Personal data protection

This section outlines how Sinch Contact Pro handles personal data, detailing the system’s features and functions that support compliance with relevant data privacy laws and industry-specific regulations.

Important notice and disclaimers

Note: This guide is provided for general informational purposes only and does not constitute legal advice. No guarantees or warranties, express or implied, are provided regarding its content. Organizations should consult their legal teams to ensure that their data protection practices align with applicable legal requirements.

Key points:

  • Compliance with data privacy laws ultimately remains the responsibility of each organization.
  • Sinch Contact Pro offers tools to help manage personal data responsibly. Compliance with data privacy laws is not a built-in product feature.
  • Sinch does not provide legal advice. Definitions and terms in this guide are not taken from legal sources.

Definitions

This section establishes the key terminology used throughout the document, ensuring a common understanding of personal data protection practices

Term

Definition

Personal data

Information that can identify or help identify a living individual, either on its own or when combined with other data.

Sensitive personal data

A subset of personal data that includes details such as race, ethnicity, political opinions, religious beliefs, health, and similar sensitive topics.

Business purpose

A legitimate, clearly defined reason (whether legal, contractual, or otherwise) for processing personal data.

Blocking

Restricting access to personal data when it is no longer needed for its primary purpose, ensuring that it is not used in regular searches.

Deletion

The permanent removal of personal data so that it cannot be recovered or used.

Retention period

The time span during which personal data is maintained, in accordance with legal and organizational requirements.

End of purpose (EoP)

The point at which personal data is no longer required for its primary purpose, triggering its deletion or blocking.

Technical and organizational measures

Security practices such as access control and role-based data separation that protect data integrity and confidentiality.