The Data Management Policy provides guidelines to manage and protect the data within Spacewise. This policy ensures the accuracy, security, and availability of data based on international standards.
Data Classification
We classify the data to ensure the protection and security of your data. The following are the classifications we follow:
- Confidential data: These are considered sensitive data that require the highest level of protection. These are the following but are not limited to personal data, financial data, or intellectual property.
- Restricted data: These are considered data that require protection and security but are less sensitive than confidential data. These are the following but are not limited to project plans or internal documentation.
- Public data: These are considered data that can be freely shared without any restrictions. These are the following but are not limited to marketing materials or press releases.
Data Governance
We have respected roles and responsibilities in managing and protecting your data.
- Data Manager: The manager oversees the whole management and protection of your data.
- Data Administrators: The administrators implement data management procedures for specific data sets.
- Data User: The users access and use your data for daily operations while ensuring they follow the data management policy.
Data Collection, Storage, and Security
We follow certain guidelines in collecting and storing your data to ensure protection and security.
- Data Collection: Your data will be collected in a lawful manner based on international standards and information security compliance. We will also collect your data with your consent when required.
- Data Storage: Your data will be stored in secure systems with appropriate access controls. We conduct regular backups to ensure data availability.
- Data Security: We follow different measures to protect and secure your data: The measures are the following:
- Physical Checks and Security: We will conduct physical checks to protect physical access to our data storage. These are the following but are not limited to locked IT rooms or security cameras.
- Technical Security: We will conduct technical checks and implement technical measures to protect your data from unauthorized access, modification, and destruction. These are the following but are not limited to firewalls, data encryption, or restricted access.
- Incident Response: We will follow our Incident Management Policy diligently to ensure that we address the incident while protecting your data. For more information, please read our Incident Management Policy.
Data Access and Usage
We implement measures to ensure that access to your data will be based on the principle of least privilege. This ensures that team members who need access to your data for their job have the necessary access controls in place.
Moreover, your data will be used in line with our information security compliance, relevant laws, and regulations. This means that unauthorized access, use, or disclosure of data is strictly prohibited.
Data Training
We ensure that all our team members will receive training on data management policy. We will also conduct regular refresher training to ensure retention of the data management policy.
Policy Review
We will review and update our Data Management Policy regularly to ensure our compliance with international standards, laws, and regulations.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article