Search
Close this search box.
Call Center Studio Primary Logo
Home | Privacy Program

Navigation

SECURE CUSTOMER SERVICE

Call Center Studio Global Privacy Program

Call Center Studio, and its subsidiaries (collectively, “CallCenterStudio”) have been fully
compliant with The General Data Protection Regulation (GDPR) since 2018. This version is
valid from 09.06.2023.

Compliancy & Certifications

ISO/IEC 27001:2022 : Information Securtiy Management Systems

ISO 9001:2015 : Quality Management Systems

ISO 10002:2018 : Customer Satisfaction Management System

● PCI-DSS CallCenterStudio compliance

COMPLIANCE: EU GDPR

The General Data Protection Regulation (GDPR) was approved by the European Commission (EC) on 27 April 2016 and becomes law on 25 May 2018. It replaces the previous EC legislation which dealt with data protection which was the Data Protection Directive of 1995. The GDPR represents a major shift in the way that data protection is regulated in EU law. It is important to note that the reform of the EU regulatory framework on data protection occurred against the backdrop of similar reform processes undertaken by other international organisations that have been influential in the field.

The story of the GDPR’S birth is long and often difficult to follow. At the same time, it is both fascinating and instructive, not just in terms of showing how data protection has developed within the EU but also in terms of the insights it provides on the mechanics of the EU legislative process more generally. It demonstrates the complexities of that process, as well as the growing significance of data protection in economic, social and political terms and the strengthening of the fundamental right to data protection in the EU legal order. 

The GDPR document itself is eighty-eight pages long and consists of two main parts: 

  • Recitals – 173 numbered paragraphs that lay out the principles and intentions of the Regulation; if you like, the background. (The Recitals are important because they provide additional details and insight into the purpose and functions of the Articles.)
  • Articles – the 99 sections that set out the detail of the Regulation – this is the part that must be complied with. 

One of the major differences between the GDPR and the previous law is that the GDPR is a Regulation rather than a Directive. This means that it automatically becomes law in each of the countries that make up the European Union without each of these countries needing to create their own, individual laws (in contrast with the previous Directive where, in each of the member states, a separate Data Protection Act had to be passed by the relevant state legislative body to enact it). It concerns the personal data of EU citizens wherever that data is held. This means that if your organisation is not based in the European Union but has customers (or suppliers or other parties) in Europe and you process their data, the GDPR applies to you. 

If you do experience a breach of personal data, you have no choice but to tell the relevant supervisory authority about it. There are some caveats on that which we will come to later, but keeping a serious data breach to yourself is no longer an option. 

But the mainstay of what the GDPR is about is forcing organisations to take the protection of the personal data of EU citizens seriously. 

The fines for violating the GDPR are very high. There are two tiers of penalties, which max out at €20 million or 4% of global revenue (whichever is higher), plus data subjects have the right to seek compensation for damages. GDPR’s goal is to protect all natural persons’ personal data from privacy and data breaches. 

Any information related to a natural person or ‘data subject’, that can be used directly or indirectly to identify the person is called personal data. The GDPR applies to ‘personal data’ meaning any information relating to an identifiable person who can be directly or indirectly identified in particular by reference to an identifier. e session identifier becomes personal data.

The GDPR refers to sensitive personal data as “special categories of personal data”. The special categories specifically include genetic data, and biometric data where processed to uniquely identify an individual. Personal data relating to criminal convictions and offences are not included, but similar extra safeguards apply to its processing.

All companies/organisations processing personal data of data subjects residing in the European Union, regardless of the company’s location are regulated. Two important players in GDPR world are the following:

  1.     Data Controllers: Whoever determines the means and purposes of processing the personal data of others is a ‘controller’ under data protection law; if several persons take this decision together, they may be ‘joint controllers. 
  2.     Data Processor: A processor is a natural or legal person that processes personal data on behalf of a controller. 

The most important consequence of being a controller or a processor is legal responsibility for complying with the respective obligations under data protection law. The GDPR applies to both Data Processors and Data controllers, although it applies to them in different ways.

It is important to know that if you are subject to GDPR or not. Territorial Scope is the first place to make sure your company is subject to GDPR.   This Regulation applies to the processing of personal data in the context of the activities of an establishment of a controller or a processor in the Union, regardless of whether the processing takes place in the Union or not. This Regulation applies to the processing of personal data of data subjects who are in the Union by a controller or processor not established in the Union, where the processing activities are related to: (a) the offering of goods or services, irrespective of whether a payment of the data subject is required, to such data subjects in the Union; or (b) the monitoring of their behaviour as far as their behaviour takes place within the Union. This Regulation applies to the processing of personal data by a controller not established in the Union, but in a place where Member State law applies by virtue of public international law.

The General Data Protection Regulation is placing power back in the hands of the individual and is forcing millions of small business owners across the EU to revisit their approach to marketing, the way in which they manage their data processing, document their marketing systems and processes. 

The primary motivations behind the GDPR are: The EU has given people more power over how their personal data is used, taking into account that companies providing Search engine services as well as companies in social networks are changing access to people’s data for the use of their products.

Cookie Policy - EU GDPR

Last Revised: December 11, 2022

Please read the following carefully to understand how Call Center Studio Inc. (“CCS”, “we”, or “us”) uses Cookies when you visit our website (“Site”).

  1. About Cookies

From 25 May 2018 the General Data Protection Regulation (GDPR) came into force saying that consent for data processing has to be given by users through a “clear affirmative action” and it must be freely given, specific, informed, and unambiguous. The GDPR says that consent is “any freely given, specific, informed and unambiguous indication of the data subject’s wishes by which you by a statement or by a clear affirmative action, signify agreement to the processing of personal data relating to you”.

It is important that “we need to be confident that you fully understand that your actions will result in specific cookies being set and have taken a clear and deliberate action to give consent. This must be more than simply continuing to use our website. To ensure that consent is freely given, you should be able to disable cookies, and you should make this easy to do.”

Whenever you find yourselves in our website, it may retrieve and store information on your browser. The information about you won’t occasionally directly identify you, but it can give you a different dedicated web experience.

 As a result, several companies like us have been developing cookie tools and privacy management software which allows you to set your cookies preferences by enabling them, for example, to reject the use of analytical, marketing or advertising cookies. Such tools are also a mechanism through we can seek to obtain and record your consent so that you can evidence such consent at a later date. These tools also allow you to change your preferences. This is important as you have the right to withdraw your consent as easily as you have given it.

  1. What do Cookies mean?

Cookies, pixel tags and similar technologies are files consisting of tiny amounts of information that are stored by visitor’s browser on any Internet-enabled device – such as visitor’s laptop, smart phone, or tablet – when you visit a website. Most of the web portals consisting of elements from multiple web domains so when you visit our Site, your browser can receive Cookies from several sources.  Cookies are small pieces of information stored on your hard drive, not on the CCS Websites. Afterwards, Cookies are delivered back to the originating webpage on each subsequent visit, or to another webpage that recognises that cookie. Cookies do lots of different and useful tasks, such as remembering visitor’s actions and preferences (such as login, language, font size etc.) The data processed by cookies are for the purposes mentioned to safeguard our legitimate interests as well as third parties pursuant to Art. 6 para. 1 sentence 1 lit. f GDPR required.

Most browsers accept cookies automatically. However, you can configure your browser so that no cookies are stored on your computer, or a note always appears before a new cookie is created. However, disabling cookies completely may mean that you cannot use all features of our website.

You can delete or block the Cookies, but if you do this, you may have to manually adjust some preferences every time you visit our site, and some features of our site may not work as intended. For example, you may not be able to visit certain areas of our site, or you may not receive personalized information when you visit our Site.

Most internet browsers are initially set up to automatically accept Cookies. If you do not want our website to store Cookies on your computer or device, you can change or adjust your browser or device settings to block Cookies or to alert visitor when Cookies are being sent to your device. 

If you use different devices to view and access our Sites (e.g. visitor’s computer, smartphone, tablet, etc.) you will need to ensure that each browser on each device is adjusted to suit your Cookie preferences.

  • Cookie Types

There are 2 main cookie types: First party cookies & 3rd party cookies

  • If the owner of website defines the cookies, then cookies are called “first party cookies”. 
  • If third parties define the cookies, then they are called “3rd party cookies“.

Benefit of hosting third party cookies is to make 3rd party features and functionality enabled through the website.  Examples: Advertising, analytics, and interactive contents.

Segmented Cookie Types

  • Strictly Necessary Cookies are necessary for the operation of Websites. These Cookies are essential in helping visitor to move around the websites and use the features, such as accessing secure areas of the websites. These cookies cannot be switched off in our systems. Such as Identifying you as being logged into the websites & providing access to protected areas of websites & setting your privacy preferences, logging in or filling in forms, for security purposes and making sure you connect to the right service on the website when we make any changes to the way it works. You can set your browser to block or alert you about these cookies, but some parts of the website will not then work. These cookies do not store any personally identifiable information.
  • Functional Cookies make the website enabled to provide strengthened functionality and personalisation. They may be called as first party cookies or third-party providers whose services we have added to our pages. If the you make these cookies inactive, then some of these services might not be functioning properly and efficiently. ‘Functionality’ cookies are used to provide services or to remember settings to improve your visit.

‘Functionality’ cookies used for such purposes as:

  • Remember settings you’ve applied such as layout, text size, preferences and colours
  • Remember if we’ve already asked you if you want to fill in a survey
  • Remember if you have engaged with a specific component or list on the website so that it won’t repeat
  • Show you when you’re logged in to the website
  • To provide and show embedded video content

Some of these cookies are managed for websites owners by third parties

  • With performance Cookies, Websites count number of visits & traffic of different time intervals so the performance of the websites can be easily considered. It is so beneficial that the owner easily recognizes Which landing pages are the most and least strong in terms of number of visitors. So, the information gathered because of this may be called omittable and not valuable info let’s say “anonymous”.

‘Performance’ cookies collect information about how you use the website, e.g. which pages you visit, and if you experience any errors. These cookies do not collect any information that could identify you and are only used to help us improve how the website works, understand the interests of our users and measure the effectiveness of our advertising.

Performance cookies used because of that:

  • Carry out web analytics: Provide statistics on how the website is used
  • Perform affiliate tracking: Provide feedback to affiliated entities that one of our visitors also visited their site
  • Obtain data on the number of users of the website that have viewed a product or service
  • Help us improve the website by measuring any errors that occur
  • Test different designs for the website

Some of the performance cookies are managed for websites by third parties.

  • Targeting Cookies are defined and implemented mostly by 3rd party partners who are advertising companies of owner of the website. These cookies can be benefited by those advertising companies to set a profile of visitors interests and show them any adverts on other sites based on their interests. ‘Targeting’ cookies are used to track your visit to the website, as well other websites, apps and online services, including the pages visitors have visited and the links visitors have followed, which allows website owners to display targeted ads to visitors on the website.

Websites owners may use targeting cookies to:

  • Display targeted ads within the website.
  • To improve how we deliver personalized ads and content, and to measure the success of ad campaigns on the website.
  • Session Cookiesare Cookies that allow website operators to link the actions of a user during a browser session. A browser session starts when a user opens the browser window and finishes when they close the browser window. Session Cookies are created temporarily. Once visitor closes the browser, all session Cookies are deleted.
  • Persistent cookies: these cookies remain on a user’s device for the period of time specified in the cookie. They are activated each time that the user visits the website that created that particular cookie.
  1. How to Manage and delete Cookies?

Web browsers give users control over what cookies are stored, but each works slightly differently. Follow these instructions to find out how to delete and manage cookies in your browser.

  • Google Chrome:

https://support.google.com/chrome/answer/95647?hl=en

  • Safari (Iphone)

https://support.apple.com/en-gb/HT201265

  • Safari (Mac)

https://support.apple.com/en-gb/guide/safari/sfri11471/mac

  • Mozilla Firefox

https://support.mozilla.org/en-US/products/firefox/protect-your-privacy/cookies

  • Samsung Internet (Mobile)

https://www.samsung.com/uk/support/mobile-devices/what-are-cookies-and-how-do-i-enable-or-disable-them-on-my-samsung-galaxy-device/

  • Microsoft Edge

https://support.microsoft.com/en-gb/windows/microsoft-edge-browsing-data-and-privacy-bb8174ba-9d73-dcf2-9b4a-c582b4e640dd

  • Internet Explorer

https://support.microsoft.com/en-us/windows/delete-and-manage-cookies-168dab11-0753-043d-7c16-ede5947fc64d

  • Opera

https://help.opera.com/en/latest/web-preferences/#cookies

Other parties we do business with, may place or recognize unique Cookies or other technologies placed on visitor’s browser when visitor visit our Sites to collect information about visitor’s use of the website and visitor’s other online activities over time and across different websites and apps, and may use that information to serve interest-based advertisements to visitor as visitor browse the Internet. To learn more about visitor’s choices for receiving interest-based advertising or to opt-out, please review the information below:

  • DAA: To opt-out of such collection and use for interest-based advertising by the Digital Advertising Alliance (DAA) participating companies, please visit: DAA’s website.
  • EDAA: To opt-out from the use of information about visitor’s online activities for interest-based advertising by European Interactive Digital Advertising Alliance (EDAA) member companies, please visit: EDAA’s website.
  • NAI: To opt-out from the use of information about visitor’s online activities for interest-based advertising by Network Advertising Initiative (NAI) member companies, please visit: NAI’s website.
  1. List of Cookies CCS prefers to use?
 

Cookie key

Domain

Path

Cookie type

Expiration

Description

li_gc
More info

.linkedin.com

/

Third-party

6 months

Used to store guest consent to the use of cookies for non-essential purposes

 

AWSALBCORS
More info

www.g2.com

/

Third-party

7 days

For continued stickiness support with CORS use cases after the Chromium update, we are creating additional stickiness cookies for each of these duration-based stickiness features named AWSALBCORS (ALB).

 

__cf_bm
More info

.g2.com

/

Third-party

30 minutes

This cookie is used to distinguish between humans and bots. This is beneficial for the website, in order to make valid reports on the use of their website.

 

AnalyticsSyncHistory
More info

.linkedin.com

/

Third-party

1 month

Used to store information about the time a sync with the lms_analytics cookie took place for users in the Designated Countries

 

__cf_bm
More info

.hubspot.com

/

Third-party

30 minutes

This cookie is used to distinguish between humans and bots. This is beneficial for the website, in order to make valid reports on the use of their website.

 

JSESSIONID
More info

support.callcenterstudio.com

/

First-party

Session

General purpose platform session cookie, used by sites written in JSP. Usually used to maintain an anonymous user session by the server.

 

__cf_bm
More info

.g2crowd.com

/

Third-party

30 minutes

This cookie is used to distinguish between humans and bots. This is beneficial for the website, in order to make valid reports on the use of their website.

 

JSESSIONID
More info

.nr-data.net

/

Third-party

Session

General purpose platform session cookie, used by sites written in JSP. Usually used to maintain an anonymous user session by the server.

 

 

Performance Cookies

Cookie key

Domain

Path

Cookie type

Expiration

Description

__hstc
More info

.callcenterstudio.com

/

First-party

6 months

This cookie name is associated with websites built on the HubSpot platform. It is reported by them as being used for website analytics.

 

__hssrc
More info

.callcenterstudio.com

/

First-party

Session

This cookie name is associated with websites built on the HubSpot platform. It is reported by them as being used for website analytics.

 

_ga_VPM72VD2JB
More info

.callcenterstudio.com

/

First-party

2 years

This cookie is used by Google Analytics to persist session state.

 

_ga
More info

.callcenterstudio.com

/

First-party

2 years

This cookie name is associated with Google Universal Analytics – which is a significant update to Google’s more commonly used analytics service. This cookie is used to distinguish unique users by assigning a randomly generated number as a client identifier. It is included in each page request in a site and used to calculate visitor, session and campaign data for the sites analytics reports.

 

__hssc
More info

.callcenterstudio.com

/

First-party

30 minutes

This cookie name is associated with websites built on the HubSpot platform. It is reported by them as being used for website analytics.

 

_gid
More info

.callcenterstudio.com

/

First-party

1 day

This cookie is set by Google Analytics. It stores and update a unique value for each page visited and is used to count and track pageviews.

 

Targeting Cookies

Cookie key

Domain

Path

Cookie type

Expiration

Description

_gcl_au
More info

.callcenterstudio.com

/

First-party

3 months

Used by Google AdSense for experimenting with advertisement efficiency across websites using their services

 

_gat_gtag_UA_154577974_1
More info

.callcenterstudio.com

/

First-party

1 minute

This cookie is part of Google Analytics and is used to limit requests (throttle request rate).

 

lidc
More info

.linkedin.com

/

Third-party

1 day

This is a Microsoft MSN 1st party cookie that ensures the proper functioning of this website.

 

UserMatchHistory
More info

.linkedin.com

/

Third-party

1 month

This cookie is used to track visitors so that more relevant ads can be presented based on the visitor’s preferences.

 

bscookie
More info

.www.linkedin.com

/

Third-party

1 year

Used by the social networking service, LinkedIn, for tracking the use of embedded services.

 

IDE
More info

.doubleclick.net

/

Third-party

1 year

This cookie is set by Doubleclick and carries out information about how the end user uses the website and any advertising that the end user may have seen before visiting the said website.

 

bcookie
More info

.linkedin.com

/

Third-party

1 year

This is a Microsoft MSN 1st party cookie for sharing the content of the website via social media.

 

Functionality Cookies

Cookie key

Domain

Path

Cookie type

Expiration

Description

hubspotutk
More info

.callcenterstudio.com

/

First-party

6 months

This cookie name is associated with websites built on the HubSpot platform. HubSpot report that its purpose is user authentication. As a persistent rather than a session cookie it cannot be classified as Strictly Necessary.

 

lang
More info

.ads.linkedin.com

/

Third-party

Session

There are many different types of cookies associated with this name, and a more detailed look at how it is used on a particular website is generally recommended. However, in most cases it will likely be used to store language preferences, potentially to serve up content in the stored language.

 

lang
More info

.linkedin.com

/

Third-party

Session

There are many different types of cookies associated with this name, and a more detailed look at how it is used on a particular website is generally recommended. However, in most cases it will likely be used to store language preferences, potentially to serve up content in the stored language.

 

Unclassified Cookies

Cookie key

Domain

Path

Cookie type

Expiration

Description

crmcsr
More info

support.callcenterstudio.com

/

First-party

Session

 

 

ln_or
More info

.callcenterstudio.com

/

First-party

1 day

 

 

events_distinct_id
More info

www.g2.com

/

Third-party

Session

 

 

a64cedc0bf
More info

support.callcenterstudio.com

/

First-party

Session

 

 

_lscache_vary
More info

callcenterstudio.com

/

First-party

2 days

 

 

_zcsr_tmp
More info

support.callcenterstudio.com

/

First-party

Session

 

Contact Information

If you have any questions or concerns regarding this Cookie Policy, please contact us at GDPR@callcenterstudio.com

Data Protection Policy - EU GDPR

Data Protection Statement for Call Center Studio

The controllers as per the EU General Data Protection 

Regulation (“GDPR”) are:

Call Center Studio:

Locations: TURKEY
AloTech/ TURKEY
(Head Quarter)
Dumlupınar Mahallesi Yumurtacı
Abdi Bey Caddesi Nuhoğlu
Yenitepe Projesi No:4
A Blok Daire 207, 34720
Kadıköy/İstanbul, Turkey
Website: https://callcenterstudio.com/
E-Mail: GDPR@callcenterstudio.com
General Manager: Mr. Cenk SOYAK

AloTech (Technopark Office – Branch office)
YTÜ Davutpaşa Kampüsü Teknoloji Geliştirme Bölgesi
Ar-Ge 1 Binası, B Blok Zemin Kat No: 2 Esenler,
34220 İstanbul, Türkiye
Website: https://callcenterstudio.com/
E-Mail: GDPR@callcenterstudio.com

Locations: United States of America 

(Subsidiary Office of Call Center Studio)

Call Center Studio, Inc.
651 N Broad Street, Suite 206
Middletown, 19709, New Castle
Website: https://callcenterstudio.com
E-Mail: GDPR@callcenterstudio.com
General Manager: Mr. Cenk SOYAK

Call Center Studio, Inc.
(Branch Office)
1 East Erie St. Suite 525 PMB
4651, Chicago, IL, 60611
Website: https://callcenterstudio.com
E-Mail: GDPR@callcenterstudio.com

Representative of Call Center Studio Inc.:
Representative of Call Center Studio S.R.L: Mr. Cenk SOYAK
Bucharest Sector 4, Strada PANSELELOR,
No. 6, O CAMERĂ, Block 142, Staircase 2,
Floor 4, Apt. 76, Bucharest, Romania
Website: https://callcenterstudio.ro
E-Mail: GDPR@callcenterstudio.com
Trade Register: J40/15090/2021


Data Protection Officer of Call Center Studio Inc.:

Path Düsseldorf GmbH
Certified DPO: Kemal Hakan Hasserbetci
Lise-Meitner Strasse No: 6
40878 Ratingen, Germany
E-Mail: h.hasserbetci@pathdusseldorf.de & hakan@pathdusseldorf.com
General Manager: Kemal Hakan Hasserbetci
HRB 74806 Düsseldorf

Steuer Nr.: 147/5857/1411
USt-IdNr.: DE300087677

What is GDPR (General Data Protection Regulation)

The General Data Protection Regulation (GDPR) was approved by the European Commission (EC) on 27 April 2016 and becomes law on 25 May 2018. It replaces the previous European Commission legislation which dealt with data protection, which was the Data Protection Directive of 1995, and one of the major differences between the GDPR and the previous law is that the GDPR is a Regulation rather than a Directive. This means that it automatically becomes law in each of the countries that make up the European Union without each of these countries needing to create their own, individual laws (in contrast with the previous Directive where, in each of the member states, a separate Data Protection Act had to be passed by the relevant state legislative body to enact it).

The GDPR document itself is eighty-eight pages long and consists of two main parts:

  • Recitals – 173 numbered paragraphs that lay out the principles and intentions of the Regulation; if you like, the background.

  (The Recitals are important because they provide additional   

   details and insight into the purpose and functions of the

    Articles.)

  • Articles – the 99 sections that set out the detail of the Regulation – this is the part that must be complied with.

GDPR concerns the personal data of EU citizens wherever that data is held. This means that if your organisation is not based in the European Union but has customers (or suppliers or other parties) within it whose data you hold, the GDPR applies to you.

Leading on from this, it means that if your organisation doesn’t look after that data in the

way the GDPR requires, your organisation may be subject to the penalties that the

Regulation allows. If you do experience a breach of personal data, you have no choice but

to tell the relevant supervisory authority about it. Keeping a serious data breach to

yourself is no longer an option. But the mainstay of what the GDPR is about is forcing

organisations to take the protection of the personal data of EU citizens seriously.

  1. Aim and Scope of our Policy

We hereby thank and appreciate you for visiting our website and your interest in our services we offer all around the world including EU, US, Middle East & APAC. The websites and our unique offerings are designed and done available by the companies in Call Center Studio as mentioned above.

We are 100 % committed to protecting your personal data. In this Privacy policy, we clearly underline how we collect your personal data that means for which purposes we do, what we do with your personal data and naturally what rights you as data subjects have based on what legal grounds, steps we according to GDPR have to take and to protect your personal data and choices you are provided with respect to the use of your personal data. We take your privacy into consideration since Your privacy is so important not only to our management but also all the company colleagues, and the third parties who are acting as our processors and sub processors.

As a matter of fact, that We use your personal information only to manage your customer account / profile, to provide the services you order, to keep you informed about our services, in case you have consented. The protection, confidentiality and integrity of your personal information is very much important to each member of our organisation.

Our Data Protection Notice clarifies a unique approach to any Personal Data which may be collected from you by us and the purpose of processing your Personal Data as a data Controller of our clients and 3rd party partners and as a data processor of clients’ customers. As a Data Processor, we process End customer Data of our clients on behalf of our clients who are named as Data Controllers in GDPR. The personal data transferred from sender to receiver in general might be named as all electronic data, messages sent by clients and received by Call Center Studio. Some of your personal Data either is processed by us and or by our processors and sub processors.

In our platform called Call Center Studio designed and offered to our clients, some available embedded services also include processing of personal data on behalf of our clients who are data controllers of their end customers, related with applications and tools where CCS platform offers. As we are not acting as Data Controller of the hosted data, and we are only the one named Data Processor according to GDPR and our clients called Data Controller define the purposes of the processing.

We make a commitment to ensure that personal data of our website visitors are processed in line with GDPR, and domestic laws and all visitors conduct themselves in line with this, and other related policies. Where third parties process data on behalf of us, we will ensure that the third party takes such measures in order to maintain our commitment to protecting data. In line with GDPR, we understand that it will be accountable for the processing, management and regulation, and storage and retention of all personal data held in the form of manual records and on computers.

“Personal data” is information that relates to an identifiable person who can be directly or indirectly identified from that information, for example, a person’s name, identification number, location, online identifier. It can also include pseudonymised data.

“Special categories of personal data” is data which relates to an individual’s health, sex life, sexual orientation, race, ethnic origin, political opinion, religion, and trade union membership. It also includes genetic and biometric data (where used for ID purposes).

“Data processing” is any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.

This website is not designed or intended for use by children under the age of 16. We do not knowingly collect any Personal Data from anyone under the age of 16 without the prior, verifiable consent of a parent or guardian. Such parent or guardian may have the right, upon request, to view the information provided by the child and require that it be deleted. Moreover, all minors should seek their parent’s or guardian’s permission prior to using or disclosing any Personal Data on this website or online resource.

  • Personal Data

Personal Data: Any kind of information can be personal data provided that it relates to an identified or identifiable person.  Personal data covers information pertaining to the private life of a person, which also includes professional activities, as well as information about his or her public life.  Under EU law, information contains data about a person if

  • an individual is identified or identifiable by this information; or
  • an individual, although not identified, can be singled out by this information in a way which makes it possible to find out who the data subject is by conducting further research.

 

Data Subject 

Data Subject: Under EU law, natural persons are the only beneficiaries of data protection rules (Article 1) and only living beings are protected under European data protection law (Recital 27. See also Article 29 Working Party (2007), Opinion 4/2007 on the concept of personal data, WP 136, 20 June 2007, p. 22.)  The General Data Protection Regulation (GDPR) defines personal data as any information relating to an identified or identifiable natural person.

Both types of information are protected in the same manner under European data protection law. Direct or indirect identifiability of individuals requires continuous assessment, “taking into consideration the available technology at the time of the processing and technology developments”. (General Data Protection Regulation, Recital 26.)

The GDPR stipulates that a natural person is identifiable when he or she “can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that person” (General Data Protection Regulation, Art. 4 (1)

Data Subject Rights

Data Subject Rights in general: Every data subject has the right to information about processing of his or her personal data by a data controller, with limited exceptions.

Data subjects shall have the right to access their own data and obtain certain information about the processing. they have their data rectified by the controller processing their data. If the data are inaccurate, the controller erase their data, as appropriate, if the controller is processing their data illegally, they have the right to temporarily restrict processing, they have their data ported to another controller under certain conditions. Additionally, data subjects shall have the right to object to processing on: grounds relating to their particular situation he uses of their data for direct marketing purposes.

Data subjects have the right not to be subject to decisions based solely on automated processing, including profiling, that have legal effects or that significantly affect them. Data subjects also have the right to obtain human intervention on the part of the controller, express their point of view and contest a decision based on automated processing. If you have given us your consent, you can revoke it at any time with effect for the future.

You can contact your local supervisory authority at any time with a complaint. Your local supervisory authority depends on your state of residence, your work, or the alleged infringement. A list of supervisory authorities (for the non-public sector) and their addresses can be found. at: https://www.bfdi.bund.de/DE/Infothek/Anschriften_Links/anschriften_links-node.html.

Data protection principles

All personal data obtained and held by us will:

  • be processed fairly, lawfully and in a transparent manner
  • be collected for specific, explicit, and legitimate purposes
  • be adequate, relevant, and limited to what is necessary for the purposes of processing
  • be kept accurate and up to date. Every reasonable effort will be made to ensure that inaccurate data is rectified or erased without delay
  • not be kept for longer than is necessary for its given purpose
  • be processed in a manner that ensures appropriate security of personal data including protection against unauthorised or unlawful processing, accidental loss, destruction, or damage by using appropriate technical or organisation measures
  • comply with the relevant GDPR procedures for international transferring of personal data.

In addition, personal data will be processed in recognition of an individuals’ data protection rights, as follows:

  • the right to be informed
  • the right of access
  • the right for any inaccuracies to be corrected (rectification)
  • the right to have information deleted (erasure)
  • the right to restrict the processing of the data
  • the right to portability
  • the right to object to the inclusion of any information
  • the right to regulate any automated decision-making and profiling of personal data.

Data Processing 

We process personal data of our users only insofar as this is necessary to provide a functioning website and our content and services. The processing of personal data of our users takes place regularly only with the consent of the user. An exception applies to cases in which prior consent cannot be obtained for reasons of fact and the processing of the data is permitted by law.

We use the personal information as collected during your visit to our websites to make using them as convenient as possible for you and to protect our IT systems against attacks and other unlawful activities.

In case you share additional information with us – for example, by filling out a registration form, contact form we will use that information for the designated purposes. we use personal data to the extent that we are legally obliged to do so.

Your personal data will not be passed to third parties for purposes other than those mentioned. We will only pass on your personal data to third parties if:

  • you have given your express consent,
  • the processing is necessary to process a contract with you,
  • the processing is necessary to fulfil a legal obligation,

the processing is necessary to protect legitimate interests and there is no reason to believe that you have an overriding interest worthy of protection in not disclosing your data.

Insofar as we obtain the consent of the data subject for processing of personal data, Art. 6 para. 1 lit. a EU General Data Protection Regulation (GDPR) as legal basis.

In the processing of personal data necessary for the performance of a contract of which the data subject is a party, Art. 6 para. 1 lit. b GDPR as legal basis. This also applies to processing operations required to carry out pre-contractual actions.

Insofar as processing of personal data is required to fulfil a legal obligation that is subject to our company, Art. 6 para. 1 lit. c GDPR as legal basis. If processing is necessary to safeguard the legitimate interests of our company or a third party, and if the interests, fundamental rights and freedoms of the data subject do not prevail over the first interest, Art. 6 para. 1 lit. f GDPR as legal basis for processing.

The personal data of the data subject will be deleted or blocked as soon as the purpose of the storage is deleted. It may also be stored if provided for by the European or national legislator in EU regulations, laws or other regulations to which the controller is subject. Blocking or deletion of the data also takes place when a storage period prescribed by the standards mentioned expires unless there is a need for further storage of the data for conclusion of a contract or fulfilment of the contract.

Regarding Processing of data outside the EU / the EEA, your data will in part also be processed in countries outside the European Union (“EU”) or the European Economic Area (“EEA”), which may have a lower data protection level than European countries. In such cases, we will ensure that a sufficient level of protection is provided for your data, e.g. by concluding specific agreements with our contractual partners (copy available on request), or we will ask for your explicit consent to such processing.

Regarding use of Data Marketing, we never sell or transfer your Personal Data to any non-affiliated entity for their own direct marketing use unless we provide clear notice to you and obtain your explicit consent. If you would like more information about this practice and your choices to opt out of having this information, see our cookies policy.

Records

We keep records of its processing activities including the purpose for the processing and retention periods in our HR Data Record. These records will be kept up to date so that they reflect current processing activities.

Access to data

Our visitors have a right to be informed whether we process personal data relating to them and to access the data that we hold about them. Requests for access to this data will be dealt very carefully and based on the GDPR.

Our visitors can inform us immediately if they believe that the data is inaccurate, either as a result of a subject access request or otherwise. We will take immediate steps to rectify the information.

Data security 

We adopt procedures designed to maintain the security of data when it is stored and transported.

  • All files or written information of a confidential nature are stored in a secure manner and are only accessed by people who have a need and a right to access them
  • All files or written information of a confidential nature are not left where they can be read by unauthorised people
  • We check regularly on the accuracy of data being entered into computers
  • We always use the passwords provided to access the computer system and not abuse them by passing them on to people who should not have them
  • We use computer screen blanking to ensure that personal data is not left on screen when not in use.

Personal data relating to our visitors should not be kept or transported on laptops, USB sticks, or similar devices.

We store your IP address and the name of your Internet service provider for seven days. This is for security reasons; in particular, to prevent and detect attacks on our websites or attempts at fraud.

Deleting your personal data

IP address of our visitors, which we store for security purposes, will be deleted after seven days. We delete your personal information as soon as the purpose that it was collected for and, processed has been fulfilled.

International data transfers

We do not transfer any personal data which has been collected in EU to any recipients outside of the EU through the Call Center Studio Platform.

Personal Data Breach notification

Where a data breach is likely to result in a risk to the rights and freedoms of individuals, it will be reported to the Information Commissioner within 72 hours of the Company becoming aware of it and may be reported in more than one instalment.

Individuals will be informed directly in the event that the breach is likely to result in a high risk to the rights and freedoms of that individual.

If the breach is sufficient to warrant notification to the public, we will do so without undue delay.

Provision of the website and creation of log files When you visit our website

When you access our website, information of a general nature is automatically collected by means of a cookie. This information (in the form of server log files) includes the type of web browser, the operating system used, the domain name of your internet service provider and similar information. This is exclusively information which does not allow any conclusions to be drawn about your person.

This information is technically necessary in order to correctly deliver the content you have requested from websites and is mandatory when using the internet. They are processed in particular for the following purposes:

  • ensuring a trouble-free connection of the website,
  • ensuring smooth use of our website,
  • evaluating system security and stability as well as
  • for other administrative purposes.

 

Whenever you visit our websites, we keep some information about the browser and operating system you are using; the date and time of your visit; the usage of features on the website; how often you visit individual websites; the names of the files you access; the amount of data transferred; the Web page from which you accessed our website; whether by clicking links on our websites or entering a domain directly into the input field of the same tab (or window) of the browser in which you have our websites open.

According to GDPR, IP addresses are considered personally identifiable information (PII) and we are using Google Fonts embedded on our site. Our website stores the fonts on Call Center Studio’s assigned server on cloud and loads it locally as Google is not involved in the loading process and the IP address is transmitted to Google, basically meaning our website can host the fonts locally without violating GDPR.

The processing of your personal data is based on our legitimate interest from the aforementioned purposes for data collection. We do not use your data to draw conclusions about you personally. The recipients of the data are only the Data Controller and, if applicable, the contract processor.

The temporary storage of the IP address by the system is necessary to allow delivery of the website to the computer of the user. To do this, the user’s IP address must be kept for the duration of the session.

Storage in log files is done to ensure the functionality of the website. In addition, the data is used to optimise the website and to ensure the security of our information technology systems. An evaluation of the data for marketing purposes does not take place in this context.

For these purposes, our legitimate interest in the processing of data pursuant to Art. 6 para. 1 lit. f GDPR.

The data will be deleted when it is no longer necessary for the purpose of its collection. In the case of collecting the data for providing the website, this is the case when the respective session is completed.

In the case of storing the data in log files, this is the case after no more than seven days. An additional storage is possible. In this case, the IP addresses of the users are deleted or alienated, so that an assignment of the calling client is no longer possible.

The collection of data for the provision of the website and the storage of the data in log files is essential for the operation of the website. There is consequently no contradiction on the part of the user.

Whenever you visit our websites, we store certain information about the browser and operating system you are using; the date and time of your visit; the status of the interaction (e.g. whether you were able to access the website or received an error message); the usage of features on the website; any search phrases you entered; how often you visit individual websites; the names of the files you access; the amount of data transferred; the Web page from which you accessed our website; and the Web page you visited after visiting our website, whether by clicking links on our websites or entering a domain directly into the input field of the same tab (or window) of the browser in which you have our websites open. In addition, we store your IP address and the name of your Internet service provider for seven days. This is for security reasons; in particular, to prevent and detect attacks on our websites or attempts at fraud. 

How to use cookies

Like many other websites, we use cookies on our site. These are small files that your browser automatically creates and that are stored on your device (laptop, tablet, smartphone, etc.) when you visit our site. Cookies do not harm your device, do not contain viruses, Trojans or other malicious software. Cookies automatically provides us with certain data, such as your IP address, browser, operating system and internet connection.

Using the information contained in cookies enables us to make it easier for you to navigate our web pages and to display them correctly.

The data processed by cookies are for the purposes mentioned in order to safeguard our legitimate interests as well as third parties according to Art. 6 para. 1 sentence 1 lit. f GDPR required.

Most browsers accept cookies automatically. However, you can configure your browser so that no cookies are stored on your computer or always a hint appears before a new cookie is created. However, disabling cookies completely may mean that you cannot use all features of our website.

We will never pass the data collected by us to third parties or make any connection with personal data without your permission.

If you wish, you can use our website without cookies. Internet browsers are usually set up to accept cookies. In general, you can deactivate the use of cookies at any time via the settings of your browser. Please use your internet browser’s help functions to find out how you can change these settings. Please note that some features of our website may not work if you have disabled the use of cookies. Please click our Cookies Policy in detail

What personal information do we collect?

We require certain personal information in order to provide you with this service.  You enter some of this data in our websites and or directly by email, fax or by Post.  If you become our partner or customer, then we will create an account in our files.

We receive some of your personal information indirectly from your devices by recording how you interact with our services (such as through cookies) and we also obtain your data as you share using the following omni channels:

Fax, email, Telephone, social network, CCS website,

As a matter of fact, that we process the following details you shared with us under your permission:

  • first and last name
  • Salutation (Mr, Mrs, no salutation, title);
  • E-mail address
  • Telephone number
  • Reason for Contact
  • IP address

Our website has a contact form available, which can be used as electronic contact. If you enter your Data, the data entered in the input mask will be transmitted to us and saved.

At the time of sending the message, the following data is also stored:

(1) Time to fill out the form

(2) User Agent of the sender

(3) Date and time

For the processing of the data in the context of the sending process your consent is obtained and referred to this privacy statement.

Alternatively, contact via the provided email address is possible. In this case, the user’s personal data transmitted by e-mail will be stored.

In this context, there is no disclosure of the data to third parties. The data is used exclusively for processing the conversation.

Legal basis for the processing of the data is in the presence of the consent of the user Art. 6 para. 1 lit. a GDPR.

The legal basis for the processing of the data transmitted in the course of sending an email is Article 6 (1) lit. f GDPR. If the e-mail contact aims to conclude a contract, then additional legal basis for the processing is Art. 6 para. 1 lit. b GDPR.

The processing of the personal data from the input mask serves us only to process the contact. In the case of contact via email, this also includes the required legitimate interest in the processing of the data.

The other personal data processed during the sending process serve to prevent misuse of the contact form and to ensure the security of our information technology systems.

The data will be deleted as soon as it is no longer necessary for the purpose of its collection. For the personal data from the input form of the contact form and those sent by email, this is the case when the respective conversation with the user has ended. The conversation is ended when it can be inferred from the circumstances that the relevant facts have been finally clarified.

The additional personal data collected during the sending process will be deleted at the latest after a period of seven days.

Opposition and removal possibility

The user has the possibility at any time to revoke his consent to the processing of the personal data. If the user contacts us by email, he may object to the storage of his personal data at any time. In such a case, the conversation cannot continue.

All personal data stored in the course of contacting will be deleted in this case.

Changes to our privacy policy

We reserve the right to adapt this privacy policy to ensure that it always complies with current legal requirements or to implement changes to our services in the privacy policy, e.g., when introducing new services. The new privacy policy will then apply for your next visit.

Questions and complaints

If you have any questions or concerns about the way we use your personal information, please contact our Data Protection Officer: Mr. K. Hakan Hasserbetci, GDPR@callcenterstudio.com

Agreements

DPA (Data Processing Agreement)

This Call Center Studio Data Processing Agreement and its Annexes (“DPA”) reflects the parties’ agreement with respect to the Processing of Personal Data by Call Center Studio on behalf of Customer.

This DPA is supplemental to, and forms an integral part of, the Agreement and is effective upon its incorporation into the Agreement, which incorporation may be specified in the Agreement, an Order or an executed amendment to the Agreement. In case of any conflict or inconsistency with the terms of the Agreement, this DPA shall take precedence over the terms of the Agreement to the extent of such conflict or inconsistency.

We periodically update these terms. If you have an active Call Center Studio subscription, we will let you know when we do via email (if you have subscribed to receive email notifications via the link in our Agreement) or via in-app notification. 

The term of this DPA shall follow the term of the Agreement. Terms not otherwise defined herein shall have the meaning as set forth in the Agreement.

Call Center Studio are committed to protecting the personal data of its employees, customers, suppliers and other stakeholders and to ensuring its compliance with all relevant legislation. As part of its business, Call Center Studio relies upon a number of third party organisations to assist in providing a high level of service to its customers, in reaching new markets, and in looking after its employees, amongst a wide range of other activities.

The European Union (EU) General Data Protection Regulation  (GDPR) places obligations on a controller of personal data to ensure the protection of that data when they are processed by a third party i.e. a processor. In forming a controller/processor relationship, the GDPR is quite specific about the fact that a contractual agreement must be in place between the two parties, and that it should specify key items of information about the personal data involved and how it is processed.

It is a requirement of all existing and new contractual agreements between Clients of Call Center Studio and their third parties where personal data is shared or processed, that specific information is detailed, and data protection-related contract terms are included. The contract must be legally binding on the processor for it to be compliant.

Information to be specified according to the following information about the processing of personal data must be included in each contract for it to be GDPR-compliant:

  • SUBJECT MATTER AND DURATION OF THE PROCESSING
  • NATURE AND PURPOSE OF THE PROCESSING
  • TYPE OF PERSONAL DATA AND CATEGORIES OF DATA SUBJECTS
  • OBLIGATIONS AND RIGHTS OF THE CONTROLLER
 

Contractual Terms to be Included according to requirements that the controller specify a set of minimum terms related to data protection in the contract.

Letter to Subprocessor about its Readiness for the GDPR and details of processing that includes the following:

  • Nature and Purpose of Processing 
  • Duration of Processing 
  • Categories of Data subjects
  • Categories of Personal Data 
  • Special categories of data (in case of processed)
  • Processing operations
 

Security measures need to be defined and to be implemented based on the following factors:

  • Access Control
  • Transmission Control
  • Input Control
  • Availability Control

Policies

– GDPR Access Control Policy
– GDPR Breach Notification Policy
– GDPR Records Retention and Protection Policy
– GDPR Use of Encryption and Encryption Management Policy
– GDPR Subject Access Request Policy
– GDPR Data Subject Rights Policy
– Information Security Policy
– GDPR Data protection Impact Assessment Policy
– Data Protection Anonymisation and Pseudonymisation Policy

GDPR Access Control Policy

Call Center Studio define rules to access to various systems, facilities, equipments and information according to business and security requirements. The basic principle is that access to all systems, networks, services and information is forbidden, unless expressly permitted to individual users or groups of users.  There should be a user registration procedure for each system and service.  Access to all physical areas in the organisation is allowed, except to areas for which privilege must be granted by the authorised person (item “Privilege management”). We define various user profiles with access rights using the terminology of “Name of system, network, service and corresponding user rights with job titles. 

We classify the privilege management based on the methodology underlying “who is authorised for accepting or declining access rights as well as form of authorization process. 

Regular review of access rights is implemented based on the name of system, network service, physical area for the intervals for regular reviews. As strongly stated in GDPR, each review has to be recorded. 

Change of status or cancellation of contract is one of the key elements in access control policy. Whenever any change in employment or cancellation of employment occurs, Responsible person must definitely inform the persons who approved privileges for the employee.

In case of termination on contract of an employment, contracts must immediately be removed or changed by the responsible person. 

Technical installation/implementation of the allocation or removal of access is carried out by assigned responsible persons. 

User Password monitoring and management is another important key element needs to be considered as rules: 

  • by signing the Statement of Acceptance of the Documents, users also accept the obligation to keep passwords confidential, as prescribed by this document
  • each user may use only his/her own uniquely allocated username
  • each user must have the option to choose his/her own password, where applicable
  • the temporary password used for first system log-on must be unique and strong, as described above
  • temporary passwords must be communicated to the user in a secure manner, and user’s identity must be checked.
  • the password management system must require the user to change the temporary password at first log-on to the system 
  • the password management system must require the user to select strong passwords
  • the password management system must require the users to change their passwords every three months
  • if the user requests a new password, the password management system must determine the identity of the user.
  • the user has to confirm the receipt of the password.
  • the password must not be visible on the screen during log-on
  • if a user enters an incorrect password three consecutive times, the system must block the user account in question
  • passwords created by the software or hardware manufacturer must be changed during initial installation files containing passwords must be stored separately from the application’s system data 
 

GDPR Breach Notification Policy 

Breach notification policy is one of the Organisational measures where Call Center Studio met and implemented.

According to article 33: 

1.In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification to the supervisory authority is not made within 72 hours, it shall be accompanied by reasons for the delay.

  1. The processor shall notify the controller without undue delay after becoming aware of a personal data breach.
  2. The notification referred to in paragraph 1 shall at least: 

(a) describe the nature of the personal data breach including where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of personal data records concerned; 

(b) communicate the name and contact details of the data protection officer or other contact point where more information can be obtained; 

(c) describe the likely consequences of the personal data breach; 

(d) describe the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects.

4.Where, and in so far as, it is not possible to provide the information at the same time, the information may be provided in phases without undue further delay.

5.The controller shall document any personal data breaches, comprising the facts relating to the personal data breach, its effects and the remedial action taken. That documentation shall enable the supervisory authority to verify compliance with this Article.

According to article 34: 

1.When the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall communicate the personal data breach to the data subject without undue delay. 

2.The communication to the data subject referred to in paragraph 1 of this Article shall describe in clear and plain language the nature of the personal data breach and contain at least the information and measures referred to in points (b), (c) and (d) of Article 33(3).

  1. The communication to the data subject referred to in paragraph 1 shall not be required if any of the following conditions are met:

(a) the controller has implemented appropriate technical and organisational protection measures, and those measures were applied to the personal data affected by the personal data breach, in particular those that render the personal data unintelligible to any person who is not authorised to access it, such as encryption; 

(b) the controller has taken subsequent measures which ensure that the high risk to the rights and freedoms of data subjects referred to in paragraph 1 is no longer likely to materialise; 

(c) it would involve disproportionate effort. In such a case, there shall instead be a public communication or similar measure whereby the data subjects are informed in an equally effective manner.

4.If the controller has not already communicated the personal data breach to the data subject, the supervisory authority, having considered the likelihood of the personal data breach resulting in a high risk, may require it to do so or may decide that any of the conditions referred to in paragraph 3 are met.

The controller retains overall responsibility for the protection of personal data, but the processor has an important role to play to enable the controller to comply with its obligations; and this includes breach notification. Indeed, Article 28(3) GDPR specifies that the processing by a processor shall be governed by a contract or other legal act. Article 28(3)(f) states that the contract or other legal act shall stipulate that the processor “assists the controller in ensuring compliance with the obligations pursuant to Articles 32 to 36 taking into account the nature of processing and the information available to the processor”.

Article 33(2) GDPR makes it clear that if a processor is used by a controller and the processor becomes aware of a breach of the personal data it is processing on behalf of the controller, it must notify the controller “without undue delay”. It should be noted that the processor does not need to first assess the likelihood of risk arising from a breach before notifying the controller; it is the controller that must make this assessment on becoming aware of the breach. The processor just needs to establish whether a breach has occurred and then notify the controller. The controller uses the processor to achieve its purposes; therefore, in principle, the controller should be considered as “aware” once the processor has informed it of the breach. The obligation on the processor to notify its controller allows the controller to address the breach and to determine whether or not it is required to notify the supervisory authority in accordance with Article 33(1) and the affected individuals in accordance with Article 34(1). The controller might also want to investigate the breach, as the processor might not be in a position to know all the relevant facts relating to the matter, for example, if a copy or backup of personal data destroyed or lost by the processor is still held by the controller. This may affect whether the controller would then need to notify. 

The GDPR does not provide an explicit time limit within which the processor must alert the controller, except that it must do so “without undue delay”. Therefore, the EDPB recommends the processor promptly notifies the controller, with further information about the breach provided in phases as more details become available. This is important in order to help the controller to meet the requirement of notification to the supervisory authority within 72 hours. 

As is explained above, the contract between the controller and processor should specify how the requirements expressed in Article 33(2) should be met in addition to other provisions in the GDPR. This can include requirements for early notification by the processor that in turn support the controller’s obligations to report to the supervisory authority within 72 hours. 

Where the processor provides services to multiple controllers that are all affected by the same incident, the processor will have to report details of the incident to each controller. 

A processor could make a notification on behalf of the controller, if the controller has given the processor the proper authorisation and this is part of the contractual arrangements between controller and processor. Such notification must be made in accordance with Article 33 and 34 GDPR. However, it is important to note that the legal responsibility to notify remains with the controller. 

 

GDPR Records Retention and Protection Policy

Call Center Studio collects and stores records of many types and in a variety of different formats. 

It is important that these records are protected from loss, destruction, falsification, unauthorised access and unauthorised release and a range of controls are used to ensure this, including backups, access control and encryption.

Call Center Studio also has a responsibility to ensure that it complies with all relevant legal, regulatory and contractual requirements in the collection, storage, retrieval and destruction of records based on the European Union General Data Protection Regulation (GDPR) and its requirements concerning the storage and processing of personal data.

This control applies to all systems, people and processes that constitute the organisation’s information systems, including board members, directors, employees, suppliers and other third parties who have access to Call Center Studio systems. 

According to principles underlined below, we have adopted when taking into consideration of record retention and protection policy:

  • Records must be held in compliance with all applicable legal, regulatory and contractual requirements
  • Records must not be held for any longer than needed.
  • The protection of records in terms of their confidentiality, integrity and availability must be in accordance with their security classification
  • Records must remain retrievable in line with business requirements at all times

We categorised the record as underlined below:

  • Accounting
  • Budgeting and forecasting
  • System Transaction logs
  • Audit Logs
  • Operational Procedures
  • Customer
  • Supplier
  • Human Resources 

Each record category has the following information:

  • Retention Period
  • Why this period is defined?
  • Allowable Storage media on servers and on cloud

Each Group of companies separately focus on the following key parameters in the policy:

  • Cryptography
  • Media
  • Record Retrieval
  • Record Destruction
  • Record Review
 

GDPR Use of Encryption and Encryption Management Policy

Encryption and Encryption Management is one of the key organisational measures which a group of companies has implemented. 

We established the rules for acceptable use of encryption technologies. This policy applies to individuals responsible for the set up or maintenance of Call Center Studio. Those responsibilities in the GDPR  training program, have been given to all personnel of a group of companies by appointed Data Protection Officer.

According to agreed policy, below will summarise the key elements of it.   

  •       All encryption technologies and techniques used by Call Center Studio must be approved by Call Center Studio IT Management.
  •       Call Center Studio IT Management is responsible for the distribution and management of all encryption keys, other than those managed by Call Center Studio customers.
  •       All use of encryption technology should be managed in a manner that permits properly designated Call Center Studio personnel to promptly access all data, including for purposes of investigation and business continuity.
  •       Only encryption technologies that are approved, managed, and distributed by Call Center Studio IT may be used in connection with Call Center Studio Information Resources, other than those managed by Call Center Studio customers.
  •       Call Center Studio IT Management will create and publish the Call Center Studio Encryption Standards, which must include, at a minimum:

o   The type, strength, and quality of the encryption algorithm required for various levels of protection.

o   Key lifecycle management, including generation, storing, archiving, retrieving, distributing, retiring, and destroying keys. 

  •       All Call Center Studio information classified as confidential must be encrypted when:

o   Transferred electronically over public networks.

o   Stored on mobile storage devices.

o   Stored on laptops or other mobile computing devices.

o   At rest.

  •       The use of proprietary encryption algorithms is not permitted, unless approved by Call Center Studio IT Management
  •       The use of encryption for any data transferred outside of the United States must be formally approved by Call Center Studio IT Management prior to transfer
 

GDPR Subject Access Request Policy

According to GDPR, Data Subjects of Call Center Studio have an absolute right to receive confirmation that an we process their personal data and also right to access that data so that they may be aware of it and are able to verify the lawfulness of the processing. The process is called a subject access request.

Call Center Studio as the controller shall take appropriate measures to provide any information referred to in Articles 13 and 14 and any communication under Articles 15 to 22 and 34 relating to processing to the data subject in a concise, transparent, intelligible and easily accessible form, using clear and plain language, in particular for any information addressed specifically to a child. The information shall be provided in writing, or by other means, including, where appropriate, by electronic means. When requested by the data subject, the information may be provided orally, provided that the identity of the data subject is proven by other means. 

Call Center Studio as the controller shall facilitate the exercise of data subject rights under Articles 15 to 22. In the cases referred to in Article 11(2), the controller shall not refuse to act on the request of the data subject for exercising his or her rights under Articles 15 to 22, unless the controller demonstrates that it is not in a position to identify the data subject. 

Call Center Studio as the controller shall provide information on action taken on a request under Articles 15 to 22 to the data subject without undue delay and in any event within one month of receipt of the request. That period may be extended by two further months where necessary, taking into account the complexity and number of the requests. The controller shall inform the data subject of any such extension within one month of receipt of the request, together with the reasons for the delay. Where the data subject makes the request by electronic form means, the information shall be provided by electronic means where possible, unless otherwise requested by the data subject. 

If Call Center Studio as the controller does not take action on the request of the data subject, the controller shall inform the data subject without delay and at the latest within one month of receipt of the request of the reasons for not taking action and on the possibility of lodging a complaint with a supervisory authority and seeking a judicial remedy. 

Information provided under Articles 13 and 14 and any communication and any actions taken under Articles 15 to 22 and 34 shall be provided free of charge. Where requests from a data subject are manifestly unfounded or excessive, in particular because of their repetitive character, the controller may either: 

(a) charge a reasonable fee taking into account the administrative costs of providing the information or communication or taking the action requested; or (b) refuse to act on the request. The controller shall bear the burden of demonstrating the manifestly unfounded or excessive character of the request. 

Without prejudice to Article 11, where the controller has reasonable doubts concerning the identity of the natural person making the request referred to in Articles 15 to 21, the controller may request the provision of additional information necessary to confirm the identity of the data subject. 

The information to be provided to data subjects pursuant to Articles 13 and 14 may be provided in combination with standardised icons in order to give in an easily visible, intelligible and clearly legible manner a meaningful overview of the intended processing. Where the icons are presented electronically, they shall be machine-readable. The Commission shall be empowered to adopt delegated acts in accordance with Article 92 for the purpose of determining the information to be presented by the icons and the procedures for providing standardised icon.

According to Article 15 (Right of Access by the Data Subject),

  1. The data subject shall have the right to obtain from the controller confirmation as to whether or not personal data concerning him or her are being processed, and, where that is the case, access to the personal data and the following information: 

(a) the purposes of the processing; 

(b) the categories of personal data concerned; 

(c) the recipients or categories of recipient to whom the personal data have been or will be disclosed, in particular recipients in third countries or international organisations; 

(d) where possible, the envisaged period for which the personal data will be stored, or, if not possible, the criteria used to determine that period; 

(e) the existence of the right to request from the controller rectification or erasure of personal data or restriction of processing of personal data concerning the data subject or to object to such processing; 

(f) the right to lodge a complaint with a supervisory authority; 

(g) where the personal data are not collected from the data subject, any available information as to their source; 

(h) the existence of automated decision-making, including profiling, referred to in Article 22(1) and (4) and, at least in those cases, meaningful information about the logic involved, as well as the significance and the envisaged consequences of such processing for the data subject. 

  1. Where personal data are transferred to a third country or to an international organisation, the data subject shall have the right to be informed of the appropriate safeguards pursuant to Article 46 relating to the transfer. 
  2. Call Center Studio as the controller shall provide a copy of the personal data undergoing processing. For any further copies requested by the data subject, the controller may charge a reasonable fee based on administrative costs. 

Where the data subject makes the request by electronic means, and unless otherwise requested by the data subject, the information shall be provided in a commonly used electronic form. 

  1. The right to obtain a copy referred to in paragraph 3 shall not adversely affect the rights and freedoms of others.

In order to reply to a request for access and to ensure that none of its aspects might be disregarded, it is necessary first to understand the structure of Art. 15 and the constituent components of the right of access stipulated in this Article.

Art. 15 can be broken down into eight different elements as listed in the table below: 

1.Confirmation as to whether or not the controller is processing personal data concerning the requesting person Art. 15(1), first half of the sentence 
2.Access to the personal data concerning the requesting person Art. 15(1), second half of the sentence (first part) 
3.

Access to the following information on the processing: 

(a) the purposes of the processing;(b) the categories of personal data;(c) the recipients or categories of recipients;   (d) the envisaged duration of the processing or the criteria for determining the duration;(e) the existence of the rights to rectification, erasure, restriction of processing and objection to processing; (f) the right to lodge a complaint with a supervisory authority; (g) any available information on the source of the data, if not collected from the data subject;
(h) the existence of automated decision-making, including profiling and other information relating thereto. 

Art. 15(1), second half of the sentence (second part) 

 

4.Information on safeguards pursuant to Art. 46 where the personal data are transferred to a third country or to an international organisation 

Art. 15(2) 

 

5.The obligation of the controller to provide a copy of the personal data undergoing processing Art. 15(3), first sentence 
6.Charging of a reasonable fee by the controller based on administrative costs for any further copies requested by the data subject 

Art.15(3), second sentence 

 

7.Provision of information in electronic form Art. 15(3), third sentence 
8.Taking into account the rights and freedoms of others Art. 15(4) 

 

GDPR Data Subject Rights Policy

Data Subject Rights  is one of the key organisational measures which a group of companies has implemented. Call Center Studio processes many types of data for HR purposes concerning job applicants, employees, former employees, workers and contractors for various reasons. It is fully aware of its obligations under the General Data Protection Regulation (GDPR) to process data lawfully and to ensure that the rights of data subjects, as set out in GDPR, are observed correctly. 

Under GDPR, you have the following rights in relation to your data:

  •     the right to be informed
  •     the right of access
  •     the right for any inaccuracies to be corrected 
  •     the right to have information deleted 
  •     the right to restrict the processing of the data 
  •     the right to portability
  •     the right to object to the inclusion of any information 
  •     the right to regulate any automated decision-making and profiling of personal data.
  • The right to be informed
 

Data Subjects have the right to be informed how the Call Center Studio processes their data and the reasons for the processing. In order to provide this information to them, Call Center Studio has a privacy notice to explain what data we collect about them, how we collect and process it, what we process it for and the lawful basis which permits us to process it. 

Call Center Studio also has a separate privacy notice applicable to job applicants, available at no cost if requested.

If Call Center Studio intends to use data already collected from them for a different reason than that already communicated, they will be informed of the new reason in advance.

  • The right of access

Data Subjects  have the right to access their personal data which is held by the Call Center Studio.

  • The right for data to be corrected
 

One of the fundamental principles underpinning data protection is that the data Call Center Studio processes about them will be accurate and up to date. They have the right to have their data corrected if it is inaccurate or incomplete.

If they wish to have their data rectified, they should do so by completing the Data Rectification Form.

Call Center Studio will respond to a data rectification request within one month. Where the data rectification request is complex, Call Center Studio may extend the timescale for response from one month to three months. If this is the case, Call Center Studio will write to you within one month of receipt of the request explaining the reason for the extension.

If the response to your request is that Call Center Studio will take no action, they will be informed of the reasons for this and of their right to complain to the Information Commissioner and to a judicial remedy.

Where any data which has been rectified was disclosed to third parties in its unrectified form, Call Center Studio will inform the third party of the rectification where possible. Call Center Studio will also inform them of the third parties to whom the data was disclosed.

  • The right to have information deleted

Data Subjects have the right to have their data deleted and removed from our systems where there is no compelling business reason for Call Center Studio to continue to process it. 

They have a right to have their data deleted in the following circumstances:

  •     where the personal data is no longer necessary in relation to the purpose for which Call Center Studio originally collected or processed it
  •     where they have withdrawn their consent to the continued processing of the data and there is no other lawful basis for Call Center Studio to continue processing the data
  •     where they object to the processing and Call Center Studio has no overriding legitimate interest to continue the processing
  •     the personal data has been unlawfully processed
  •     the personal data has to be deleted due to a legal obligation.

 

If you wish to make a request for data deletion, you should complete the Data Deletion Request form. (Please request if needed)

Upon receipt of a request, Call Center Studio will delete the data unless it is processed for one of the following reasons:

  •     to exercise the rights of freedom of expression and information
  •     for Call Center Studio to comply with a legal requirement
  •     the performance of a task carried out in the public interest or exercise of official authority
  •     for public health purposes in the public interest
  •     archiving purposes in the public interest, scientific historical research or statistical purposes or
  •     the defence of legal claims.

 

Where their request is not complied with because of the one of the above reasons, they will be informed of the reason. Where their request is to be complied with, they will be informed when the data has been deleted.

Where the data which is to be deleted has been shared with third parties, Call Center Studio will inform those third parties where this is possible. However, where this notification will cause a disproportionate effect on the Company, this notification may not be carried out. 

  • The right to restrict the processing of data

They have the right to restrict the processing of your data in certain circumstances. Restricting Call Center Studio from processing your data means that Call Center Studio will continue to hold the data but will stop processing it.

Call Center Studio will be required to restrict the processing of their personal data in the following circumstances:

  •     where they tell Call Center Studio that the data it holds on them is not accurate. Where this is the case, Call Center Studio will stop processing the data until it has taken steps to ensure that the data is accurate
  •     where the data is processed for the performance of a public interest task or because of the Company’s legitimate interests and they have objected to the processing of data. In these circumstances, the processing may be restricted whilst Call Center Studio considers whether its legitimate interests mean it is appropriate to continue to process it
  •     when the data has been processed unlawfully
  •     where Call Center Studio no longer needs to process the data but they need the data in relation to a legal claim.

 

If they wish to make a request for data restriction, they should complete the Data Restriction Request form.

Where data processing is restricted, Call Center Studio will continue to hold the data but will not process it unless:    

  • they consent to the processing
  • processing is required in relation to a legal claim.

 

Where the data to be restricted has been shared with third parties, Call Center Studio will inform those third parties where this is possible. However, where this notification will cause a disproportionate effect on the Company, this notification may not be carried out.

Where Call Center Studio is to lift any restriction on processing, they will be informed in advance.

  • The right to data portability

Data Subjects have the right to obtain the data that Call Center Studio processes on them and use it for their own purposes. This means they have the right to receive the personal data that they have provided to Call Center Studio in a structured machine readable format and to transmit the data to a different data controller. 

This right applies in the following circumstances:

  •     where they have provided the data to the Company
  •     where the processing is carried out because they have given Call Center Studio their consent to do so
  •     where the processing is carried out in order to perform the employment contract between them and the Company
  •     where processing is carried out by automated means.
 

Where a request for data portability is received, Call Center Studio will respond without undue delay, and within one month at the latest. Where the request is complex or Call Center Studio receives a number of requests, Call Center Studio may extend the timescale for response from one month to three months. If this is the case, Call Center Studio will write to you within one month of receipt of the request explaining the reason for the extension. 

Where Call Center Studio is to comply with your request, they will receive the data in a structured and machine readable form. They will not be charged for the provision of this data. Upon request, Call Center Studio will transmit the data directly to another organisation. 

If the response to their request is that Call Center Studio will take no action, they will be informed of the reasons for this and of their right to complain to the Information Commissioner and to a judicial remedy.

The right to portability is different from the right to access. Although both involve a right to access your personal data, the personal data to be accessed is not the same. The right to access your data under the right to portability includes only personal data as described above. Access to data under the right of access includes all personal data relating to you, including that which has not been provided to Call Center Studio by you.

  • The right to object to the inclusion of data 

Data Subjects have a right to object to the processing of your data in certain circumstances. This means that they have the right to require Call Center Studio to stop processing their data. In relation to their employment with the Company, they may object to processing where it is carried out:

  •     in relation to the Company’s legitimate interests 
  •     for the performance of a task in the public interest
  •     in the exercise of official authority or
  •     for profiling purposes.

 

Where they object to processing, Call Center Studio will stop the processing activity objected to unless:

Call Center Studio can demonstrate compelling legitimate reasons for the processing which are believed to be more important than your rights or the processing is required in relation to legal claims made by, or against, the Company.

If the response to their request is that Call Center Studio will take no action, they will be informed of the reasons.

Rights in relation to automated decision making

They have the right not to have decisions made about them solely on the basis of automated decision making processes where there is no human intervention, where such decisions will have a significant effect on them.  However, Call Center Studio does not make any decisions based on such processes.

OR

Call Center Studio currently make decisions about them using automatic system involving no human intervention. They have the right not to have decisions made about them solely on the basis of automated processes where there is no human intervention. 

However, Call Center Studio  may carry out automated decision making with no human intervention in the following circumstances:

  •     when it is needed for entering into or the carrying out of a contract with you
  •     when the process is permitted by law
  •     when you have given explicit consent.

 

In circumstances where we use special category data, for example, data about their health, sex life, sexual orientation, race, ethnic origin, political opinion, religion, and trade union membership Call Center Studio will ensure that one of the following applies to the processing:

  •     you have given your explicit consent to the processing or
  •     The processing is necessary for reasons of substantial public interest.
 

Information Security Policy

Call Center Studio handles sensitive clients information on daily basis. Sensitive Information must have adequate safeguards in place to protect them, to protect clients privacy, to ensure compliance with various regulations and to guard the future of the organisation. 

Group of companies commits to respecting the privacy of all its customers and to protecting any data about customers from outside parties. To this end, management are committed to maintaining a secure environment in which to process client information so that we can meet the commitments. 

Employees handling Sensitive client data should ensure: 

  • Handle Company and client information in a manner that fits with their sensitivity; 
  •  Limit personal use of Call Center Studio information and telecommunication systems and ensure it  doesn’t interfere with your job performance; 
  • Call Center Studio reserves the right to monitor, access, review, audit, copy, store, or delete any electronic communications, equipment, systems and network traffic for any purpose; 
  • Do not use e-mail, internet and other Company resources to engage in any action that is offensive, threatening, discriminatory, defamatory, slanderous, pornographic, obscene, harassing or illegal; 
  • Do not disclose personnel information unless authorised; 
  • Protect sensitive client information; 
  • Keep passwords and accounts secure; 
  • Request approval from management prior to establishing any new software or hardware, third party connections, etc.; 
  • Do not install unauthorised software or hardware, including modems and wireless access unless you have explicit management approval; 
  • Always leave desks clear of sensitive client data and lock computer screens when unattended; 
  • Information security incidents must be reported, without delay, to the individual responsible for incident response locally – Please find out who this is. 

We each have a responsibility for ensuring our company’s systems and data are protected from unauthorised access and improper use.

Information security policy covers the following:

  • Protect Stored Data
  • Information Segmentation
  • Physical Security
  • Disposal of Stored Data
  • Security awareness
  • Network Security
  • Password policy
  • Anti-Virus Policy
  • Patch Management Policy
  • Remote Access Policy
  • Vulnerability Management Policy
  • Change Control Process
  • Audit and Log review
  • Secure Application Development
  • Penetration test
  • Incident response Plan
  • User Access Management
  • Access Control Policy
  • Wireless Policy
 

GDPR Data protection Impact Assessment Policy

A Data Protection Impact Assessment (DPIA) is a process whereby potential privacy issues and risks are identified and examined from the perspective of all stakeholders and allows the University to anticipate and address the likely impacts of new initiatives and put in place measures to minimise or reduce the risks.  As the use of technology and the collection and storage of personal data grows, the need to ensure that it is properly managed and maintained increases.

It is a requirement of GDPR that a Data Protection Impact Assessment (DPIA) is carried out in certain circumstances.  This section will explain when a DPIA has to be done, how it should be carried out, and what should be taken into consideration as part of the process.  The impact assessment covers not only the protection of personal data but broader privacy of individuals and therefore could also be referred to as a Privacy Impact Assessments (PIA).

The procedures in this section are designed to minimise the risk of harm that can be caused by the use or misuse of personal information by addressing data protection and privacy concerns at the design and development stage of a project.  Conducting a DPIA should benefit the University by managing risks, avoiding unnecessary costs, avoiding damage to reputation, ensuring legal obligations are met and improving the relationship with stakeholders.

The term project is used in a broad and flexible way and means any plan or proposal.  Examples of the types of projects that need a DPIA are:

  •       A new IT system storing and accessing personal data
  •       A data sharing initiative where two or more organisations seek to pool or link sets of personal data
  •       A proposal to identify people in a particular group or demographic and initiate a course of action (e.g. identifying students believed to be at risk)
  •       A new surveillance system such as CCTV
  •       A new database which consolidates information held by separate parts of an organisation

When does a DPIA need to be done?

A DPIA should be done as part of the initial phase of a project to ensure that risks are identified and taken into account before the problems become embedded in the design and causes higher costs due to making changes at a later stage.  Also if there is a change to the risk of processing for an existing project a review should be carried out.  In the context of this guidance a project could include the development or enhancement of any activity, function or processing such as a system, database, programme, application, service or scheme.  The time and effort put into carrying out the DPIA should be proportionate to the risks.

A DPIA does not have to be conducted as a completely separate exercise and it can be useful to consider privacy issues in a broader policy context such as information security. The DPIA does not necessarily need to start and finish before a project can progress further but it can run alongside the project development process.

The GDPR requires that a DPIA is carried out in the following cases:

  •         When the processing involves systematic and extensive evaluation of personal information particularly in cases of automatic processing or profiling[1] where decisions are made that could have a significant or legal impact on an individual. 
  •         When processing on a large scale of special categories of data (see template form for details of these categories) or data relating to criminal convictions and offences
  •         The monitoring of a publicly assessable area on a large scale
  •         Any other cases specified by the Information Commissioner (none currently specified)

The Assessment

It is the responsibility of the person leading the project to carry out a DPIA.  As part of the process the Data Protection Officer must be consulted but it is not the Data Protection Officer who carries out the DPIA.

If your project includes the use of any personal data then you should start by completing the screening questions on the DPIA form.  If the answer to all these questions in ‘No’ then the remainder of the assessment does not need to be completed but the results from the screening questions should be sent to the Data Protection Officer for recording.

If the response to any of the screening questions is ‘Yes’ you should go on to complete the remainder of the impact assessment form.  Guidance notes are included at the end of the form to help the user ensure that the assessment is properly completed.

The assessment template is split into 8 sections:

  •       Project details – providing a broad overview of the project
  •       Details of personal data – providing details of the types of personal data that will be processed and the justification for this
  •       Description of information flows – how the data will be collected, used, stored and deleted
  •       Consultation requirements – detailing consultation with data subjects or other stakeholders
  •       Identification of privacy and related risks – detailing potential risks
  •       Identification of privacy solutions – what will be done to mitigate the risks
  •       Sign off and record of outcomes – an authorised record of the proposed outcomes
  •       Integration of outcomes back into the project plan – detailing of timing and responsibility for each outcome.
 

Further information about building privacy into a project during the design stage please see section 12 on Data Protection by Design and by Default.

Once the risks are identified and outcomes and actions agreed it is important that that person leading the project ensures that the necessary actions are implemented.  As the project develops and is embedded the privacy risks should continue to be assessed to ensure that adequate protections remain in place.

Once the DPIA process has been completed the outcomes will be recorded in a register maintained by the Data Protection Officer.  The register will record each risk, explain what action has been taken or will be taken and identify who is responsible for approving and implementing the solution.

Call Center Studio is fully committed to protecting the personal data of its customers, employees, suppliers, and other stakeholders in accordance with the requirements of the European Union General Data Protection Regulation. We take the privacy of personal data very seriously and have initiated a variety of methods and controls to ensure we know what data we collect and hold and that we protect that data appropriately.

As part of this commitment, Call Center Studio ensures that all business activities and projects that involve the use of personal data are subject to a data protection impact assessment. The purpose of this assessment is to ensure that our use of personal data is fully understood that the risks to that data are carefully examined and that all appropriate measures are put in place to protect it throughout its lifecycle.

In Data Protection Impact Assessment, we define and underline the following elements:

  • Establish the need and context
  • Document the use of personal data
  • Identify the risks
  • Analyse the risks
  • Evaluate the risks
  • Define Risk treatment Plan
  • Obtain management approval for residual risks
  • Prior Consultation with supervisory authority
  • Risk Monitoring and reporting
  • Regular Review
 

Data Protection Anonymisation and Pseudonymisation Policy

Call Center Studio provided a guidance for establishing and maintaining pseudonymization and encryption of personal data.

“Pseudonymization” means the processing of personal data in such a way that the data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organisational measures to ensure that the personal data are not attributed to an identified or identifiable natural person.

“Anonymization” means processing personal data with the aim of IRREVERSIBLY preventing the identification of the individual to whom it relates. Data can be considered anonymized when it does not allow identification of the individuals to whom it relates, and when it is not possible for an individual to be identified from the data by any further processing of that same data, or by processing that same data together with other data which is available or likely to be available. For most companies complete anonymization is not feasible. 

The purpose of anonymizing personal data is to make it impossible to identify an individual in the anonymized data set even with the aid of the original data, thus anonymized data is not considered personal data. It is important to note that there is no prescriptive standard for anonymization within EU legal frameworks, so the choice of using appropriate anonymization methods rests with the Data Protection Officer.

Call Center Studio have decided when pseudonymization and anonymization techniques were appropriate for particular data processing activities. The following is the methods to be considered as the degree of risk and the intended use of data:

  • Directory Replacement
  • Scrambling
  • Masking
  • Blurring
  • Aggregation
 

Pseudonymizing is meant to enhance privacy by replacing identifying fields within a data record by one or more artificial identifiers, or pseudonyms. As such, pseudonymization reduces, but does not completely remove, the ability to link a dataset with the identity of a data subject. 

We established the appropriate pseudonymization methods such as: 

  • Encryption
  • Hush functions
  • TokenizationCall Center Studio

Supplier Assessment Questionnaire / GDPR Compliance

The purpose of this questionnaire is to understand your level of competence in various data protection-related areas. This will help us to assess whether your organisation has been compliant with the GDPR or partially compliant.

Date of Assessment:

 

Assessor:

 

Name of The Organization:

 

Country of Registration:

 

Product(s) or service(s):

 

Business Area:

 

Approximate Size:

 

Applicable Data Protection Law:

 

Certifications held:

 

Compliance level definitions:

Compliance Level

Summary

Guidance

0

None

You have no knowledge or experience in this area, and it is not part of your role.

1

Low

0 % – 25 % of GDPR Compliance completed

2

Medium

25 % – 75 % of GDPR Compliance completed

3

High

75 % – 90 % of GDPR Compliance completed

4

Fully Compliant

90 % – 99.999 % of GDPR Compliance completed

Cloud Security

Data Center Physical Security

CallCenterStudio hosts Service Data primarily in Google data centers that have been certified as ISO 27001, PCI DSS Service Provider Level 1, and/or SOC 2 compliant.Privacy Resource Center | Google Cloud .

Google Data Center services include backup power, HVAC systems, and fire suppression equipment to help protect servers and ultimately your data. Data and Security – Data Centers – Google .

Data Hosting Location

CallCenterStudio leverages Google data centers in the United States, Europe, and Asia Pacific. Cloud Compliance & Regulations Resources | Google Cloud