| Goal | Guaranteeing the continuity of the availability and protection of the (provision of) information, and limiting any consequences of security incidents. |
| Personal Data | From a suspect:
First name and last name
RSM account
All information on RSM systems
All data stored/uploaded onto any RSM system (e.g. the CRM system)
Account data logging, including:
All activity on the system/platform, including:
Visited pages/accessed files
Downloads/uploads
Communication
Optional:
From a whistleblower:
First name and last name
RSM account
Phone number |
| Source of Data | From any RSM system.
A whistleblower may notify RSM directly. |
| Legal Ground | Contractual:
A party accepts working in line with predefined information technology terms & conditions, and thereby accepts the possibility of enforcement of investigative procedures in the event of unpermitted behaviour occurring.
Consent:
A whistleblower decides to notify RSM of unpermitted behaviour. |
| 3rd Parties | Computing system
Monitoring system
All of RSM’s systems |
| Retention | The data is kept for 7 years, or until an investigative procedure is concluded. |