PRIVACY POLICY

Our Continuum Privacy Policy represents our commitment to treat the information of employees, customers, stakeholders and other interested parties with the utmost care and confidentiality.

With this policy, we present transparently that we gather, store and handle the data of our respected clientele fairly. As part of our drive to serve you better, we need to obtain and process your information. This includes any offline or online data that makes a person identifiable such as names, addresses, usernames and passwords, digital footprints, photographs, social security numbers, financial data etc.

Continuum collects this information only with the full cooperation, knowledge and permission of interested parties. Once this information is available to us, the following rules apply.

Your data will be:

  • Accurate and kept up-to-date
  • Collected fairly and for lawful purposes only
  • Processed by Continuum within its legal and moral boundaries
  • Protected against any unauthorized or illegal access by internal or external parties

Your data will not be:

  • Communicated informally
  • Stored for more than a specified amount of time
  • Transferred to organizations, states or countries that do not have adequate data protection policies
  • Distributed to any party other than the ones agreed upon by the data’s owner (exempting legitimate requests from law enforcement authorities)

In addition to our methods of handling the data, Continuum has direct obligations towards people to whom the data belongs. Specifically, we must:

  • Let people know which of their data is collected
  • Inform people about how we’ll process their data
  • Inform people about who has access to their information
  • Have provisions in cases of lost, corrupted or compromised data
  • Allow people to request that we modify, erase, reduce or correct data contained in our databases

Actions:

To exercise your data protection, Continuum is committed to:

  • Restrict and monitor access to sensitive data
  • Develop transparent data collection procedures
  • Train employees in online privacy and security measures
  • Build secure networks to protect online data from cyberattacks
  • Establish clear procedures for reporting privacy breaches or data misuse
  • Include contract clauses or communicate statements on how we handle data
  • Establish data protection practices (document shredding, secure locks, data encryption, frequent backups, access authorization etc.)

Download

Business Model Map