Working with personal data is like having your cake and eating it too. It is imperative for organizations to use personal data but, at the same time, they need to be mindful of how that data is stored, shared, and used. In this digital age, privacy is a hot topic and for good reason, considering that the last ten years have been littered with thefts of sensitive information and data breaches that have affected companies and organizations of all shapes, sizes, and sectors.
PASS clients trust us with their sensitive information so concerns about how this data is being used and who has access to it are warranted, and we take privacy and security of the data we managed and use very seriously.
For this reason, we have implemented a data governance process that includes privacy, compliance, and security protocols which are regularly monitored and audited.
One of the ways we protect our clients’ data is by limiting access to it. We only request data that we deem necessary to provide our services, and we have strict controls in place to prevent unauthorized access. We allow the clients SPOC (single point of contact) to limit epacInfo® access based on each epacInfo® user’s role and “need to know” basis. Additionally, we use encryption and other security measures to protect our clients’ data when it is in transit and at rest. This helps to ensure that even in the event of a breach, our client’s data is still protected.
We also give our clients control over their data. Our clients can choose what information they want to share with us and can alter or revoke access to their data at any time. We are transparent about what information we collect and how we use it, and we make it easy for our clients to understand and manage their data. The information we use every day is client’s data, and we respect their privacy and ownership.
In conclusion, data privacy is of utmost importance to the PASS team of employee-owners. We take every measure possible to protect it. We want our clients to feel secure and confident in our services – our data privacy and security protocols are a key to meeting this goal.