Goal | Guaranteeing the continuity of the availability and protection of the (provision of) information, and limiting any consequences of security incidents. |
Personal Data | From a suspect:
First name and last name
RSM account
All information on RSM systems
All data stored/uploaded onto any RSM system (e.g. the CRM system)
Account data logging, including:
All activity on the system/platform, including:
Visited pages/accessed files
Downloads/uploads
Communication
Optional:
From a whistleblower:
First name and last name
RSM account
Phone number |
Source of Data | From any RSM system.
A whistleblower may notify RSM directly. |
Legal Ground | Contractual:
A party accepts working in line with predefined information technology terms & conditions, and thereby accepts the possibility of enforcement of investigative procedures in the event of unpermitted behaviour occurring.
Consent:
A whistleblower decides to notify RSM of unpermitted behaviour. |
3rd Parties | Computing system
Monitoring system
All of RSM’s systems |
Retention | The data is kept for 7 years, or until an investigative procedure is concluded. |