The company handles the subject matter of the use protection also has information
Confidential Information Requirements.
Surge Protectors As Fast As Possible
Load more...
.

Online Reservations
The company shall ensure the necessary and sufficient level of information security for personal data and its processing.
When processing in the information system, "is ordered by the city No. 22."
This policy defines the principles, procedures and conditions for handling various subjects handled by the company to ensure the protection of human rights Bao wintonbury and civil rights and freedoms, including the protection of privacy, personal and family secrets.
Received by the company, before and after effective, and on all topics.
This policy will take effect from the date of approval by the company's directors and will remain valid indefinitely until replaced by the new policy.

You cannot restrict access to this document.
The policy may be changed. If the current legislative law is revised and a new legislative law appears, there will be changes, as well as special regulatory documents on the processing and protection of personal data, but at least once every three years.
Any information related to directly or indirectly identified or identifiable individuals (subjects). Committed to using automated tools or not using such tools with data, including collection, recording, systematization, accumulation, storage, clarification (update, change), extraction, use, transfer (distribution, provision, access), depersonalization Change, block, delete, destroy. Regarding the approval of a unified format of labor accounting and salary basic accounting documents. "
Provide medical services and medical services). The company does not process information that characterizes a person's physiological and biological characteristics, on which the identity (biology) can be determined.
Or lose the ability to fulfill these needs, unless federal law provides otherwise.
Use of automated tools, including the use of information technology and technical means, including computer technology, means and systems for transmission, reception and processing, software tools, information security tools used in information systems, and non-use of automated tools... He will be informed in advance of the purpose, the claimed source and the method of obtaining it.
The company is the operator of the website at. After submitting the resume, the applicant agrees to deal with it. The exclusion method of its material carrier does not include loss, misuse or unauthorized use. Through computer media or in the information system, the company ensures the implementation of the content approved by the Government of the Russian Federation No. 1219 on December 1, 2013.
The company has not made (cross-border transfers) to foreign territories, foreign authorities, foreign individuals or legal persons. , Unless otherwise provided by federal law, based on an agreement with that person. The right to receive information about the company's processing of it. If it is incomplete, outdated, incorrect, illegally obtained or unnecessary for the prescribed processing purposes, it shall be blocked or destroyed, and legally prescribed measures shall be taken to protect its rights.
May be restricted under federal law.
In order to exercise their rights and protect their legitimate rights and interests (please refer to Article 0-0 of this policy), the subject has the right to contact the company. The company will consider any appeals and complaints from the subject, thoroughly investigate the violation facts, and take all necessary measures to eliminate them immediately, punish the perpetrators, and resolve disputes and conflict situations outside the court. The right to protect their rights and legal rights, including compensation for losses and/or mental damage in court. The right to withdraw consent to the processing at any time by contacting the company. , And only provide access to authorized employees who have signed confidentiality obligations. , Comply with its processing rules and meet its protection requirements.
The company has taken all necessary legal, organizational and engineering measures to protect it from unauthorized or accidental access, destruction, alteration, blocking, copying, distribution and other illegal actions by third parties. Control measures taken to ensure the security of personal data. This policy is an internal document and must be published in a public place.
All questions and suggestions regarding changes or additions to this policy should be sent to the person responsible for the organization through the above-mentioned contact number or postal address. Surge Protectors As Fast As Possible
Leave a Reply