Data Compliance
International Syndication Company LLC. Last updated: September 2023
Table of Contents
Introduction
Purpose
Scope of Compliance
Definitions
Data Collection Methods
Data Elements Collected
Data Storage and Encryption
Data Sharing and Third-Party Integrations
User Rights and Consent Mechanisms
Data Retention and Deletion
Security Measures
Data Audits and Accountability
Incident Response and Data Breach Procedure
Data Protection Officer (DPO)
Training and Awareness
Non-Compliance Penalties
Amendments
Contacts
1. Introduction
This document outlines the practices and guidelines for data compliance at aihub.today, with a focus on the protection of data for subscribers and clients.
2. Purpose
The purpose is to clearly define how data is collected, stored, used, and shared on aihub.today, aligning with GDPR, CCPA, and other relevant legal requirements.
3. Scope of Compliance
The scope covers all data collected from subscribers of aihub.today and data shared with third-party platforms.
4. Definitions
Personal Data: Information related to an identified or identifiable natural person.
Processing: Actions performed on personal data.
Lead : A subscriber who has downloaded content.
Intent Actions: User behavior metrics that indicate interest.
5. Data Collection Methods
Subscription: Through LinkedIn or manual registration, which requires email verification.
Content Download: Requires subscription to the platform.
6. Data Elements Collected
Data Element | Source | Purpose |
Name | User | Identification |
User | Communication | |
Content Viewed | Behavior | Intent Actions |
7. Data Storage and Encryption
Storage: Data is stored in encrypted format in data.isyndicate.io.
Encryption: AES 256-bit encryption is used.
8. Data Sharing and Third-Party Integrations
Lead Sharing: Data is sold or shared with clients.
Third-Party Integration: Content is syndicated to 300+ compliant publishing platforms.
9. User Rights and Consent Mechanisms
Consent: Users provide consent for newsletters and content preferences.
Rights: Access, correction, deletion of data.
10. Data Retention and Deletion
Retention: Indefinite until deletion is requested by the user.
11. Security Measures
Firewall: AWS firewall services.
Encryption: Data in transit and at rest are encrypted.
12. Data Audits and Accountability
Audit Logs: For auditing purposes, logs are maintained.
Accountability: Staff training and written agreements with third-party platforms.
13. Incident Response and Data Breach Procedure
Response Team: Headed by the DPO.
Notification: Within 72 hours of discovering a breach.
14. Data Protection Officer (DPO)
Name: Mr. Chris York
Role: Compliance oversight.
15. Training and Awareness
Training: Mandatory for all employees.
16. Non-Compliance Penalties
Penalties: Includes fines and disciplinary action.
17. Amendments
Subject to change based on laws and technology.
18. Contacts
DPO: Mr. Chris York
Last updated