Delete Knowledge Base Entry
Are you sure?
Multi-company training terms and conditions - Kademy - chunk 51
no more than seven years thereafter 1.3 Types of personal data Names, job titles, contact details 1.4 Categories of data subject Customer employees Technical and organisational measures 2.1 The Supplier has robust information security policies and procedures in place to protect personal data from unauthorised access from the point of collection to the point of destruction. This includes encryption, firewalls, access controls, policies and other procedures. The Supplier engages third party professional IT support to ensure that these policies and procedures remain appropriate and up to date.
AIAgent