Data Management Policy
Policy Owner: Jarvis Luong
Effective Date: 25.01.2025
To ensure that information is classified, protected, retained and securely disposed of in accordance with its importance to the organization.
All Tekai data, information and information systems.
Tekai classifies data and information systems in accordance with legal requirements, sensitivity, and business criticality in order to ensure that information is given the appropriate level of protection. Data owners are responsible for identifying any additional requirements for specific data or exceptions to standard handling requirements.
Information systems and applications shall be classified according to the highest classification of data that they store or process.
To help Tekai and its employees easily understand requirements associated with different kinds of information, the company has created three classes of data.
Highly sensitive data requiring the highest levels of protection; access is restricted to specific employees or departments, and these records can only be passed to others with approval from the data owner, or a company executive. Example include:
Tekai proprietary information requiring thorough protection; access is restricted to employees with a "need-to-know" based on business requirements. This data can only be distributed outside the company with approval. This is default for all company information unless stated otherwise.
Examples include:
Documents intended for public consumption which can be freely distributed outside Tekai.
Examples include:
Confidential data should be labeled "confidential" whenever paper copies are produced for distribution.
Confidential data is subject to the following protection and handling requirements:
Restricted data is subject to the following protection and handling requirements:
No special protection or handling controls are required for public data. Public data may be freely distributed.
Tekai shall retain data as long as the company has a need for its use, or to meet regulatory or contractual requirements. Once data is no longer needed, it shall be securely disposed of or archived. Data owners, in consultation with legal counsel, may determine retention periods for their data.
Personally identifiable information (PII) shall be deleted or de-identified as soon as it no longer has a business use.
Retention periods shall be documented in the Data Retention Matrix in Appendix B to this policy.
Data classified as restricted or confidential shall be securely deleted when no longer needed. Tekai shall assess the data and disposal practices of third-party vendors in accordance with the Third-Party Management Policy. Only third-parties who meet Tekai requirements for secure data disposal shall be used for storage and processing of restricted or confidential data.
Tekai shall ensure that all restricted and confidential data is securely deleted from company devices prior to, or at the time of, disposal.
Confidential and Restricted hardcopy materials shall be shredded or otherwise disposed of using a secure method.
Personally identifiable information (PII) shall be collected, used and retained only for as long as the company has a legitimate business purpose. PII shall be securely deleted and disposed of following contract termination in accordance with company policy, contractual commitments and all relevant laws and regulations. PII shall also be deleted in response to a verified request from a consumer or data subject, where the company does not have a legitimate business interest or other legal obligation to retain the data.
Management shall review data retention requirements during the annual review of this policy. Data shall be disposed of in accordance with this policy.
Under certain circumstances, Tekai may become subject to legal proceedings requiring retention of data associated with legal holds, lawsuits, or other matters as stipulated by Tekai legal counsel. Such records and information are exempt from any other requirements specified within this Data Management Policy and are to be retained in accordance with requirements identified by the Legal department. All such holds and special retention requirements are subject to annual review with Tekai's legal counsel to evaluate continuing requirements and scope.
Tekai will measure and verify compliance to this policy through various methods, including but not limited to, business tool reports, and both internal and external audits.
Requests for an exception to this policy must be submitted to the CTO/CIO for approval.
Any known violations of this policy should be reported to the CIO/CTO. Violations of this policy can result in immediate withdrawal or suspension of system and network privileges and/or disciplinary action in accordance with company procedures up to and including termination of employment.
Version | Date | Description | Author | Approved by |
1.0 | 01.03.2025 | First Version | Lucas |
Â
Tekai's Engineering Team is responsible for setting and enforcing the data retention and disposal procedures for Tekai managed accounts and devices.
through manual data deletion processes.
In cases where a device is damaged in a way that Tekai cannot access the Recovery Partition to erase the drive, Tekai may optionally decide to use an E-Waste service that includes data destruction with a certificate. Tekai will keep certificates of destruction on record for one year. Physical destruction can be optional if it is verified that the device is
encrypted with Full Disk Encryption, which would negate the risk of data recovery. Management will review this procedure at least annually.
System or Application | Data Description | Retention Period |
Tekai SaaS Products | Customer Data | Up to 60 days after contract termination |
Tekai AutoSupport | Customer instance and metadata, debugging data | Indefinite |
Tekai Customer Support Tickets | Support Tickets and Cases | Indefinite |
Tekai Customer Support Phone Conversations | Support Phone Conversations | Indefinite |
Tekai Security EventData | Security and system event and log data, network data flow logs | On-Premise - Indefinite AWS Instance - 1 year |
Tekai VulnerabilityScan Data | Vulnerability scan results and detection data | 6 monthshost (asset) data is retained until removed and purged |
Tekai Customer Sales | Opportunity and Sales Data | Indefinite |
Tekai QA and TestingData | QA, testing scenarios and results data | Indefinite |
Security Policies | Security Policies | 1 year after archive |
Temporary Files | AWS /tmp ephemeral storage | automatically when process finishes |