ESC

What are you looking for?

ESC

What are you looking for?

Shopping cart

Your favorites

You have not yet added any recipe to your favorites list.

Browse recipes

Schedule your 15-minute demo now

We’ll tailor your demo to your immediate needs and answer all your questions. Get ready to see how it works!

0
0
×

School E-Shop

School Safety Assurance International (SSAI), Suite #58, Arihant Industrial Premises, Off Link Road, Goregaon (West), Mumbai - 400104, Maharashtra, India, is committed to protecting information and personal data in accordance with ISO/IEC 27001:2022, the EU General Data Protection Regulation (GDPR), India’s Digital Personal Data Protection Act (DPDP) 2023, and other applicable laws.

Note: SSAI maintains a separate, standalone Quality Policy under ISO 9001:2015. This document focuses on Information Security, Data Protection, and Privacy only.

This combined policy integrates SSAI’s Information Security Policy with our Data Protection & Privacy Policy to ensure a coherent governance framework for our AI-enabled SaaS platform, assessments, certifications, and operations.

Purpose

  • Define principles, roles, and controls for safeguarding information assets and personal data processed by SSAI.
  • Ensure lawful, fair, and transparent processing of personal data and alignment with ISO/IEC 27001:2022 controls and applicable privacy regulations.

Scope

  • Applies to all SSAI personnel, contractors, interns, temporary staff, and third-party processors.
  • Covers all information assets and personal data (electronic and paper) related to customers, users, employees, and third parties processed via the website, AI-enabled SaaS platform, assessments, certifications, and related services.
  • Includes processing in all jurisdictions where SSAI operates or provides services.

Policy Statement

SSAI commits to:

  • Lawful, fair, and transparent processing; purpose limitation; data minimization; accuracy; storage limitation; integrity and confidentiality; and accountability.
  • Implementing information security controls appropriate to risk, including encryption, access control, logging, vulnerability management, and secure AI workflows.
  • Obtaining explicit consent where required (e.g., marketing, special categories, child-safety-related assessments), with easy withdrawal mechanisms.
  • Respecting data subject rights (access, rectification, erasure, restriction, portability, objection) and responding within legal timelines.
  • Applying privacy-by-design/default in system development and AI features; conducting Data Protection Impact Assessments (DPIAs) when required.
  • Reporting personal data breaches to relevant authorities and affected individuals as required (e.g., GDPR within 72 hours; DPDP timelines as applicable).
  • Ensuring third-party processors meet equivalent security and privacy standards contractually (including cross-border safeguards such as SCCs/adequacy).
  • Continual improvement of the Information Security Management System (ISMS).

Part A: Governance

Roles and Responsibilities

  • Owner/CEO : Overall accountability for compliance and ISMS effectiveness.
  • System & Office Administrator : Maintains data processing records, oversees access administration, coordinates data subject requests, supports incident/breach notifications, and vendor due diligence.
  • Data Protection Officer (DPO): [Appoint/designate as needed; until then, CEO assumes role]. Oversees privacy audits, DPIAs, training, and compliance monitoring.
  • All Staff: Comply with this policy, security procedures, and report incidents immediately.
  • Third-Party Processors: (e.g., hosting providers such as host.co.in, and partners such as Microlan): Bound by written agreements, meet ISO/IEC 27001–aligned controls, support audits, breach notifications, and data subject requests.

Policies and Standards Hierarchy

  • This Combined Information Security, Data Protection & Privacy Policy
  • ISMS Policies: Access Control, Cryptography, Asset Management, Supplier Management, Secure Development/AI Model Governance, Incident Response, Business Continuity/DR, Backup & Recovery, Logging & Monitoring, Acceptable Use
  • Privacy Standards: Lawful Bases, Consent, DPIA, Data Retention & Disposal, International Transfers, Cookie/Tracking, Children’s Data, Marketing Preferences
  • Procedures and Work Instructions supporting the above

Part B: Personal Data Management

Lawful Bases and Processing Purposes

  • Contract performance (e.g., certification processing, account provisioning)
  • Consent (e.g., marketing, special categories including child-safety-related assessments)
  • Legitimate interests (e.g., product improvement, service security) balanced with individual rights
  • Legal obligations (e.g., regulatory reporting)
  • For AI features, data may be used to improve models with appropriate safeguards, minimization, and opt-out where applicable.

Information We Collect

  • Directly provided: contact details (name, email, phone, address), institutional data (school name, location, safety assessments), billing details.
  • Automatically collected: IP address, device/browser data, usage logs, cookies/analytics.
  • Special/sensitive data: only where strictly necessary and with explicit consent (e.g., children-related safety inputs for certifications), subject to enhanced controls.

Data Subject Rights and Requests

  • Rights: access, rectification, erasure, restriction, portability, objection, consent withdrawal.
  • How to submit: info@school-safety.org
  • Timelines: within 30 days or applicable legal timeframe.
  • Verification: SSAI verifies identity before acting, maintains an audit trail of requests and responses.

Children’s Privacy

  • Collect only with verifiable parental/guardian consent or other lawful basis permitted by applicable law.
  • Use strictly for safety/certification purposes; apply heightened security and minimization.
  • Align with DPDP, GDPR, and COPPA (for US users as applicable).

Cookies and Tracking

  • Functional cookies for sessions; analytics cookies (e.g., Google Analytics) with user controls via a cookie banner and browser settings.
  • See Cookie Policy for categories, purposes, and retention.

Sharing, Disclosure, and International Transfers

  • Share on a need-to-know basis with service providers under data processing agreements (DPAs) ensuring GDPR/DPDP compliance and security controls.
  • Legal disclosures as required by authorities.
  • Publish anonymized/aggregated information (e.g., certified school directories) with user-configurable visibility where applicable.
  • Cross-border transfers use approved mechanisms (e.g., SCCs, adequacy, DPDP-compliant measures), with documented transfer risk assessments.

Data Retention and Disposal

  • Retain personal data only as long as necessary for the stated purposes and legal obligations.
  • Example: certification-related records retained per statutory and contractual requirements; certain operational records may be retained for up to 364 days unless longer retention is mandated.
  • Anonymized/aggregated data may be retained indefinitely.
  • Secure deletion and destruction procedures apply to paper and electronic media; disposal is logged.

Part C: Information Security Controls (ISO/IEC 27001:2022 aligned)

Asset Management

  • Maintain an information asset inventory (systems, datasets, media, applications).
  • Classify information (Public/Internal/Confidential/Restricted) and apply handling rules.

Access Control

  • Role-based access control (RBAC); least privilege and need-to-know.
  • Strong authentication, MFA for privileged roles.
  • Periodic access recertification; immediate revocation upon role changes/termination.

Cryptography

  • Encryption in transit (TLS 1.2+), encryption at rest for sensitive data.
  • Key management with restricted access and rotation; avoid hard-coded secrets; use secure vaults.

Secure Development and AI Governance

  • Secure SDLC with code reviews, dependency scanning, SAST/DAST.
  • Data minimization and pseudonymization where feasible for training and testing.
  • AI model governance: document data sources, purposes, evaluation, bias testing, human oversight, and opt-out paths where applicable.
  • Separate production and non-production environments; use de-identified data in non-prod.

Operations Security

  • Patch and vulnerability management with defined SLAs based on severity (e.g., Critical within 7 days).
  • Logging and monitoring of security events; time-synchronized logs retained per policy.
  • Backups with regular restore testing; defined RPO/RTO objectives.

Network and Infrastructure Security

  • Defense-in-depth with firewalls, WAF/IPS where applicable, network segmentation, and least-privilege service communications.
  • Hardening baselines; secure configuration and regular reviews.

Endpoint and Physical Security

  • Endpoint protection (EDR/AV), disk encryption, screen lock, and device control.
  • Physical controls for offices and data centers via vendors; visitor logs and restricted areas.

Supplier and Third-Party Management

  • Due diligence prior to onboarding; contractual clauses for confidentiality, security, breach notification, sub-processing, and audits.
  • Ongoing monitoring; high-risk vendors reviewed at least annually.

Incident and Breach Management

  • Incident response plan with roles, triage, containment, eradication, recovery, and post-incident review.
  • Personal data breach assessment and notification:
    • GDPR: notify supervisory authority within 72 hours where required, and affected individuals without undue delay when high risk.
    • DPDP: notify the Data Protection Board/Authority as applicable and affected individuals per statutory timelines.
  • Maintain an incident register and evidence preservation procedures.

Business Continuity and Disaster Recovery

  • BCP/DR plans aligned to critical services with tested failover/restoration.
  • Regular exercises; lessons learned feed continuous improvement.

Training and Awareness

  • Mandatory onboarding and annual training for all personnel on information security, privacy, phishing, and incident reporting.
  • Role-based training for engineers, data handlers, and executives.
  • Periodic simulated phishing and tabletop exercises.

Part D: Transparency and User Information

Privacy Notice Summary

  • What we collect: contact data, institutional and certification data, usage data, payment data via secure gateways, and sensitive data only with explicit consent.
  • Why we use it: deliver and improve services, ensure security and compliance, communicate with users, perform analytics (preferably anonymized).
  • Sharing: with contracted service providers and as required by law; no data selling.
  • Rights & Contact: submit requests to info@school-safety.org; (until otherwise designated).
  • Cookies: controlled via banner and browser settings.
  • International transfers: protected via SCCs/adequacy/DPDP-compliant measures.

Full Privacy Policy: provided on our website and SaaS platform and reflects the contents of this document.

Part E: Contact, Review, and Changes

Contact Us

Email: info@school-safety.org
WhatsApp: (+91)-8425906626
Address: Suite #58, Arihant Industrial Premises,
Off Link Road, Goregaon (West), Mumbai - 400104, Maharashtra, India.

Review Cycle

  • This policy is reviewed annually or upon significant changes in processing, technology, services, or legal requirements.
  • Last reviewed: August 1, 2025.

Changes to This Policy

  • Updates will be posted with effective dates.
  • Material changes may be communicated via email or in-product notifications.
  • Continued use of Services constitutes acceptance.

Appendix: Practical Controls and Notices

  • Records of Processing Activities (RoPA): maintained and reviewed annually; includes lawful basis, categories, recipients, retention, and transfer safeguards.
  • DPIA triggers: new AI features, children’s data processing, large-scale monitoring, or high-risk processing; mitigation documented and approved by DPO/CEO.
  • Consent management: documented, granular (e.g., marketing vs. analytics), easy withdrawal via account settings or email link.
  • Data portability format: commonly used, machine-readable (e.g., JSON/CSV), secure delivery.
  • Data deletion: documented timelines; secure wipe with verification; backups aged out per retention.
  • Breach playbooks: include communication templates, notification criteria per GDPR/DPDP, and post-mortem steps.
  • International transfers register: records destinations, mechanisms (SCCs/adequacy), and transfer risk assessments.
  • Vendor list and subprocessors: maintained and made available upon request or published with change notifications.