Adyton Data Security Policy 

Context and Overview 

Key Details 

Introduction 

Adyton needs to capture and use select information about individuals, businesses, and business processes. 


This policy describes how this data must be collected, handled, and stored to meet the company’s data protection standards and to comply with all applicable laws. 


As data security needs evolve, so will this policy. 

Why This Policy Exists 

This data protection policy ensures Adyton: 


Data Protection Law 

Various laws describe how organizations including Adyton, must collect, handle, and store information. These rules apply regardless of whether data is stored electronically, on paper, or on other materials. 


To comply with the law, personal information must be collected and used fairly, stored safely, and not disclosed unlawfully. Our legal responsibility to data protection is underpinned by eight important principles. These say that personal data must:

 


People, Risks, and Responsibilities 

Policy Scope 

This policy applies to: 



It applies to all data that the company holds relating to identifiable individuals, even if that information technically falls outside of prevailing laws. This can include but is not limited to: 


Data Protection Risks 

This policy helps to protect Adyton from some very real data security risks, including:

 

Responsibilities 

Everyone who works for or with Adyton, including clients and users, has some responsibility for ensuring data is collected, stored, and handled appropriately.

 

Each entity that handles personal data must ensure that it is handled and processed in line with this policy and data protection principles. 


However, these people have key areas of accountability and/or responsibility: 

The CEO, Bill Crose is accountable for: 


General Staff Guidelines 

Data Storage 

These rules describe how and where data should be safely stored. Questions about storing data safely can be directed to the IT manager or data controller. 


When data is printed, it must be kept in a secure place where unauthorized people cannot see it. 


These guidelines also apply to data that is usually stored electronically but has been printed for any reason: 



When data is stored electronically, it must be protected from unauthorized access, accidental deletion, and malicious hacking attempts:


Data Use 

Personal data is useless unless a client business or Adyton can make use of it. However, it is when personal data is accessed and used that it can be at the greatest risk of loss, corruption, or theft. Therefore:

 

Data Accuracy 

Adyton will take reasonable steps to ensure data is kept accurate and up to date. The more important it is that the personal data is accurate, the greater the effort Adyton will put into ensuring its accuracy. 


It is the responsibility of all who work with data to take reasonable steps to ensure it is kept as accurate and up-to-date as possible. 


Subject Access Requests 

All individuals who are the subject of personal data held by Adyton are entitled to, with the approval of their employer: 



If an individual contacts Adyton requesting this information, it is called a subject access request. Individuals requesting data access will be directed to their system administrator. On behalf of individuals, system administrators must email requests to Adyton's data controller at admin@adytonusa.com. Upon request,



The data controller will always verify the identity of anyone making a subject access request before sharing any information. 

Disclosing Data for Other Reasons 

In certain circumstances, personal data must be disclosed to law enforcement agencies without the consent of the data subject. Under these circumstances, Adyton will disclose the requested data. However, Adyton will ensure the request is legitimate on advice from legal advisers. 

Google Services 


Adyton’s Pythia system uses Google services including Google Cloud, Google Speech, Google SQL, Google Storage, and Google Translate. Google Cloud is 1 of only 4 data security vendors falling within Forrester Research’s “Leader Wave” in 2023. For more information on Google Cloud’s security infrastructure and Forrester Research’s report, follow this link: https://cloud.google.com/security 


Providing Information 

Adyton aims to ensure that individuals are aware that their data is being processed, and that they understand: 



To these ends, the company has a privacy statement, setting out how data relating to individuals is used by the company. 


This is available on the company’s website: www.adytonusa.com/data-safety