13. Data Breach

13. Data Breach

A privacy breach occurs when there is unauthorized access to or collection, use, disclosure or disposal of personal information. You will be notified about data breaches when BIMeta Corporation believes you are likely to be at risk or serious harm. For example, a data breach may be likely to result in serious financial harm or harm to your mental or physical well-being. In the event that BIMeta Corporation becomes aware of a security breach which has resulted or may result in unauthorized access, use or disclosure of personal information BIMeta Corporation will promptly investigate the matter and notify the applicable Supervisory Authority not later than 72 hours after having become aware of it, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons.



    • Related Articles

    • What Is GDPR (General Data Protection Regulations)?

      The General Data Protection Regulation (GDPR) sets out guidelines that cover various aspects of data protection and privacy for individuals within the European Union (EU) and the European Economic Area (EEA), including how organizations should ...
    • STANDARD CONTRACTUAL CLAUSES FOR DATA TRANSFERS BETWEEN THE UK AND USA

      Clause 1: Definitions 1. *Data Exporter:* The UK-based representative transmitting the personal data. 2. *Data Importer:* The USA-based representative receiving the personal data. 3. *Personal Data:* Any information relating to an identified or ...
    • Acceptable Use Policy

      Last updated June 23, 2024 This Acceptable Use Policy ("Policy") is part of our Terms and Conditions ("Legal Terms") and should therefore be read alongside our main Legal Terms: https://support.bimeta.net/portal/en/kb/articles/terms-and-conditions. ...
    • Privacy Policy

      Last updated June 22, 2024 This privacy notice for BIMeta Corporation ("we," "us," or "our"), describes how and why we might collect, store, use, and/or share ("process") your information when you use our services ("Services"), such as when you: ...
    • Module Security

      So, you created your module and works fine, but is it secure? You must ensure that your module is secure and is not vulnerable to any SQL Injections are directory traversing. You can find below best practices to ensure that your module will be ...