Data Retention Policy

1. Purpose, Scope, and Users

This policy sets the required retention periods for specified categories of personal data and sets out the minimum standards to be applied when destroying certain information within NexMuv, LLC (further: the “Company”).

This Policy applies to all business units, processes, and systems in all countries in which the Company conducts business and has dealings or other business relationships with third parties.

This Policy applies to all Company officers, directors, employees, agents, affiliates, contractors, consultants, advisors, customers, or service providers that may collect, process, or have access to data (including personal data and / or sensitive personal data). It is the responsibility of all of the above to familiarise themselves with this Policy and ensure adequate compliance with it.

This policy applies to all information used at the Company. Examples of documents include:

  • Emails
  • Hard copy documents
  • Soft copy documents
  • Images, Video, and audio
  • Data generated by physical access control systems

2. Reference Documents

  • EU GDPR 2016/679 (Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC)
  • US Federal Acquisition Regulation; Retention Periods
  • Texas State Records Retention Schedule
  • Personal Data Protection Policy

3. Retention Rules

3.1 Retention General Principle

In the event, for any category of documents not specifically defined elsewhere in this Policy (and in particular within the Data Retention Schedule) and unless otherwise mandated differently by applicable law, the required retention period for such document will be deemed to be 5-years from the date of creation of the document.

3.2. Retention General Schedule

Data Protection Officer defines the time period for which the documents and electronic records should be retained through the Data Retention Schedule.

As an exemption, retention periods within the Data Retention Schedule can be prolonged in cases such as:

  • Ongoing investigations from Member States authorities, if there is chance records of personal data are needed by the Company to prove compliance with any legal requirements; or
  • When exercising legal rights in cases of lawsuits or similar court proceedings recognized under local law.

3.3. Safeguarding of Data during the Retention Period

The possibility that data media used for archiving will wear out shall be considered. If electronic storage media are chosen, any procedures and systems ensuring that the information can be accessed during the retention period (both with respect to the information carrier and the readability of formats) shall also be stored in order to safeguard the information against loss as a result of future technological changes. The responsibility for the storage falls to the Data Supervisor.

3.4. Destruction of Data

The Company and its employees should, therefore, on a regular basis, review all data, whether held electronically on their device or on paper, to decide whether to destroy or delete any data once the purpose for which those documents were created is no longer relevant. See Appendix for the retention schedule. Overall responsibility for the destruction of data falls to the Data Supervisor.

Once the decision is made to dispose of according to the Retention Schedule, the data should be deleted, shredded or otherwise destroyed to a degree equivalent to their value to others and their level of confidentiality. The method of disposal varies and is dependent upon the nature of the document. For example, any documents that contain sensitive or confidential information (and particularly sensitive personal data) must be disposed of as confidential waste and be subject to secure electronic deletion; some expired or superseded contracts may only warrant in-house shredding. The Document Disposal Schedule section below defines the mode of disposal.

In this context, the employee shall perform the tasks and assume the responsibilities relevant for the information destruction in an appropriate way. The specific deletion or destruction process may be carried out either by an employee or by an internal or external service provider that Data Supervisor subcontracts for this purpose. Any applicable general provisions under relevant data protection laws and the Company’s Personal Data Protection Policy shall be complied with.

Appropriate controls shall be in a place that prevents the permanent loss of essential information of the company as a result of malicious or unintentional destruction of information – these controls are described in information security policies.

Data Supervisor shall fully document and approve the destruction process. The applicable statutory requirements for the destruction of information, particularly requirements under applicable data protection laws, shall be fully observed.

3.5. Breach, Enforcement, and Compliance

The person appointed with responsibility for Data Protection (is a member of the Chief Technology Officers) has the responsibility to ensure that each of the Company’s offices complies with this Policy. It is also the responsibility of the is a member of the Chief Technology Officers to assist any local office with inquiries from any local data protection or governmental authority.

Any suspicion of a breach of this Policy must be reported immediately to the Data Protection Officer. All instances of suspected breaches of the Policy shall be investigated and action taken as appropriate.

Failure to comply with this Policy may result in adverse consequences, including, but not limited to, loss of customer confidence, litigation, and loss of competitive advantage, financial loss and damage to the Company’s reputation, personal injury, harm or loss. Non-compliance with this Policy by permanent, temporary or contract employees, or any third parties, who have been granted access to Company premises or information, may, therefore, result in disciplinary proceedings or termination of their employment or contract. Such non-compliance may also lead to legal action against the parties involved in such activities.

4. Document Disposal

4.1. Routine Disposal Schedule

Records which may be routinely destroyed unless subject to an on-going legal or regulatory inquiry are as follows:

  • Announcements and notices of day-to-day meetings and other events including acceptances and apologies;
  • Requests for ordinary information such as travel directions;
  • Reservations for internal meetings without charges / external costs;
  • Transmission documents such as letters, fax cover sheets, e-mail messages, routing slips, compliments slips and similar items that accompany documents but do not add any value;
  • Message slips;
  • Superseded address list, distribution lists, etc.;
  • Duplicate documents such as CC and FYI copies, unaltered drafts, snapshot printouts or extracts from databases and day files;
  • Stock in-house publications which are obsolete or superseded; and
  • Trade magazines, vendor catalogs, flyers and newsletters from vendors or other external organizations.

In all cases, disposal is subject to any disclosure requirements which may exist in the context of litigation.

4.2. Destruction Method

Level I documents are those that contain information that is of the highest security and confidentiality and those that include any personal data. These documents shall be disposed of as confidential waste (cross-cut shredded and incinerated) and shall be subject to secure electronic deletion. Disposal of the documents should include proof of destruction.

Level II documents are proprietary documents that contain confidential information such as parties’ names, signatures, and addresses, or which could be used by third parties to commit fraud, but which do not contain any personal data. The documents should be cross-cut shredded and then placed into locked rubbish bins for collection by an approved disposal firm, and electronic documents will be subject to secure electronic deletion.

Level III documents are those that do not contain any confidential information or personal data and are published Company documents. These should be strip-shredded or disposed of through a recycling company and include, among other things, advertisements, catalogs, flyers, and newsletters. These may be disposed of without an audit trail.

5. Data Retention Schedule Guideline

Record name

Storage location

Person responsible for storage

Controls for record protection

Retention time

Data Retention Schedule

NexMuv Data Protection Officer’s computer

Data Protection Officer

Only authorized persons may access this document

5 years

Call List and substitution

NexMuv Storage Data breach response team leader

Data breach response team leader

Only authorized persons can edit the files

Permanently

Contact details

NexMuv Storage Data breach response team leader

Data breach response team leader

Only authorized persons can edit the files

Permanently

Document decisions of the Data Breach Response Team

NexMuv Storage Data breach response team leader

Data breach response team leader

Only Data Breach Response Team leader can edit the files

5 years

Data breach notifications

NexMuv Storage Data breach response team leader

Data breach response team leader

Only Data Breach Response Team leader can edit the files

5 years

Record name

Storage location

Person responsible for storage

Controls for record protection

Retention time

Bookings

NexMuv Database breach response team leader

Data breach response team leader

Only authorized persons can edit the files

Permanently

Company Trademarks

NexMuv Storage Data breach response team leader

Data breach response team leader

Only authorized persons can edit the files

Permanently

This document was last updated on November 24, 2022