vitally important that we abide by the principles of the Data Protection\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.jobcontax.com\/blog\/information-security-and-data-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"JobContax Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-05T14:53:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-05T14:58:34+00:00\" \/>\n<meta name=\"author\" content=\"JobContax\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"JobContax\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/information-security-and-data-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/information-security-and-data-protection\\\/\"},\"author\":{\"name\":\"JobContax\",\"@id\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/#\\\/schema\\\/person\\\/ec2000d427ab351735dea2d8660e4631\"},\"headline\":\"Information Security And Data Protection\",\"datePublished\":\"2023-04-05T14:53:48+00:00\",\"dateModified\":\"2023-04-05T14:58:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/information-security-and-data-protection\\\/\"},\"wordCount\":1104,\"articleSection\":[\"JobContax\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/information-security-and-data-protection\\\/\",\"url\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/information-security-and-data-protection\\\/\",\"name\":\"Information Security And Data Protection - JobContax Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/#website\"},\"datePublished\":\"2023-04-05T14:53:48+00:00\",\"dateModified\":\"2023-04-05T14:58:34+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/#\\\/schema\\\/person\\\/ec2000d427ab351735dea2d8660e4631\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/information-security-and-data-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/information-security-and-data-protection\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/information-security-and-data-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security And Data Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/\",\"name\":\"JobContax Blog\",\"description\":\"JobContax Recruitment Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/#\\\/schema\\\/person\\\/ec2000d427ab351735dea2d8660e4631\",\"name\":\"JobContax\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b56fcfe472657f304f6e9ee6129a58bfd3424c8c1b5064f2150697430d473af1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b56fcfe472657f304f6e9ee6129a58bfd3424c8c1b5064f2150697430d473af1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b56fcfe472657f304f6e9ee6129a58bfd3424c8c1b5064f2150697430d473af1?s=96&d=mm&r=g\",\"caption\":\"JobContax\"},\"url\":\"https:\\\/\\\/www.jobcontax.com\\\/blog\\\/author\\\/sean\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security And Data Protection - JobContax Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.jobcontax.com\/blog\/information-security-and-data-protection\/","og_locale":"en_US","og_type":"article","og_title":"Information Security And Data Protection - JobContax Blog","og_description":"Policy on Information Security And Data Protection As a recruitment company, JobContax processes personal data in relation to its own staff, work-seekers and individual client contacts. It is vitally important that we abide by the principles of the Data Protection","og_url":"https:\/\/www.jobcontax.com\/blog\/information-security-and-data-protection\/","og_site_name":"JobContax Blog","article_published_time":"2023-04-05T14:53:48+00:00","article_modified_time":"2023-04-05T14:58:34+00:00","author":"JobContax","twitter_card":"summary_large_image","twitter_misc":{"Written by":"JobContax","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.jobcontax.com\/blog\/information-security-and-data-protection\/#article","isPartOf":{"@id":"https:\/\/www.jobcontax.com\/blog\/information-security-and-data-protection\/"},"author":{"name":"JobContax","@id":"https:\/\/www.jobcontax.com\/blog\/#\/schema\/person\/ec2000d427ab351735dea2d8660e4631"},"headline":"Information Security And Data Protection","datePublished":"2023-04-05T14:53:48+00:00","dateModified":"2023-04-05T14:58:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.jobcontax.com\/blog\/information-security-and-data-protection\/"},"wordCount":1104,"articleSection":["JobContax"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.jobcontax.com\/blog\/information-security-and-data-protection\/","url":"https:\/\/www.jobcontax.com\/blog\/information-security-and-data-protection\/","name":"Information Security And Data Protection - JobContax Blog","isPartOf":{"@id":"https:\/\/www.jobcontax.com\/blog\/#website"},"datePublished":"2023-04-05T14:53:48+00:00","dateModified":"2023-04-05T14:58:34+00:00","author":{"@id":"https:\/\/www.jobcontax.com\/blog\/#\/schema\/person\/ec2000d427ab351735dea2d8660e4631"},"breadcrumb":{"@id":"https:\/\/www.jobcontax.com\/blog\/information-security-and-data-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.jobcontax.com\/blog\/information-security-and-data-protection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.jobcontax.com\/blog\/information-security-and-data-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.jobcontax.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Information Security And Data Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.jobcontax.com\/blog\/#website","url":"https:\/\/www.jobcontax.com\/blog\/","name":"JobContax Blog","description":"JobContax Recruitment Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.jobcontax.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.jobcontax.com\/blog\/#\/schema\/person\/ec2000d427ab351735dea2d8660e4631","name":"JobContax","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b56fcfe472657f304f6e9ee6129a58bfd3424c8c1b5064f2150697430d473af1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b56fcfe472657f304f6e9ee6129a58bfd3424c8c1b5064f2150697430d473af1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b56fcfe472657f304f6e9ee6129a58bfd3424c8c1b5064f2150697430d473af1?s=96&d=mm&r=g","caption":"JobContax"},"url":"https:\/\/www.jobcontax.com\/blog\/author\/sean\/"}]}},"_links":{"self":[{"href":"https:\/\/www.jobcontax.com\/blog\/wp-json\/wp\/v2\/posts\/93","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jobcontax.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jobcontax.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jobcontax.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jobcontax.com\/blog\/wp-json\/wp\/v2\/comments?post=93"}],"version-history":[{"count":1,"href":"https:\/\/www.jobcontax.com\/blog\/wp-json\/wp\/v2\/posts\/93\/revisions"}],"predecessor-version":[{"id":94,"href":"https:\/\/www.jobcontax.com\/blog\/wp-json\/wp\/v2\/posts\/93\/revisions\/94"}],"wp:attachment":[{"href":"https:\/\/www.jobcontax.com\/blog\/wp-json\/wp\/v2\/media?parent=93"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jobcontax.com\/blog\/wp-json\/wp\/v2\/categories?post=93"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jobcontax.com\/blog\/wp-json\/wp\/v2\/tags?post=93"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}