1. Introduction
At Axie Consulting, we take data privacy and security seriously. As a software service provider, we
access
and process client data solely to fulfill our contractual obligations. This policy outlines our
commitment
to safeguarding that data and ensuring it is only shared or accessed in accordance with our clients’
instructions.
2. Scope
This policy applies to:
- All employees, contractors, and vendors acting on behalf of Axie Consulting.
- All systems, tools, and platforms used to access or process client data.
- All services provided where client data is involved.
3. Data Ownership
- All data we access or process is the exclusive property of the client.
- Axie Consulting does not own, use, or analyze client data for any purpose beyond service delivery.
- Clients retain full control over their data, including how and when it is shared or deleted.
4. Our Data Sharing Commitment
- We do not share client data with any third party unless the client provides prior written
authorization.
- Data is accessed internally only by team members with a clear, legitimate business need.
- No marketing, profiling, training, or internal use of client data occurs.
5. Internal Access Controls
To ensure secure internal handling:
- Access to client data is based on job responsibilities and is reviewed regularly.
- All staff sign confidentiality agreements and receive data security training.
- Access to systems is protected with strong authentication and access logging.
6. External Data Sharing Policy
Axie Consulting does not share client data externally under any circumstances except:
- When explicitly authorized in writing by the client.
- When required to comply with a legal obligation (with prior notice to the client unless prohibited
by law).
If data sharing is required:
- A Data Processing Agreement (DPA) or Data Sharing Agreement (DSA) will be executed.
- Data will be transmitted using TLS/SSL encryption or secure file transfer protocols such as SFTP.
7. Secure Data Handling
We follow industry best practices to protect client data at all times:
- Data is encrypted both in transit and at rest.
- Secure protocols are used for all communications and file transfers.
- Our systems are regularly updated and monitored for vulnerabilities.
8. Data Breach Response
In the unlikely event of unauthorized access or a data breach:
- The affected client will be notified as quickly as possible.
- A full incident report will be shared, including actions taken to mitigate the issue.
- We will work closely with the client to resolve the situation transparently and promptly.
9. Policy Monitoring and Enforcement
- All employees and contractors are required to follow this policy.
- Violations are taken seriously and may result in disciplinary action.
- This policy is reviewed regularly and updated as needed to reflect evolving best practices.
10. Questions & Contact
If you have questions about this policy or wish to request, restrict, or authorize data sharing: