×

Data Privacy and Security Policy

Happiest Minds started implementing General Data Protection Regulation (GDPR) in 2018 which marked our journey toward data privacy and security. Initial assessments were conducted following which, our team created data flow maps, evaluated corporate functions, and assessed privacy risks by deploying mitigation measures and control accordingly.

Some of the key policies/practices include:

Release of Happiest Minds Privacy Policies

Appointment of a Data Protection Officer (DPO)

Establish Contracts and Data Protection Agreements (DPA) with Third-Party Processors

Privacy Training and Awareness Programs

Performing Data Privacy Impact Assessment (DPIA)

Defining Data Breach Notification and Response Process

Our ever-increasing demand for data privacy obligations and data privacy laws across the globe prompted us to implement ISO 27701, a Privacy Information Management System (PIMS) in December 2022 which effectively helped to document and practice standardized privacy policies and procedures.

Key Capabilities of the Integrated Information Security and Privacy System

Data Inventory

To track and record the accuracy, validation, and completion of Personal Information (PI).

Data Subject Requests

Processes, means and mechanisms are defined to facilitate data subject rights to raise requests such as data deletion, unsubscribing or to update or opt out of a sale, etc.

Data Security

To promote privacy requirements such as “Privacy by design” and “Privacy by default” in the software development process, enable data security across the infrastructure to control unauthorized data access/leakages along with other existing security procedures and practices.

Data Classification

All types of data collected and retained are classified to identify confidential and personal information versus public data.

Vendor Management

To establish a comprehensive inventory of vendor who has a business relationship with Happiest Minds.

Oversight and Monitoring

Conduct audit programs and privacy reviews to ensure the proper implementation of security and privacy measures.