Privacy Policy
Paramount Employment Consultancy Pvt. Ltd. (PEC) is dedicated to preserving the legitimate privacy expectations of personal information for all parties involved in its business transactions, including suppliers, customers, consumers, and employees. PEC is committed to adhering to applicable laws and requirements when engaging in the collection, storage, processing, transmission, and sharing of personal information. The implementation of its privacy policy includes measures to safeguard and prevent unauthorized disclosure of all gathered information.
PEC ensures the enforcement of its privacy policy through the establishment of a documented information management system. This system encompasses practices for the secure storage, preservation, retention, and proper disposal of records, thereby fortifying the protection of sensitive information.
1. Procedure
- The heads of each department are designated as authorized individuals responsible for maintaining and safeguarding comprehensive information.
- Confidential information belonging to the company, which employees may acquire during the course of their employment, is to be exclusively utilized for the advancement of the company’s business interests. It must not be disclosed directly or indirectly to any other person, corporation, or entity unless expressly authorized by the company. This restriction remains applicable even after the termination of the employment relationship, regardless of the reason for termination.
2. Collection of Information
PEC typically acquires information from its suppliers, customers, consumers, and employees. This information may encompass Memoranda of Understanding (MoU), agreement letters, contact details, personal particulars, and other relevant data. The purpose for gathering this information will be communicated to the stakeholders, and the collection will be initiated only after obtaining explicit consent from the individuals involved.
3. Storing of Information
The information can be stored either electronically or as a hard copy. The employee responsible for storing the information bears the responsibility of ensuring its security.
4. Processing of Information
Information shall undergo processing only when necessary, such as for legal formalities, compiling employee skill matrices, performance evaluations, etc. During the processing of information, special care must be taken to ensure the confidentiality of the data is maintained and not disclosed without appropriate safeguards.
5. Transmitting of Information
The information will be transmitted solely to the relevant authority, and prior permission must be obtained before any such transmission occurs.
6. Sharing the Information
Information will be shared as per regulatory requirements. When sharing information, consent to disclose it shall be sought unless there is a compelling reason not to do so.
7. Monitoring
- Implementation, monitoring, and updates of the policy will be overseen by a team comprising members from both the MR and admin departments.
- The team is tasked with ongoing monitoring of the privacy policy’s implementation.
- Department heads are also responsible for regular monitoring to uphold the privacy of suppliers, customers, consumers, and employees.
- Top management, during management reviews, will oversee the application of the privacy policy.
- Monitoring will also be conducted as part of the internal assessment process.
8. Investigation and Sanctions
- Upon identification of any non-conformance during monitoring, a thorough investigation shall be conducted.
- Investigations will also be initiated in the case of alleged violations, and the findings of the investigation will be presented to the board members of PEC.
- Corrective and preventive actions will be implemented based on the outcomes of the investigation.
- In the event of suspected policy violations, immediate measures will be adopted to halt the violation, and the individuals involved will be provided with necessary guidance.
9. Violation of the Policy
Any employee accused of leaking private information at any stage of the collection, storage, processing, transmission, or sharing process will undergo a formal investigation. A designated investigation team, comprised of department heads, will be formed to conduct the inquiry and gather evidence or witness statements. The accused individual will be given an opportunity to present their justification. If found guilty, appropriate action commensurate with the severity of the violation will be taken, starting with warning letters and potentially leading to service termination or involvement of law enforcement procedures.