Accountability Structure


Building trust by protecting your personal information is a team effort at The Globe. 

Our dedicated team of security engineers and the privacy team holds ultimate accountability for overseeing the protection of your personal information, in accordance with applicable privacy laws. The Privacy Officer oversees Hudle Technology privacy program to assist Hudle Technology in fulfilling its responsibilities to protect personal information as required under applicable privacy laws. The PO relies on the support of the Chief Information Security Officer, and IT team, who are accountable for operationalizing technical aspects of the privacy management program.

Our Privacy Officer is also supported by a network of individuals and committees within the company with specific privacy and security-related responsibilities, including the Privacy and Security Committee that provides oversight on the planning and implementation of privacy management activities, and data stewards, who are privacy leads for their operational unit.

Privacy Protection Operations

As part of the Privacy Management Program, Hudle Technology has implemented policies to safeguard your personal information.  The policies cover various aspects of privacy protection, including:

  • Collection and Use: We have processes to review projects involving personal information so that we understand the purposes for which we collect personal information and ensure that there are appropriate security controls to protect personal information throughout its lifecycle. We consider ways to minimize the amount of data collected and used and review our basis for consent.
  • Security and Service Providers: We strive to implement reasonable measures to protect your data from unauthorized access, loss, or misuse. This includes measures such as encryption, secure storage systems, regular data backups, and access controls to limit data access to authorized personnel. Within Hudle Technology , access is limited to those individuals who need it to carry out their jobs. We review access permissions regularly to ensure they remain appropriate. We require vendors who handle your personal information to demonstrate they maintain appropriate policies and standards for the protection of the personal information entrusted to them. We require our teams to enter into agreements with vendors that include appropriate personal information protection terms and safeguards when transferring personal information. 
  • Security and Service Providers: We establish guidelines for data retention so that personal information is retained only for as long as necessary.
  • Awareness and Training: We provide regular training to our employees on privacy best practices, data handling procedures, and legal obligations. 
  • Individual Rights: We have processes in place for receiving and processing privacy inquiries, complaints and rights requests from individuals wishing to exercise their privacy rights. 
  • Incident Response: We have systems and processes to help us detect breaches of privacy safeguards.  For example, our employees are required to report any actual or suspected privacy incidents. If a privacy incident occurs, we have an incident process to ensure incidents are investigated, contained and resolved. Our incident process includes a process for handling incidents that might require a notification to affected individuals or regulators, as per our legal obligations.
  • For more information about our privacy practices, you can read our Privacy Policy.
    Don't miss out

    Want to stay in the loop with all the latest info? Just hit that subscribe button for our newsletter today!📧 Stay updated!

    Our Guidelines

    About

    Services

    Projects

    Survey

    Our address

    At the moment, we do not have a physical office space. We're currently operating remotely.