Lexcan recognizes its need to maintain the confidentiality of Personal Identity Information (PII) and understands that such information is unique to each individual. The PII covered by this policy may come from various types of individuals performing tasks on behalf of the company and includes employees, applicants, independent contractors and any PII maintained on its customer base. The scope of this policy is intended to be comprehensive and will include company requirements for the security and protection of such information throughout the company and its approved vendors both on and off work premises.
Personal Identity Information (PII): Unique personal identification numbers or data, including:
- Social Security Numbers (or their equivalent issued by governmental entities outside the United States).
- Taxpayer Identification Numbers (or their equivalent issued by governmental revenue entities outside the United States).
- Employer Identification Numbers (or their equivalent issued by government entities outside the United States).
- State or foreign drivers license numbers.
- Date(s) of birth.
- Corporate or individually held credit or debit transaction card numbers (including PIN or access numbers) maintained in organizational or approved vendor records.
PII may reside in hard copy or electronic records; both forms of PII fall within the scope of this policy.
Vendors: Individual(s) or companies that have been approved as a recipient of organizational PII and from which the Contracts Department has received certification of their data protection practices’ conformance with the requirements of this policy. Vendors include all external providers of services to the company and include proposed vendors. No PII information can be transmitted to any vendor in any method unless the vendor has been pre-certified for the receipt of such information.
PII Retention: Lexcan understands the importance of minimizing the amount of PII data it maintains and retains such PII only as long as necessary.
PII Training: All new hires entering the company who may have access to PII are provided with introductory training regarding the provisions of this policy, a copy of this policy and implementing procedures for the department to which they are assigned. Employees in positions with regular ongoing access to PII or those transferred into such positions are provided with training reinforcing this policy and procedures for the maintenance of PII data and shall receive annual training regarding the security and protection of PII data and company proprietary data
PII Audit(s): Lexcan conducts audits of PII information maintained by the company to ensure that this policy remains strictly enforced and to ascertain the necessity for the continued retention of PII information. Where the need no longer exists, PII information will be destroyed in accordance with protocols for the destruction of such records and logs maintained for the dates of destruction.
Data Breaches/Notification: Databases or data sets that include PII may be breached inadvertently or through wrongful intrusion. Upon becoming aware of a data breach, the company will notify all affected individuals whose PII data may have been compromised, and the notice will be accompanied by a description of the action being taken to reconcile any damage as a result of the data breach. Notices will be provided as expeditiously as possible.
Data Access: Lexcan maintains multiple IT systems where PII data may reside. Internal controls have been created for such systems to establish legitimate access for users of data, and access shall be limited to those approved. Any change in vendor status or the termination of an employee or independent contractor with access will immediately result in the termination of the user’s access to all systems where the PII may reside.
Data Transmission and Transportation
- Vendors: Lexcan may share data with vendors who have a business need to have PII data. Where such inter-company sharing of data is required, Lexcan will create and maintain data encryption and protection standards to safeguard all PII data that resides in the databases provided to vendors. Approved vendor lists will be maintained and updated in a timely fashion following any changes to vendor status with the company.
- Portable Storage Devices: Lexcan reserves the right to restrict PII data it maintains in the workplace. In the course of doing business, PII data may also be downloaded to laptops or other computing storage devices to facilitate company business. To protect such data, the company will also require that any such devices use approved encryption and security protection software and equipment while such devices are in use on or off company premises.
- Off-Site Access to PII: Lexcan understands that employees may need to access PII while off-site or on business travel, and access to such data shall not be prohibited, subject to the provision that the data to be accessed is minimized to the degree possible to meet business needs and that such data shall reside only on assigned laptops/approved storage devices that have been secured in advance.
Regulatory Requirements: It is the policy of the company to comply with any international, federal or state statute and reporting regulations. If any provision of this policy conflicts with a statutory requirement of international, federal or state law governing PII, the policy provision(s) that conflict shall be superseded.
Employee Hotline: If an employee has reason to believe that his or her PII (please refer to what constitutes PII) data security has been breached or that company representative(s) are not adhering to the provisions of this policy, an employee should contact an HR representative at the employee’s location or by email at firstname.lastname@example.org.
Confirmation of Confidentiality: All company employees must maintain the confidentiality of PII as well as company proprietary data to which they may have access and understand that such PII is to be restricted to only those with a business need to know. Employees with ongoing access to such data will sign acknowledgement reminders attesting to their understanding of this company requirement.
Violations of PII Policies and Procedures: Lexcan views the protection of PII data to be of the utmost importance. Infractions of this policy or its procedures will result in disciplinary actions under the company’s discipline policy and may include suspension or termination in the case of severe or repeat violations. PII violations and disciplinary actions are incorporated in Lexcan’s PII onboarding and refresher training to reinforce the company’s continuing commitment to ensuring that this data is protected by the highest standards.