Last updated: 31 January 2024
Introduction
SEKI GADGETS is committed to ensuring the highest standards of data security and protection for our customers. This Data Security and Protection Policy outlines the enhanced measures we take to secure and protect your information during the performance of our repair and data recovery services. Please note that this policy is distinct from our Privacy Policy, which covers broader aspects of our information handling practices.
Scope
This Data Security and Protection Policy applies to all customer devices processed by SEKI GADGETS during the provision of repair and data recovery services. It encompasses authorised device access and retrieval of information stored on devices that are subject to repair or data recovery services.
Data Collection and Processing
Types of Data Stored
Data may include, but is not limited to, contacts, messages, photos, videos, email, notes, and other digital content stored on the device.
Data Extraction and Storage
Data is extracted and stored on encrypted local hard drives within our secure premises. No data is transmitted over the internet during this process.
Data Parsing and Delivery
Recovered data is parsed into an easily readable format and transferred to an encrypted USB drive for customer delivery. This ensures a secure and offline transfer of the retrieved information.
Security Measures
Site Security Measures
To prevent unauthorised entry and ensure the physical security of customer devices and equipment, access to SEKI GADGETS premises are restricted to authorized personnel only. SEKI GADGETS employs security measures such as door access control systems, closed-circuit television (CCTV) surveillance, and alarm systems.
Offline Operations
All workstations at SEKI GADGETS operate in an offline environment to minimise the risk of unauthorized electronic access.
CCTV Monitoring
All workstations are monitored by closed-circuit television (CCTV) surveillance to maintain a secure environment. Customers may request footage of their device service within seven (7) days, noting there is a $45 administration fee.
Access to Personal Information
SEKI GADGETS actively avoids accessing personal information unnecessarily. Only authorised personnel involved in the repair or data recovery process have access, and access is limited to the extent required for the repair or recovery.
Customer Data Handling Protocols
Third-Party Access
No device data is retained or passed to any third party without explicit written approval from the customer.
Data Encryption and Deletion
Any approved data backup is encrypted using industry best practice encryption standards. Data is deleted after thirty (30) days to ensure no unnecessary storage of sensitive information.
Account Removal and Device Disposal
All iCloud accounts are removed from devices that are subject to recycling and/or disposal. Furthermore, all devices are wiped and restored to factory settings before being recycled.
Employee Training and Confidentiality
Training Programs
SEKI GADGETS provides regular training to employees involved in logic board repair and data recovery operations to ensure they understand and adhere to the enhanced security protocols and policies.
Confidentiality Agreements
Employees handling customer data are required to sign confidentiality agreements, emphasising their commitment to maintaining the confidentiality and security of the information they handle.
Data Retention and Disposal
Data Retention
Recovered data is retained for a limited duration necessary for the completion of the data recovery service.
Data Destruction
Once the service is completed and the customer has received and verified their data, all data is destroyed and SEKI GADGETS retains no copies.
Device Disposal
Any physical device storage media subject to data recovery process is securely disposed of using industry-approved methods to prevent any potential data leakage.
Review and Compliance
Regular Audits
SEKI GADGETS conducts regular internal audits to ensure compliance with this Data Security and Protection Policy and to identify and rectify any potential vulnerabilities.
Changes to This Policy
This policy is subject to periodic review and may be updated to align with changes in technology, legal requirements, or business processes.
For information regarding how SEKI GADGETS handles broader privacy matters, please refer to our Privacy Policy.
For any questions or concerns related to data security and protection, please contact us through our Contact Page.