Definitions

PAIA means the Promotion of Access to Information Act 2 of 2000 (as Amended)

POPIA means the Promotion of Personal Information Act 4 of 2013

Information Regulator means the Regulator established in terms of Section 39 of POPIA

Person means a natural person or a juristic person

Private body means:

  • a natural person who carries or has carried on any trade, business or profession, but only in such capacity
  • a partnership which carries or has carried on any trade, business or profession; or
  • any former or existing juristic person, but excludes a public body

Public body means:

  • any department of state or administration in the national or provincial sphere of government or any municipality in the local sphere of government; or
  • any other functionary or institution when:
  • exercising a power or performing a duty in terms of the Constitution or a provincial constitution; or
  • exercising a public power or performing a public function in terms of any legislation

Head, in relation to, a private body means:

  • in the case of a natural person, that natural person or any person duly authorised by that natural person;
  • in the case of a partnership, any partner of the partnership or any person duly authorised by the partnership;
  • in the case of a juristic person:
  • the chief executive officer or equivalent officer of the juristic person or any person duly authorised by that officer; or
  • the person who is acting as such or any person duly authorised by such acting person

Information Officer (IO) means the head of a private body

Deputy Information Officer (DIO) means the person to whom any power or duty conferred or imposed on an Information Officer by POPIA has been delegated

Requester in relation to a private body, means any person, including, but not limited to public body or an official thereof, making a request for access to a record of the organisation or a person acting on behalf of such person

Personal Requester means a requester seeking access to a record containing personal information about the requester

Personal Information means information relating to an identifiable, living, natural person, and where it is applicable, an identifiable, existing juristic person, including, but not limited to: information relating to the race, gender, sex, pregnancy, marital status, national, ethnic or social origin, colour, sexual orientation, age, physical or mental health, well-being, disability, religion, conscience, belief, culture, language and birth of the person; information relating to the education or the medical, financial, criminal or employment history of the person; any identifying number, symbol, e-mail address, physical address, telephone number, location information, online identifier or other particular assignment to the person, the biometric information of the person; the personal opinions, views or preferences of the person; correspondence sent by the person that is implicitly or explicitly of a private or confidential nature or further correspondence that would reveal the contents of the original correspondence; the views or opinions of another individual about the person; and the name of the person if it appears with other personal information relating to the person or if the disclosure of the name itself would reveal information about the person

Request for access means a request for access to a record of the organisation in terms of section 50 of PAIA

Record means any recorded information regardless of the form or medium, in the possession or under the control of the organisation irrespective of whether or not it was created by the organisation

Data Subject means the person to whom personal information relates

Third Party in relation to a request for access to a record held by the organisation, means any person other than the requester

Processing means any operation or activity or any set of operations, whether or not by automatic means, concerning personal information, including the collection, receipt, recording, organisation, collation, storage, updating or modification, retrieval, alteration, consultation or use, dissemination by means of transmission, distribution or making available in any other form, or merging, linking, as well as restriction, degradation, erasure or destruction of information

Purpose of a PAIA Manual

The Promotion of Access to Information Act, 2000, gives effect to section 32 of the Constitution, which provides that everyone has the right to access information held by the State or any other person (or private body), when that information is required for the exercise or protection of any rights.

The purpose of PAIA is to:

  • foster a culture of transparency and accountability in public and private bodies by giving effect to the right of access to information, and to
  • actively promote a society in which the people of South Africa have effective access to information to enable them to more fully exercise and protect all of their rights

The organisation recognises everyone’s right to access information and is committed to providing access to the organisation’s records where the proper procedural requirements as set out by PAIA and POPIA have been met.

The organisation’s PAIA manual is compiled in accordance with section 51 of the Act.

Information Officer

The Director,  Rudé Alley, is the designated Information Officer of SURGO (PTY) LTD. The contact details of the Information Officer are as follows:

A. Head of Organisation – Information Officer

Full names & surname:

Rudé Alley

Email address:

rude@surgo.co.za

Phone number:

+27 21 012 5566

The Information Officer has, in terms of section 17 of the Act, delegated his powers under PAIA to the following Deputy Information Officers:

B. Deputy Information Officers

Full names & surname

 Madre Cordy

Email address:

 madre@surgo.co.za

Phone number:

+27 21 012 5566

The Information Officer and the Deputy Information Officers share the same physical and postal address as below:

C. Organisation Contact Details

Postal address: PO

47 Ocean Spirit Ave, Sanddrift, Cape Town, 7441, SA

Street address:

n/a (fully remote)

Phone number:

+27 21 012 5566

Website:

www.surgo.co.za

D. Business Type

The organisation conducts its main type of business in the following sector(s):

BPO Industry, HR & Recruitment

PAIA Guide

Requesters are referred to the guide in terms of section 10 of the Act which has been compiled by the Information Regulator (South Africa). The guide contains information for the purposes of exercising Constitutional rights. Requests in terms of PAIA shall be made in accordance with the prescribed procedures at the rates provided.

The guide is available in all South African official languages free of charge and any person may request a copy of the guide.

A copy of the guide may be obtained by contacting the Information Regulator (South Africa) at:

  • Postal Address: The Information Regulator (South Africa) PO Box 31533, Braamfontein, Johannesburg, 2017
  • Telephone Number: +27(0)10 023 5200
  • Website: inforegulator.org.za
  • Email: enquiries@inforegulator.org.za

Categories of Records Held

The organisation maintains statutory records and information in terms of the following legislation:

Basic Conditions of Employment Act 75 of 1997

Companies Act 71 of 2008

Compensation of Occupational Injuries & Diseases Act 130 of 1993

Consumer Protection Act 68 of 2008

Consumer Affairs (Unfair Business Practices) Act 71 of 1988

Copyright Act 98 of 1978

Credit Agreements Act 75 of 1980

Employment Equity Act 55 of 1998

Finance Act 35 of 2000

Financial Relations Act 65 of 1976

Harmful Business Practices Act 23 of 1999

Insolvency Act 24 of 1936

Intellectual Property Laws Amendments Act 38 of 1997

Labour Relations Act 66 of 1995

National Credit Act 34 of 2005

Occupational Health and Safety Act 85 of 1993

Protection of Personal Information Act 4 of 2013

Skills Development Levies Act 9 of 1999

Skills Development Act 97 of 1998

Trademarks Act 194 of 1993

Unemployment Contributions Act 4 of 2002

Unemployment Insurance Act 63 of 2001

Value Added Tax Act 89 of 1991


Availability of Records

The organisation maintains the following categories of records and related subject matter. The status of the record’s availability, the purpose for its processing and the relevant data subject category to who the record relates are set out below:

Category:

Record:

Availability:

Purpose:

Data Subject:

Public
Affairs

Public Product Information

Freely Available

Convey Public Information

Organisation

Public Corporate Records

Freely Available

Convey Public Information

Organisation

Media Releases

Freely Available

Convey Public Information

Organisation

Published Newsletters

Freely Available

Convey Public Information

Organisation

Regulatory & Administrative

Permits, Licenses or Authorities

Freely Available

Statutory Requirement

Organisation

Memorandum of Incorporation

PAIA Request

Statutory Requirement

Organisation

Register of Members

PAIA Request

Statutory Requirement

Organisation

Register of Board of Directors

PAIA Request

Statutory Requirement

Organisation

Internal correspondence (e-mails/memos)

PAIA Request

Internal Communications

Employees

Insurance Policies held by organisation

PAIA Request

Risk Management

Organisation

Human

Resources

Employment Applications

PAIA Request

Internal Referencing

Employees

Employment Contracts

PAIA Request

Contractual Agreement

Employees

Personal Information of Employees

PAIA Request

Internal Referencing

Employees

Employment Equity Plan

PAIA Request

Statutory Requirement

Organisation

Disciplinary Records

PAIA Request

Statutory Requirement

Employees

Performance Management Records

PAIA Request

Internal Referencing

Employees

Salary Records

PAIA Request

Internal Referencing

Employees

PAYE Records

PAIA Request

Statutory Requirement

Employees

SETA Records

PAIA Request

Statutory Requirement

Employees

Disciplinary Code

PAIA Request

Statutory Requirement

Organisation

Leave Records

PAIA Request

Internal Referencing

Employees

Training Records

PAIA Request

Internal Referencing

Employees

Training Manual

PAIA Request

Internal Referencing

Organisation

Financial

Financial Statements

PAIA Request

Internal Referencing

Organisation

Financial and Tax Records

PAIA Request

Statutory Requirement

Organisation

Asset Register

PAIA Request

Internal Referencing

Organisation

Management Accounts and Reports

PAIA Request

Internal Referencing

Organisation

Vouchers, Cash Books and Ledgers

PAIA Request

Internal Referencing

Organisation

Banking Records and Statements

PAIA Request

Internal Referencing

Organisation

Electronic Banking Records

PAIA Request

Internal Referencing

Organisation

Marketing

Market Information

PAIA Request

Internal Referencing

Organisation

Product Brochures

PAIA Request

Internal Referencing

Organisation

Performance Records

PAIA Request

Internal Referencing

Organisation

Client
Customer

Customer / Client Database

PAIA Request

Internal Referencing

Customers

Customer / Client agreements

PAIA Request

Internal Referencing

Customers

Customer / Client Files

PAIA Request

Internal Referencing

Customers

Customer / Client Instructions

PAIA Request

Internal Communications

Customers

Customer / Client Correspondence

PAIA Request

External Communications

Customers

Third Party

Rental agreements

PAIA Request

Contractual Agreement

Third Party

Non-disclosure agreements

PAIA Request

Risk Management

Third Party

Letters of Intent

PAIA Request

Contractual Agreement

Third Party

Supplier Contracts

PAIA Request

Contractual Agreement

Third Party


Purpose of Processing Personal Information

We process personal information for a variety of purposes, including but not limited to the following:

  • To provide or manage any information, products and/or services requested by data subjects;
  • To help us identify data subjects when they contact the company;
  • To maintain customer records;
  • For recruitment purposes;
  • For general administration, financial and tax purposes;
  • For legal or contractual purposes;
  • To help us improve the quality of our products and services;
  • To help us detect and prevent fraud and money laundering;
  • To help us recover debts;
  • To carry out analysis and customer profiling;
  • To facilitate travel for business purposes;
  • To fulfil a contractual obligation to a shareholder or to fulfil a contractual obligation to a thrid party;
  • To enable suppliers to provide goods or services to us and receive payment for these goods or services and collect information for B-BBEE reporting and accreditation purposes.
  • To fulfil statutory obligations in terms of the Companies Act, 71 of 2008 (directors’ information);
  • To assess applications and onboard new clients or service providers or suppliers;
  • To compile offer letters or expressions of interest;
  • To do due-diligence assessments;
  • To do yearly or periodic reviews or due-diligence assessments of clients and service providers or suppliers;
  • Engage in general correspondence.

DESCRIPTION OF THE CATEGORIES OF DATA SUBJECTS AND OF THE INFORMATION OR CATEGORIES OF INFORMATION RELATING THERETO

Specify the categories of data subjects in respect of whom the body processes personal information and the nature or categories of the personal information being processed.

 

Categories of Data Subjects

Personal Information that may be processed

Customer / Clients

Names, surnames, address, registration numbers / identity numbers, employment status, bank details

 

Service Providers

Names, registration number, vat number, address, trade secrets, bank details

 

Employees

Names, surnames, address, identity number, qualifications and professional registrations, gender, race, bank details, contact details, CVs, tax information, marital status, citizenship, next of kin, and training records.

Suppliers

Name, address, company registration numbers, tax numbers, PAYE numbers, banking details, and contact details.

 

THE RECIPIENTS OR CATEGORIES OF RECIPIENTS TO WHOM THE PERSONAL INFORMATION MAY BE SUPPLIED

Specify the person or category of persons to whom the body may disseminate personal information.

Category of personal information

Recipients / Categories of Recipients to whom the personal information may be supplied

Identity number and names for criminal checks

South African Police Services

Qualifications, for qualification verification

South African Qualifications Authority

Credit and payment history, for credit information

Credit Bureaus

B-BBEE

B-BBEE assessment or verification agency

Employee names, identity numbers and demographics

SETA (for programs)

Identity number, names, employee numbers, contact details, employment dates, statutory requirements (including tax) and salary information

·       Department of Labour (UIF)

·       South African Revenue Service (PAYE, SDL, UIF)

·       Commission for Conciliation, Mediation and Arbitration (labour relations)

·       Reference checks for former employees.

PLANNED TRANSBORDER FLOWS OF PERSONAL INFORMATION

We want to affirm that Surgo does not engage in any transborder flows of personal information. All data we collect, process, and store is confined exclusively within the borders of South Africa.

GENERAL DESCRIPTION OF INFORMATION SECURITY MEASURES

  • We are compliant with ISO/IEC 27001 International Standard on Information Security and GDPR, as a result we have policies in place that govern and ensure safekeeping of information. A list of the most relevant policies and how it relates to safekeeping of data follows below. 
  • Information security policy: 
    The Information Security Policy provides a framework around which Information Security Objectives can be defined and used to monitor the ongoing achievement of business, client, and information security requirements. Employees may only access information needed to perform their legitimate duties as a Company employee and only when authorised by the appropriate Director, Manager or Information Security Management Officer (ISMO) or person appointed by him/her. 
  • Password Policy: 
    The purpose of this policy is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change. All system-level passwords (e.g., root, enable, Windows Administrator, application administration accounts, etc.) must be changed at least every 90 days. All user-level passwords (e.g., email, web, desktop computer, etc.) must be changed at least every 90 days. All user-level passwords are locked after a set number of failed logins equal to 5, JAMF protect works according to an international GDPR compliancy and only allows 5 mistaken login attempts before the computer is locked. All user-level and system-level passwords must conform to the guidelines described in the policy. User accounts that have system-level privileges granted through group memberships or programs must have a unique password from all other accounts held by that user. Password protected screensavers enabled on each laptop to lock after a short timeout period to ensure that workstations that are left unsecured will be protected. Each user is required to lock their laptop when unattended. 
  • Removable Media Policy:
    The objective of this policy is to prevent unauthorized disclosure, modification, removal, or destruction of information assets, whether Surgo or client information, and to prevent interruption to business activities. Surgo has specifically removed authorizaiton for the use of Removable Media within the company, however within certain roles and under certain circumstances, removable media may be used. Where this is the case, the following requirements must be adhered to:
    Unauthorized users are not permitted to use any removable media.
    All removable media drives will be automatically scanned by the Antivirus software.
    Removable media will only be issued to employees who have a clear business need for them. Issue of such media to sub-contractors and temporary workers must be specifically authorized by the IT Manager, failing him or her the Operations Manager may approve the use of Removable Media.
    Removable media may only carry information that is required for a specific purpose, e.g., the retrieval of a client database – in other words, once a purpose has been fulfilled, the information must be erased from the media.
    Media is disposed of securely and as required in the policy for the Disposal of IT Assets Procedure.
    All users that are authorized to use removable media devices, are required to encrypt any removable media using either Bit locker or File Vault. If you are unsure as to the encryption of the device, seek the assistance of the IT Manager
  • Acceptable use Policy:
    The Companies Acceptable Use Policy (this document) covers all of Surgo’s information assets, including hardware, software, mobile devices and peripherals including memory devices, Tablets, iPads, and mobile phones. It sets out what Surgo considers to be acceptable use of those assets and applies to all employees, contractors, temporary workers and third parties who use, work with or connect to Surgo information processing facilities.
    Providing access to another individual, either deliberately or through failure to secure your devices access, is prohibited.
    All computing devices must be secured with a password-protected screensaver with the automatic activation feature set as per the Password Policy.
    You must lock the screen or log off when the device is unattended.
    Employees must use extreme caution when opening e-mail attachments received from unknown senders, which may contain malware
  • Mobile device policy:
    This policy describes the controls necessary to minimize information security risks affecting Surgo mobile devices including laptops, tablets and mobile phones
    All Mobile devices that access company data and store company data is required to be encrypted. Windows Devices must use the latest Bitlocker version that is supported by the Windows version installed on the device. Apple laptops and desktops are required to use the latest version of File Vault that is supported by the version of MacOS that has been installed.
    Surgo owned laptops are required to have Bitlocker configured in both TPM and PIN combination.
    Windows Mobile and Apple mobile devices are encrypted by default. You may only access Surgo services by means of Mobile devices that are encrypted. If an older device is found, encryption needs to be verified before allowing access to any Surgo Services.
    Mobile device compliance is managed through Microsoft Exchange MDM. The policy assigned to the devices must match the users Role.
  • Access control policy:
    The objective of this policy is to provide information security requirements to:
    Protect against unauthorized access to computer systems, applications or operating systems owned or maintained by Surgo.
    Allow only authorized users the appropriate level of access to the information or portion of the system, application, or operating system necessary to accomplish designated responsibilities. This policy applies to all systems and applications that utilize an access control system to protect resources from unauthorized access including all development, staging, production, and operational environments.
    Where appropriate all employees will be subject to pre-employment screening checks. The requirements of such screening will be subject client contractual requirements and will be confirmed prior to commencing employment.
    Access to systems or system function must be limited to only authorized users and conform to best security practices related to Role Based Access Control (RBAC). For all new employees or contractors, Human resources are to notify the IT Department by means of a ticket (or email) with the details of tthe new user.
    Prior to the creation and granting of access privileges, user identities must be subject to an authorization process that tracks and documents access request detail, and final approval
    User identities must be authenticated prior to system access. The Company will use various tools and systems to authenticate users, such as passwords, two factor authentication and Active Directory user activation and authentication.
    In specific cases when misuse of a user identity is suspected, user access must be disabled immediately, and this must be reported to the IT Manager as well as the HR Manager for possible investigation into Information Security Policy disciplinary process.
  • Anti-malware policy:
    The purpose of this policy is to promote the use of anti-virus and other anti-malware software and educate the employees regarding the policies that are widely followed to use anti malware software effectively.
    All workstations whether connected to the Surgo network, or standalone, must use Surgo-approved anti-virus and anti-malware software and configuration. The approved Anti-Virus and Anti-Malware System is JamF Protect
    Any personal workstation accessing any Surgo resources as part of remote work must use Surgo-approved anti-virus and anti-malware software and configuration
    The information system automatically updates malicious code protection mechanisms e.g., automatic updates of anti-virus and anti-malware software.
    All incoming and outgoing e-mails are to be scanned for malware using the JAMF Protect system that will when anyone tries to download a file that is affected and immediately stop it.
  • Cryptographic control policy:
    The purpose of this policy is to provide guidance that limits the use of encryption to those algorithms that have received substantial public review and have been proven to work effectively. Additionally, this policy provides direction to ensure that regulations are followed.
    Surgo uses software encryption technology to protect Confidential Information or PII. To provide the highest-level security while balancing throughput and response times, encryption key lengths should use current industry standard encryption algorithms for Confidential Information or PII.
    Symmetric cryptosystem key lengths must be at least 256 bits. Surgo’s key length requirements shall be reviewed annually as part of the yearly security review and upgraded as technology allows. The use of proprietary encryption algorithms is not allowed unless reviewed by qualified experts outside of the vendor in question and approved by Surgo management.
  • Information transfer policy
    The objective of this policy is to provide information security requirements to:
    Ensure all information transferred in and out of the company meets the security protocols and does not breach any confidentiality requirements.
    Protect Surgo data transmitted. The scope of this policy includes all classifications of data, weather internally generated or received from a 3rd party (e.g., Customer).
    Surgo requires the following types of information to be encrypted when in transit (All customer and personal data) If information is required to be encrypted, it must be protected by a strong password and should never be copied or shared in a way that would make it available outside of the encryption process, For data that is not encrypted there is safe ways on that is used for other processes as well.
    Data must only be transferred via secure protocols i.e., SFTP, MFTP, FTPS and may not be transferred with less secure protocols i.e., FTP. Data is not allowed to be transferred without the permission of the client or management and for the purposes of intended use
  • Network security policy
    The purpose of this policy is to provide the procedures and policy requirements for Network management and connection of systems both internal within Surgo, and externally to the internet and or Clients System. There is currently no internal or local area or wide area network at Surgo. As the business is currently configured for remote or mobile working, the following procedures and systems are in place:
    All Staff have been issued with mobile network routers provided for by SURGO.
    Staff has been allocated with fiber allowance, each staff member that has submitted the signed form that opted for a allowance is receiving funds for their Fiber connection and is liable for their own connection.
    All staff will connect to the Internet via the mobile network routers connecting to the nearest Vodacom and MTN tower which will route the connection to the main tower connecting to the Internet.
    All Routers are connected using a unique encrypted password provided by Vodacom and MTN.
    The JAMF system locks down each connection and does not allow sharing capabilities to other devices.
    Client systems are protected by a SSO Provider with multi factor authentication via OKTA (okta.com )
    Any changes to the Network requirements will be processed through the Change Management procedure and have full Management Approval.
  • Technical vulnerability and patch policy
    The goal of vulnerability and patch Management is to keep the components that form part of information technology infrastructure (hardware, software, and services) up to date with the latest patches and updates
    All of the hardware and software on the organization’s network will be scanned using a vulnerability scanner to identify weaknesses in the configuration of systems and to determine if any systems are missing important patches, or software such as anti-virus software. The organization’s network will be scanned at a minimum on a quarterly basis. Remediation will be undertaken of any vulnerabilities identified.
    The organization’s anti-virus server will be configured to automatically download the latest virus and spyware definitions and push them to the servers, PC’s and tablets running on the network. Windows patch management tools will be utilized to automatically download the latest Microsoft security patches. The patches will be reviewed and applied as appropriate. Security weaknesses and software update notifications issued by Computer Emergency Response Teams (CERT) will be monitored on a regular basis and any critical issues affecting the organization’s IT infrastructure will be attacked upon immediately.
  • Remote working policy
    The objective of this Policy is to provide information security requirements to help ensure that information Security is not compromised on Surgo Information Systems and to satisfy all relevant compliance and regulatory commitment as it relates to best practices and general IT governance controls.
    A designated workspace should be maintained by the employee in a clean, professional, and safe condition.
    Should you work at a public location for any reason, then you are obliged to ensure that no one can see what is on your screen in order to protect our clients’ information, failure of which, may constitute a GDPR breach.
  • Disciplinary policy
    Information security breaches are dealt with as a dismissal with first offence.
  • Digital monitoring and tracking policy
    This policy refers to the monitoring and tracking of all digital data / platforms used on company equipment and utilized by the employees of Surgo (Pty). In terms of the legal requirements referred to in the GDPR (General Data Protection Regulation), the company reserves the right to monitor and track all digital activity, such as work performance data, emails and any other systems / digital platforms owned/not owned by the company.
    Further to the policies we conduct regular mandatory information security training and internal vulnerability tests to ensure employees are educated and vigilant to any possible cyber-attacks.
    To monitor adherence, we make use of monitoring software that is installed on the employee’s device. The software cannot be altered or removed by the employee and is solely controlled by authorized members of our technical team. This software captures actions and steps taken and take frequent screen recordings. Furthermore, we have our own timekeeping solution to track employee tasks and actions.

Request Procedure

To facilitate the processing of your request, kindly complete and submit  Form A which is attached to this manual as Annexure A. The request form must be addressed to the Deputy Information Officer using the contact details set out in clause 3 above.

The Deputy Information Officer will notify the requester that a request for access has been received and that the prescribed fee (if any) is payable prior to processing the request. Please refer to Annexure B for a full breakdown of fees payable. Personal requesters will not be charged a request fee.

Once the request has been processed, the Deputy Information Officer will inform you of the outcome of your request and any additional fees that may fall due.

Please be advised that PAIA provides a number of grounds on which a request for access to information must be refused. These grounds mainly comprise instances where:

  • the privacy and interests of other individuals are protected
  • where such records are already otherwise publicly available
  • instances where public interest are not served
  • the mandatory protection of commercial information of a third party
  • the mandatory protection of certain confidential information of a third party

When completing the form below please:

  • indicate the identity of the person seeking access to the information
  • provide sufficient particulars to enable the deputy information officer to identify the information requested
  • specify the format in which the information is required
  • indicate the contact details of the person requiring the information
  • indicate the right to be exercised and/or to be protected, and specify the reasons why the information required will enable the person to protect and/or exercise the right
  • where the person requesting the information wishes to be informed of the decision of the request in a particular manner, state the manner and particulars to be so informed
  • if the request for information is made on behalf of another person, submit proof that the person submitting the request, has obtained the necessary authorisation to do so

Right of Access

The Information Officer and/or Deputy Information Officer may only provide access to any record held by the organisation to a requester if:

  • The record is required for the exercise or protection of any right, and
  • The requester complies with the procedural requirements relating to a request for access to that record, and
  • Access to that record is not refused in terms of any of the grounds for refusal

Decision for Refusal

The Information Officer and/or Deputy Information Officer must assess whether there are any grounds for refusing a request for access. Where any grounds for refusal are found, a request for access will not be granted. The requester shall be notified of the company’s decision, in the most reasonable manner possible.

In the event where the access to information is refused, the requester shall be provided with a written reason for such refusal.

Right to Challenge

If a requester does not agree with the decision of the company, the requester may lodge a complaint with the Information Regulator or an application with a court against the refusal of the request, and the procedure (including the period) for lodging a complaint with the Information Regulator or the application.

Manual Review

This manual is a working document and will be reviewed periodically but no less than once a year.

Last Revision

July 2024