Accountability Structure
Building trust by protecting your personal information is a team
effort at The Globe.
Our dedicated team of security engineers and the privacy team
holds ultimate accountability for overseeing the protection of
your personal information, in accordance with applicable privacy
laws. The Privacy Officer oversees Hudle Technology privacy
program to assist Hudle Technology in fulfilling its
responsibilities to protect personal information as required under
applicable privacy laws. The PO relies on the support of the Chief
Information Security Officer, and IT team, who are accountable for
operationalizing technical aspects of the privacy management
program.
Our Privacy Officer is also supported by a network of individuals
and committees within the company with specific privacy and
security-related responsibilities, including the Privacy and
Security Committee that provides oversight on the planning and
implementation of privacy management activities, and data
stewards, who are privacy leads for their operational unit.
Privacy Protection Operations
As part of the Privacy Management Program, Hudle Technology has
implemented policies to safeguard your personal information. The
policies cover various aspects of privacy protection, including:
Collection and Use: We have processes to review projects
involving personal information so that we understand the
purposes for which we collect personal information and ensure
that there are appropriate security controls to protect personal
information throughout its lifecycle. We consider ways to
minimize the amount of data collected and used and review our
basis for consent.
Security and Service Providers: We strive to implement
reasonable measures to protect your data from unauthorized
access, loss, or misuse. This includes measures such as
encryption, secure storage systems, regular data backups, and
access controls to limit data access to authorized personnel.
Within Hudle Technology , access is limited to those individuals
who need it to carry out their jobs. We review access
permissions regularly to ensure they remain appropriate. We
require vendors who handle your personal information to
demonstrate they maintain appropriate policies and standards for
the protection of the personal information entrusted to them. We
require our teams to enter into agreements with vendors that
include appropriate personal information protection terms and
safeguards when transferring personal information.
Security and Service Providers: We establish guidelines
for data retention so that personal information is retained only
for as long as necessary.
Awareness and Training: We provide regular training to
our employees on privacy best practices, data handling
procedures, and legal obligations.
Individual Rights: We have processes in place for
receiving and processing privacy inquiries, complaints and
rights requests from individuals wishing to exercise their
privacy rights.
Incident Response: We have systems and processes to help
us detect breaches of privacy safeguards. For example, our
employees are required to report any actual or suspected privacy
incidents. If a privacy incident occurs, we have an incident
process to ensure incidents are investigated, contained and
resolved. Our incident process includes a process for handling
incidents that might require a notification to affected
individuals or regulators, as per our legal obligations.
For more information about our privacy practices, you can read our
Privacy Policy.