• Join a team that inspires collaboration

    Come join us at one of the fastest-growing companies. We have some of the most recognized companies as customers. And, most importantly, really smart, fun, curious and creative people from all over the world as colleagues.

     

    Email: le@candylio.com

    Our Values

    We know that our values are a work in progress and will be checked regularly against the reality of where we are, what we want to be and what our customers need from us. For now our shared values guide our actions and describe how we behave in the world:

    • Deliver WOW through service.
    • Be the change you seek.
    • Be honest and kind.
    • Pursue growth and learning.
    • Build a positive team and family spirit.
    • Make decisions that will benefit the next generation.

  • Professional Services

    Project Director

     

    As a Project Director, you will work directly with clients and client's project champions to deliver best-in-class solutions utilizing the Atlassian product suite and ancillary products:

    • Manage and develop client relationships
    • Manage and deliver multiple projects
    • Identify and leverage technologies, frameworks and best practices to apply appropriately given the client's goals, industry, customer values, etc
    • Lead in client requirements gathering, process analysis, deployment and user acceptance testing
    • Design, develop, and modify product add-ons and plug-ins based on functional and system requirements
    • Provide documented guidance and recommendations proactively by consistently leveraging experience and judgement to identify potential blockers
    • Manage scope, project deliverables, assignments and billing ensuring all client deliverables and expectations are met and exceeded
    • Deploy and manage complex Atlassian and ancillary product implementations onto staging and production environments
    • Lead and manage the configuration and testing of product implementations
    • Identify and clear technical and other blockers for team members
    • Work independently on medium to large projects and assignments, taking the leadership and project management role
    • Some travel necessary to assist remote clients; most work completed remotely
    Requirements
    • University degree in Computer Science, Computer Information Systems, Management Information Systems or equivalent
    • Over seven experience with software development, technology management and delivery, Business and IT operations
    • Proven experience building and delivering n-tier solutions
    • Prior experience developing software in small and large team environments
    • Process design and management expertise; SixSigma or related coursework and certification a plus
    • An strong understanding of relational databases
    • Working knowledge of software version control systems such as Git, Subversion, and/or Mecurial
    • Expert-level knowledge in Agile Development Principles and Team Software Development; Scrum Master a plus
    • Expert-level knowledge in test case development and test management
    • Clear breadth and knowledge across various technologies with a clear depth in a handful of areas
    • Experience and practical application of ITSM best practices such as ITIL in areas of service transition and operations (release management, validation testing, incident management, change management, service desk)
    • ITIL certifications a plus
    • Experience with Linux OS Administration a plus
    Other Competencies
    • Ethics and Values – Adheres to a set of core values and beliefs during good times and bad, acts in line with those values. Practice what you preach. 
    • Integrity and Trust – Is widely trusted and is viewed as direct and truthful.
    • Problem Solving – Solves difficult problems logically and with effective solutions.
    • Self-Development – Is personally committed and actively works to continuously improve himself/herself.
    • Humor – Has a positive and constructive sense of humor, is appropriately funny and can use humor to ease tension.
    • Discretion - Has the ability to respect sensitive information.
    • Intellectual Drive – Bright and intelligent, deals with concepts and complexity with ease.
    • Composure – Remains cool under pressure, does not become defensive or irritated when times are tough.
    • Drive for Results – Can be counted on to exceed goals and steadfastly pushes self and others for results.
    • Fast Learner – Learns skills quickly with facing new problems, a relentless and versatile learner, open to change, and analyzes both success and failure for clue to improvement. 
    • Decision Quality – Makes good decisions based on a mixture of analysis, wisdom, experience and judgment.
    • Perseverance – Pursues everything with energy, drive, and a need to finish.
    • Creative – Finds solutions and new and unique ideas, easily makes connections and tends to be seen as value-adding in brainstorming sessions.
    • Proactive – Thinks ahead and prevents potential issues and problems. Routinely takes initiative and is adept at influencing decision makers to stave off potential pitfalls. 

    Sales Executive

    We're looking for a high-energy, passionate Sales Executive to sell business application solutions and be setup for success.

     

    Requirements:
    • Good communication skill
    • Ability to make cold calls/cold emails
    • Attention to details
    Nice to Have:
    • Intermediate English, especially in reading and writing.
    • IT, Softwares knowledge
    Responsibilities:
    • Responsible for all sales activities in assigned accounts.
    • Sales order planning and execution in order to meet quarterly and yearly target.
    • Getting feedback from customers.
    • Follow up with current customers to maintain customers' relationship as well as the chance for up-sell and cross-sell.
    Benefits:

    Our offices are open, highly collaborative and yes, fun! To support you at work (and play) we offer some killer perks: ample time off to relax and recharge, five paid volunteer days a year for your favorite cause, plenty of food and drinks (including beer).

    • Unlimited Annual leave
    • Private Health Care Insurance
    • Flexible working hours
    • Company trip

    Technical Consultant

     

    Candylio is looking for a Technical Consultants to help customer get the most out of their Atlassian softwares.

     

    Requirements:

    • Basic knowledge about system administration.
    • Majored in Computer Science or related fields.
    • Analytical and quantitative skills.
    • Excellent communication skills.
    • Adept learning skills.
    • Cooperation and willingness.
    • Intermediate English: especially in reading and writing.
    Nice to Have:
    • Experience with linux.
    • Knowledge about Atlassian's products.
    Responsibilities:
    • Assisting sales team with proposal for their sales deal.
    • Technical support.
    • Trouble-shooting software issues.
    • Resolves customer issues.
    • Become highly knowledgeable about Atlassian's product.
    • Generating innovative ideas.
    • Testing products and applications.
     
    Benefits:

    Our offices are open, highly collaborative and yes, fun! To support you at work (and play) we offer some killer perks: ample time off to relax and recharge, five paid volunteer days a year for your favorite cause, plenty of food and drinks (including beer).

    • Unlimited Annual leave
    • Private Health Care Insurance
    • Flexible working hours
    • Company trip
  • Engineering & Development

    Front End Developer

    Candylio is looking for an experienced and talented Front End Developer to join the team in Saigon. You’ll be directly impacting the customer experience through the design and implementation of new features and functionalities. You’ll work as part of a small but rapidly growing high-energy team delivering incredible, creative improvements our product. You’ll collaborate with other developers to write the best code for the project and deliver amazing results that our users love.

     

    More about you

    On your first day, we'll expect you to have:

    • Specialization in Javascript, HTML5, CSS

    • Experience with modern Javascript frameworks (e.g., React, AngularJS, Vue)

    • Experience with modern unit testing frameworks (e.g., Mocha, Chai)

    • Deep understanding of front-end architecture and data-driven development

    • Ability to work with designers to develop dynamic user experiences

    It's great, but not required if you have:

    • Experience with Redux, ImmutableJS

    • Experience with large scale single page web applications

    • Familiarity with Java

    • Experience engineering software systems of medium-to-large scope and complexity

    • Practical knowledge of agile software development methodologies (e.g., XP, scrum)

    • Experience with continuous delivery and infrastructure as code

     

    We are always growing, learning, and adapting, in and out of the office. You’ll be joining a team that is highly engaged and direct. We help each other to constantly improve our work and help each other reach our potential. We’re dedicated to being agile, which means we’re constantly learning about our users’ experience and iterating as much as necessary to improve it. We also know all too well the importance of validating assumptions about users and use various types of testing to ensure we're right (or discover where we're wrong). It’s all about improving our user’s experience—no matter who or where it is.

     

    More about the perks

    Our offices are open, highly collaborative and yes, fun! To support you at work (and play) we offer some killer perks: ample time off to relax and recharge, five paid volunteer days a year for your favorite cause, plenty of food and drinks (including beer).

    Senior Developers

    More about you

    On your first day, we'll expect you to have:

    Specialization in Java

    Knowledge of the principles to construct fault-tolerance, reliability and durability software systems

    Knowledge to evaluate tradeoffs between correctness, robustness, performance, space and time

    Understanding of SaaS, PaaS, IaaS industry with hands on experience with public cloud offerings (e.g., AWS, GAE, Azure)

     

    It's great, but not required if you have:

    Experience with Javascript and modern Javascript framework (React, AngularJS, etc…)

    Experience with large scale distributed systems

    Experience with building microservices

    Practical knowledge of agile software development methodologies (e.g., XP, scrum)

    Experience with continuous delivery and infrastructure as code

     

    We are always growing, learning, and adapting, in and out of the office. You’ll be joining a team that is highly engaged and direct. We help each other to constantly improve our work and help each other reach our potential. We’re dedicated to being agile, which means we’re constantly learning about our users’ experience and iterating as much as necessary to improve it. We also know all too well the importance of validating assumptions about users and use various types of testing to ensure we're right (or discover where we're wrong). It’s all about improving our user’s experience—no matter who or where it is.

  • Content & Marketing

    Content Marketing Intern

    Job description: We are looking for a prolific and talented content marketing intern to write and produce various types of downloadable content and blog regularly, to expand our company’s digital footprint, awareness, subscribers, and leads.

     

    This role requires generally:

    · A high level of creativity

    · Attention to detail

    · Project management skills.

     

    This role also require specifically:

    · Preferred: IT, Softwares

    · Intermediate English, especially in reading and writing is a must for international relation branch

    · Having a general background of Marketing content insight, including content for web, as
    well as channel-specific knowledge(Blog, Facebook)

    · A dual-minded approach: You’re highly creative and an excellent writer but can also be process-driven, think scale, and rely on data to make decisions.

     

    Responsibilities:

    · Assist Marketing Executives to design content marketing strategies and set short-term goals

    · Undertake content marketing initiatives and collaborate with design and writing teams to achieve business targets and produce high quality content

    · Optimize content considering SEO and Google Analytics

    · Blog on an ongoing basis to support and promote your offers and to attract site visitors through search, social media, and email subscribers.

    · Grow our subscriber base by providing them with regular, helpful content that’s aligned with their needs and interests.

     

    Benefit:

    • Have a chance on being trained in Marketing (Content section) and Atlassian tools (Confluence, JIRA, JIRA Service Desk)
    • Practice content Marketing knowledge on an international point of views and also, a gap between dosmetic and foreign marketing audience-approaching method.
    • Be flexible and effective on time working and management
  • Contact Us

    Don't be afraid to reach out. You + us = awesome.

    7 floor, 131 Tran Huy Lieu, ward 8, Phu Nhuan district, Ho Chi Minh city, Viet Nam
    Mon-Fri 9am-5pm
    (028) 39954888
×
Privacy Policy
PRIVACY POLICY – TRUST & TRANSPARENCY
1. What our policy covers
Your privacy and the integrity of your personal data is very important to CANDYLIO, and so is being transparent about how we may receive, collect, use, and share information about you. This policy is intended to help you understand CANDYLIO’s Privacy Policies.

This Privacy Policy covers the information we receive from you or collect about you when you use our Site or Services, or otherwise interact with us (for example, by attending our events), unless a different policy is displayed.  CANDYLIO, we and us refers to Pyramid Consulting SA and any of our corporate affiliates.  CANDYLIO’s mission is to help its clients “build Digital teams and solutions” in doing so we offer web and software development services as well as staffing and recruitment services, we refer to these as "Services" in this policy.

If you do not agree with this Privacy Policy, do not access or use our Site or Services or interact with any other aspect of our business.

Where we provide the Services under contract with an organization or yourself that contract may further control the information processed by CANDYLIO.
2. What information we collect about you
We collect information about you when you provide it to us, when you use our Services, and when other sources provide it to us, as further described below.
Information you provide to us: We collect information about you when you input it into the Services or otherwise provide it directly to us.

Content you provide through our websites: The Services also include our websites owned or operated by us. We collect other content that you submit to these websites, which include social media or social networking websites operated by us. For example, you may provide content to us when you apply to online job openings, spontaneously send us your résumé, use our contact form to make business or Services enquiries, provide feedback or when you participate in any interactive features, surveys, contests, promotions, activities or events.

Device and Connection Information: We may collect information about your computer, phone, tablet, or other devices you use to access the Site. This device information includes your connection type and settings when you install, access, update, or use of our Services. We may also collect information through your device about your operating system, browser type, IP address, URLs of referring/exit pages, device identifiers, and crash data. We use your IP address and/or country preference in order to approximate your location to provide you with a better Service experience. How much of this information we collect depends on the type and settings of the device you use to access the Services. Server and data center Service administrators can disable collection of this information via the administrator settings or prevent this information from being shared with us by blocking transmission at the local network level.

Cookies and Other Tracking Technologies: CANDYLIO and our third-party partners, such as Google analytics, may use cookies and other tracking technologies (e.g., web beacons, device identifiers and pixels) to provide functionality and to recognize you across different Services and devices. A cookie disclaimer and acceptance banner conditions usage of our Site.
3. How we use information we receive and/or collect
Below are the specific purposes for which we use the information we receive or collect about you.
To communicate with you about the Services: We may use your contact information and information to communicate about our Services, offer you to engage into a Services Contract, enter into a partnership with CANDYLIO relating to the Services.

To market, promote and drive engagement with the Services: We may use your contact information and information to send promotional communications that may be of specific interest to you, including by email and by displaying CANDYLIO ads on other companies' websites and applications, as well as on platforms like Linked-In, Facebook and Google, etc.  These communications are aimed at driving, including information about new services, survey requests, newsletters, and events we think may be of interest to you.  You can control whether you receive these communications as described below under "Opt-out of communications."

To power our customer relationship management (CRM) database: Our CRM database may store personal data and information relating to individuals and/or companies with whom we already have a Services relationship or want to develop one. The information used for these purposes include relevant business information, such as: contact data, publicly available information (e.g. your public posts, information, publications on social media sites if relevant for business purpose), your responses to targeted e-mail. If you wish to be excluded from our CRM databases, please contact us at joseph@candylio.com.

For safety and security: We use information about you and your Service use to verify accounts and activity, to monitor suspicious or fraudulent activity and to identify violations of Service policies.

To protect our legitimate business interests and legal rights: Where required by law or where we believe it is necessary to protect our legal rights, interests and the interests of others, we use information about you in connection with legal claims, compliance, regulatory, and audit functions, and disclosures in connection with the acquisition, merger or sale of a business.

Special Legal bases for collecting and processing information of EEA residents: If you are an individual residing in the European Economic Area (EEA), we may only collect and process information about you (i.e. “personal data” as defined in the General Data Protection Regulation 2016/679) where we have legal bases for doing so and under the strict respect of applicable EU laws and regulations.

This means we may collect and use your information only where:
It satisfies a legitimate business interest (which is not overridden by your data protection interests), such as to fulfill Service contracts we might have with you, to market and promote the Services, to conduct research and development and to protect our legal rights and interests;
You give us explicit consent to do so for a specific purpose;
We need to process your data to comply with a legal obligation.

If you have consented to our use of information about you for a specific purpose, you have the right to change your mind at any time, you also have the right to access personal information we may hold about you and to ask that your personal information be corrected, updated, or deleted. If you would like to exercise this right, please contact us at the following email address joseph@candylio.com.
4. How does CANDYLIO share information it receives and/or collects
We share information we receive and collect about you in the ways discussed below, including in connection with the Services, but we are not in the business of selling information about you to advertisers or other third parties.
Sharing with other Service users: When you accept to use the Services, we share certain information about you with other Service users.
If another Services user needs to access information about you for us to perform the Services, they do so under the obligation, to observe all policies and procedures designed to protect your information hereunder.

Links to Third Party Sites: The Site may include links that direct you to other websites or services whose privacy practices may differ from ours. If you submit information to any of those third party sites, your information is governed by their privacy policies, not this one. We encourage you to carefully read the privacy policy of any website you visit.

With your consent: We share information about you with third parties when you give us consent to do so. For example, we may display personal testimonials of satisfied customers on our public websites. With your consent, we may post your name alongside the testimonial.

Compliance with Enforcement Requests and Applicable Laws; Enforcement of Our Rights: In exceptional circumstances, we may share information about you with a third party if we believe that sharing is reasonably necessary to (a) comply with any applicable law, regulation, legal process or governmental request, including to meet national security requirements, (b) enforce our agreements, policies and terms of service, (c) protect the security or integrity of our products and services, (d) protect CANDYLIO, our customers or the public from harm or illegal activities.

Sharing with CANDYLIO companies: We share information we receive or collect with affiliated companies. Affiliated companies are companies owned by CANDYLIO. The protections of this privacy policy apply to the information we share in these circumstances.

Business Transfers: We may share or transfer information we collect under this privacy policy in connection with any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company. You will be notified via email and/or a prominent notice on the Services if a transaction takes place, as well as any choices you may have regarding your information.
5. How does CANDYLIO store and secure information it receives and/or collects
Information storage and security: We use data hosting service providers in the United States, France, Vietnam, and Singapore, to host the information we receive and/or collect, and we use technical measures to secure your data (data encryption, data segregation, physical security processes, etc.).

While we implement safeguards designed to protect your information, no security system is impenetrable and in case of breach of your information we will implement the following Personal Data Breach Notification Policy.

In our customer relationship management (CRM) database: Our CRM database may store personal data and information relating to individuals and/or companies with whom we already have a Services relationship or want to develop one. If you wish to be deleted from our CRM databases, please contact us at joseph@candylio.com.

How long we keep information: How long we keep information we collect about you depends on the type of information, as described in further detail below. After such time, we will either delete or anonymize your information.

Promotional information: If you have elected to receive information emails from us, we retain information about your promotional preferences for a reasonable period of time from the date you last expressed interest in our Services, such as when you last opened or answered an email from us. We retain possible information derived from cookies and other tracking technologies for a reasonable period of time from the date such information was created.
6. How can you access and control your information?
You have certain choices available to you when it comes to your information. Below is a summary of those choices, how to exercise them and any limitations.
Your Choices: You have the right to request a copy of your information, to object to our use of your information (including for marketing purposes), to request the deletion or restriction of your information, or to request your information in a structured, electronic format. Below, we describe the tools and processes for making these requests. If you have unresolved concerns, you may have the right to complain to a data protection authority in the country where you live, where you work or where you feel your rights were infringed.

Request that we stop using your information: In some cases, you may ask us to stop accessing, storing, using and otherwise processing your information where you believe we don't have the appropriate rights to do so. Where you gave us consent to use your information for a limited purpose, you can contact us to withdraw that consent, but this will not affect any processing that has already taken place at the time. You can also opt-out of our use of your information for marketing purposes by contacting us, as provided below.

Opt out of communications: You may opt out of receiving promotional communications from us by i) using the unsubscribe link within our email, or ii) requesting so by answering any of our emails in case it does not contain a direct unsubscribe link.

Data portability: Data portability is the ability to obtain some of your information in a format you can move from one service provider to another (for instance, when you transfer your mobile phone number to another carrier). Depending on the context, this applies to some of your information, but not to all of your information. Should you request it, we will provide you with an electronic file of your basic personal information.

Right to withdraw consent: If we rely on your consent to process your Personal Data, you have the right to withdraw that consent at any time. This will not affect the lawfulness of processing based on your prior consent.

Right to lodge a complaint with the data protection authority: If you have a concern about our privacy practices, including the way we have handled your Personal Data, you can report it to the data protection authority that is authorized to hear those concerns.

Changes: We may update this Privacy Policy from time to time in order to reflect, for example, changes to our practices or for other operational, legal or regulatory reasons.

Contact us: For more information about our privacy practices, if you have questions, or if you would like to make a complaint, please contact us by e-mail joseph@candylio.com or mail to:

CANDYLIO
Lvl 7, 131 Tran Huy Lieu
Ward 8, District Phu Nhuan, Ho Chi Minh City
Vietnam.
PERSONAL DATA BREACH NOTIFICATION POLICY
1. Introduction
1.1 This policy sets out the policies and procedures of Pyramid Consulting SA and its subsidiaries (the "company") with respect to detection of personal data breaches, responding to personal data breaches and notification of personal data breaches to supervisory authorities, data controllers and data subjects.
1.2 When dealing with personal data breaches, the company and all company personnel must focus on protecting individuals and their personal data, as well as protecting the interests of the company.
2. Definitions
2.1 In this policy:
(a) "appointed person" means the individual primarily responsible for dealing with personal data breaches affecting the company, being the data protection officer of the company;
(b) "data controller" means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data;
(c) "data processor" means a natural or legal person, public authority, agency or other body which processes personal data on behalf of the controller;
(d) "data subject" means an identified or identifiable natural person; an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person;
(e) "personal data" means any information relating to a data subject;
(f) "personal data breach" means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed by the company (including any temporary or permanent loss of control of, or inability to access, personal data); and
(g) "supervisory authority" means the National data protection authority (as formalized by the GDPR) where the breach occured.
3. Responding to personal data breaches
3.1 All personnel of the company must notify the appointed person immediately if they become aware of any actual or possible personal data breach.
3.2 The appointed person is primarily responsible for investigating possible and actual personal data breaches and for determining whether any notification obligations apply. Where notification obligations apply, the appointed person is responsible for notifying the relevant third parties in accordance with this policy.
3.3 All personnel of the company must cooperate with the appointed person in relation to the investigation and notification of personal data breaches.
3.4 The appointed person must determine whether the company is acting as a data controller and/or a data processor with respect to each category of personal data that is subject to a personal data breach.
3.5 The steps to be taken by the appointed person when responding to a personal data breach may include:
(a) ensuring that the personal data breach is contained as soon as possible;
(b) assessing the level of risk to data subjects as soon as possible;
(c) gathering and collating information from all relevant sources;
(d) considering relevant data protection impact assessments;
(e) informing all interested persons within the company of the personal data breach and the investigation;
(f) assessing the level of risk to the company; and
(g) notifying supervisory authorities, data controllers, data subjects and others of the breach in accordance with this policy.
3.6 The appointed person shall keep a full record of the response of the company to a personal data breach, including the facts relating to the personal data breach, its effects and the remedial action taken. This record shall form part of the personal data breach register of the company.
4. Notification to supervisory authority
4.1 This section 4 applies to personal data breaches affecting personal data with respect to which the company is acting as a data controller.
4.2 The company must notify the supervisory authority of any personal data breach to which this section 4 applies without undue delay and, where feasible, not later than 72 hours after the company becomes aware of the breach, save as set out in subsection 4.4.
4.3 Personal data breach notifications to the supervisory authority must be made by the appointed person using the form set out in schedule 1 (Notification of personal data breach to supervisory authority). The completed form must be sent to the supervisory authority by secure and confidential means. The appointed person must keep a record of all notifications, and all other communications with the supervisory authority relating to the breach, as part of the personal data breach register of the company.
4.4 The company will not notify the supervisory authority of a personal data breach where it is unlikely to result in a risk to the rights and freedoms of natural persons. The appointed person shall be responsible for determining whether this subsection 4.4 applies, and the appointed person must create a record of any decision not to notify the supervisory authority. This record should include the appointed person's reasons for believing that the breach is unlikely to result in a risk to the rights and freedoms of natural person. This record shall be stored as part of the personal data breach register of the company.
4.5 To the extent that the company is not able to provide to the supervisory authority all the information specified in schedule 1 (Notification of personal data breach to supervisory authority) at the time of the initial notification to the supervisory authority, the company must make all reasonable efforts to ascertain the missing information. That information must be provided to the supervisory authority, by the appointed person, as and when it becomes available. The appointed person must create a record of the reasons for any delayed notification under this subsection 4.5. This record shall be stored as part of the personal data breach register of the company.
4.6 The company must keep the supervisory authority informed of changes in the facts ascertained by the company which affect any notification made under this section 4.
5. Notification to data controller
5.1 This section 5 applies to personal data breaches affecting personal data with respect to which the company is acting as a data processor.
5.2 The company must notify the affected data controller(s) of any personal data breach to which this section 5 applies without undue delay and, where feasible, not later than 72 hours after the company becomes aware of the breach. In addition, the company must comply with the provisions of the contract(s) with the affected data controller(s) relating to such notifications.
5.3 Personal data breach notifications to the affected data controller(s) must be made by the appointed person using the form set out in schedule 2 (Notification of personal data breach to data controller). The completed form must be sent to the affected data controller(s) by secure and confidential means. The appointed person must keep a record of all notifications, and all other communications with the affected data controller(s) relating to the breach, as part of the personal data breach register of the company.
5.4 To the extent that the company is not able to provide to the affected data controller(s) all the information specified in schedule 2 (Notification of personal data breach to data controller) at the time of the initial notification to the affected data controller(s), the company must make all reasonable efforts to ascertain the missing information. That information must be provided to the affected data controller(s), by the appointed person, as and when it becomes available.
6. Notification to data subjects
6.1 This section 6 applies to personal data breaches affecting personal data with respect to which the company is acting as a data controller.
6.2 The company must notify the affected data subjects of any personal data breach to which this section 6 applies if the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons, save as set out in subsection 6.4.
6.3 Personal data breach notifications to the affected data subjects must be made by the appointed person in clear and plain language using the form set out in schedule 3 (Notification of personal data breach to data subject). The completed form must be sent to the affected data subjects by appropriate means. The appointed person must keep a record of all notifications, and all other communications with the affected data subjects relating to the breach, as part of the personal data breach register of the company.
6.4 The company has no obligation to notify the affected data subject of a personal data breach if:
(a) the company has implemented appropriate technical and organisational protection measures (in particular those that render the personal data unintelligible to any person who is not authorised to access it, such as encryption), and those measures have been applied to the personal data affected by the personal data breach;
(b) the company has taken subsequent measures which ensure that a high risk to the rights and freedoms of data subjects is no longer likely to materialise;
(c) it would involve disproportionate effort (in which case, there shall instead be a public communication or similar measure whereby the data subjects are informed in an equally effective manner), providing that the appointed person shall be responsible for determining whether this subsection 6.4 applies, and the appointed person must create a record of any decision not to notify the affected data subjects. This record should include the appointed person's reasons for believing that the breach does not need to be notified to the affected data subjects. This record shall be stored as part of the personal data breach register of the company.
6.5 If the company is not required by this section 6 to notify affected data subjects of a personal data breach, the company may nonetheless do so where such notification is in the interests of the company and/or the affected data subjects.
7. Other notifications
7.1 Without affecting the notification obligations set out elsewhere in this policy, the appointed person should also consider whether to notify any other third parties of a personal data breach. Notifications may be required under law or contract. Relevant third parties may include:
(a) the police;
(b) other law enforcement agencies;
(c) insurance companies;
(d) regulatory authorities;
(e) financial institutions;
(f) trade unions or other employee representatives; and/or
(g) Leasing/Rental Companies.
8. Reviewing and updating this policy
8.1 The DPO shall be responsible for reviewing and updating this policy.
8.2 This policy must be reviewed and, if appropriate, updated annually on or around [date].
8.3 This policy must also be reviewed and updated on an ad hoc basis if reasonably necessary to ensure:
(a) the compliance of the company with applicable law, codes of conduct or industry best practice;
(b) the security of data stored and processed by the company; or
(c) the protection of the reputation of the company.
8.4 The following matters must be considered as part of each review of this policy:
(a) changes to the legal and regulatory environment;
(b) changes to any codes of conduct to which the company subscribes;
(c) developments in industry best practice;
(d) any new data collected by the company;
(e) any new data processing activities undertaken by the company; and
(f) any security incidents affecting the company.