will give you more control over your data and ease your burden of
achieving GDPR compliance.
We have constituted an Information Management Document(IMD),
which includes information on all the roles Crisco assumes, such as a
data controller and processor. It details on various categories of
personal data processed by our organization and which department
is getting access to which data and for what purpose. It has a
comprehensive coverage of all our processes and procedures.
We have assessed our sub-processors (third party service providers,
partners) and streamlined the contract process with them to ensure
that they have addressed the pressing needs of the current security
and privacy world.
We have appointed internal privacy champions for all our teams. We
have also appointed a Data Protection Auditor (DPA).
Our application teams have embraced the concept of privacy by
design and have provided you more control over the data you store
in our systems. These provisions may vary based on a product’s
characteristics and domain. We constantly endeavour to provide you
with more enhancements, which shall be rolled out in phases.
We have amended our Data Processing Addendum (based on Model
Contractual Clauses) to be compliant with the data processing
requirements of GDPR.
If you are the organization administrator and would like to sign a DPA
with us, please drop an email to legal@criscoconsulting.in to request a
copy of the Data Processing Addendum mentioning in which Data
Center you've signed up for your Crisco account.
We conducted Data Protection Impact Assessments (DPIA). Based
on the results, we have put in place appropriate controls on data
processing and management.
We conducted internal audits of our products, processes, operations,
and management. The findings were communicated to our teams,
who have worked out the solutions to the identified problems.
Based on the DPIAs and internal audits, we have improved our data
security methods and processes. This includes encrypting data at
rest, based on the level of sensitivity and likelihood of risks. We have
developed in-house tools for better governance and discovery of
data.
We have cleaned up our databases to ensure that we have only the
latest and most accurate information. This cleanup process includes
removing terminated and dormant accounts as per our Terms of
Service.
When needed, breach notifications will be done according to our
internal Privacy Incident Response policy. Customers will be notified