Collection of Personal Information and Sensitive Personal Information
In the last 12 months, we have collected the following categories of personal information from or about employees, including information about employees’ family members, dependents, and beneficiaries. For each category of information, the categories of third parties to whom we have disclosed, sold, or shared the information within the last 12 months are referenced by a letter that coincides with the letter in the list of categories of service providers and third parties that follows soon after this table.
|CATEGORY||EXAMPLES||DISCLOSED IN THE LAST 12 MONTHS TO|
|Personal Identifiers||Name, alias, social security number, date of birth, driver’s license or state identification card number, passport number, employee ID number, and employee File number.||A, B, C, D, E, F, G, H|
|Contact Information||Home, postal or mailing address, email address, home phone number, cell phone number.||A, B, C, D, E, F, G, H|
|Account Information||Username and password for Company accounts and systems, and any required security or access code, password, or credentials allowing access to your Company accounts.||C, D, E, F, K|
|Protected Classifications||Race, ethnicity, gender, age, disability, medical or mental condition, military status, familial status. or union membership.||B, C, D, E, F, G|
|Physical Characteristics or Description||Information on your Driver’s License (such as eye color, hair color, height, and weight), as well as information collected to the extent relevant for workplace investigations or enforcement of Company policies on appearance and grooming (such as tattoos, piercings).||B, C, D, E, F, G|
|Biometric Data||Fingerprints||Not Disclosed|
|Financial Information||Bank account number for direct deposit or other financial account information.||A, B, F, G|
|Pre-Hire Information||Information provided in your job application or resume, information gathered as part of background screening and reference checks, job interview notes by persons conducting job interviews for the Company, the information contained in candidate evaluation records and assessments, information in work product samples you provided, and voluntary disclosures by you.||A, B, D, E, F, G|
|Employment History||Information regarding prior job experience, positions held, names of previous supervisors, and your salary history or expectations when permitted by applicable law.||B, E, F, G|
|Education Information||Information from resumes regarding educational history; information obtained from transcripts or records of degrees and vocational certifications obtained.||B, E, F, G|
|Professional or Employment-Related Information||Information contained in your personnel file and other employment documents and records, including information contained in the following types of records: new hire or onboarding records, I-9 forms, tax forms, time and attendance records, non-medical leave of absence records, workplace injury records, performance evaluations and records, disciplinary records, investigatory records, training records, licensing and certification records, compensation records, health benefits records, COBRA notifications, parking applications, employee housing benefit records, business expense records, and payroll records.||A, B, C, D, E, F, G|
|Travel Information||Information regarding business travel, vacation, and personal travel plans, and for infectious disease contact tracing purposes, the locations traveled to within the applicable infectious period before coming to the workplace and the dates spent in those locations.||B, E, F, G|
|Family Information||Contact information for family members listed as emergency contacts, contact information for dependents and other dependent information, medical and health information for family members related to symptoms, exposure, contact tracing, diagnosis, testing, or vaccination for infectious diseases (e.g., COVID-19), pandemics, or other public health emergencies, as well as information related to their travel and whom they have been in close contact with during the applicable infectious period.||B, E, F, G, H|
|Information of Friends, Co-workers, and Other Associates with Whom You Have Been in Close Contact per applicable infectious disease guidelines||Medical and health information provided to the Company for an employee’s friends, co-workers, and other associates related to symptoms, exposure, contact tracing, diagnosis, testing, or vaccination for infectious diseases (e.g., COVID-19), pandemics, or other public health emergencies, as well as information related to their travel and whom they have been in close contact with during the applicable infectious period.||B, E, F, G, H|
|Medical and Health Information||Medical information
contained in such documents as doctor’s notes for absences or work
restrictions, medical leave of absence records, requests for
accommodation, interactive process records, and accommodation
records, and correspondence with you and your medical or mental
health provider(s) regarding any request for accommodation or
medical leave of absence, as well as information in post-hire drug
test results, and information related to symptoms, exposure,
contact tracing, diagnosis, testing, or vaccination for infectious
diseases (e.g., COVID-19), pandemics, or other public health
This includes medical information and health benefits information for dependents and beneficiaries.
|B, E, F, G, H|
|Internet, Network, and Computer Activity||Internet or other electronic network activity information related to the usage of Company networks, servers, intranet, shared drives, or Company-issued computers and electronic devices, including system and file access logs, browsing history, search history, and usage history||B, E, F, G|
|Online Portal and Mobile App Access and Usage Information||Username, password, account history, usage history, and file access logs.||B, E, F, G|
|Geolocation Data||The IP address recorded on Company-issued computers, electronic devices, and vehicles, as well as timekeeping applications on cell phones that employees use to clock in and out and that log the IP address at which each time entry was made||B, E, F, G|
|Visual, Audio or Video Recordings in the Workplace||Your image, when recorded or captured in surveillance camera footage or pictures of employees taken in the workplace or at a Company function or event, or in pictures or video of employees posted on social media to which the Company or its managers have access or that are submitted to the Company by another employee or third party.||B, C, D, E, F, G, H, I, J|
|Facility & Systems Access Records||Information identifying which employees accessed secure Company facilities, systems, networks, computers, and equipment and at what times using their keys, badges, fobs, login credentials, or other security access methods.||B, D, E, F, G,|
|Inferences||Based on analysis of the personal information collected, we may develop inferences regarding employees’ preferences, characteristics, psychological trends, predispositions, behavior, attitudes, intelligence, abilities, and aptitudes for purposes of employment and management decisions related to staffing, assignments, responsibilities, team composition, hiring, promotion, demotion, and termination, among other things.||E, F, G, H|
|Contents of Personal Communications where the Company is not the intended recipient||If you use Company email, phones, computers, online chat applications (Slack, Teams, Zoom, etc.) or other Company systems for personal communications where the Company is not the intended recipient of the communication, the Company retains these communications in the ordinary course of managing its communication and computer systems and under the Company’s data retention policy. Employees have no expectation of privacy concerning any communications or data they send, receive, access or store on any company computer or system, including any personal communications. The Company may monitor, access, review, and use all such communications and data for lawful business purposes detailed below, including managing and evaluating employee performance and making employment decisions.||Not Disclosed|
Of the above categories of Personal Information, the following are categories of Sensitive Personal Information we may collect from or about employees:
- Personal Identifiers (social security number, driver’s license or state identification card number, passport number)
- Account Information (your Company account log-in, in combination with any required security or access code, password, or credentials allowing access to the account)
- Protected Classifications (Race, ethnicity, gender, age, disability, medical or mental condition, military status, familial status)
- Biometric Information (used to identify you uniquely)
- Medical and Health Information
- Geolocation Data (IP address)
- Contents of Personal Communications (contents of mail, email, and text messages where the Company is not the intended recipient)
Personal information does not include:
- Publicly available information from government records.
- Information that a business has a reasonable basis to believe is lawfully made available to the general public by the employee or from widely distributed media.
- Information made available by a person to whom the employee has disclosed the information if the employee has not restricted the information to a specific audience.
- De-identified or aggregated information.
We may collect your personal information from the following sources:
- You, the employee, when you voluntarily submit information for employment purposes
- Company-issued computers, electronic devices, and vehicles
- Company systems, networks, software applications, and databases you log into or use in the course of performing your job, including from vendors the Company engages in managing or hosting such systems, networks, applications or databases
- Surveillance cameras at our physical locations
- Credit and consumer reporting agencies
- Drug testing and physical testing providers and vendors
- HR support vendors, including administrators of benefits, workers’ compensation, unemployment claims, payroll, timekeeping, expense management
- Social media platforms
- Staffing agencies
- Personal references and former employers
- Our other employees, contractors, vendors, suppliers, guests, visitors, and customers, based on your interactions with them
We may disclose, sell, or share your personal information with the following categories of service providers or third parties:
- Financial institutions
- Government agencies
- Benefits administrators and vendors, including third-party administrators, 401K administrators, workers’ compensation and unemployment administrators
- Insurance carriers, administrators, and brokers
- Employee talent management systems, including document management, training, and testing systems
- Payroll processors, timekeeping vendors, and vendors providing services for purposes of our human resources information system (HRIS)
- Consulting and investigation firms, including human resources consultants, safety consultants, and workplace investigators
- Communications providers
- Social media platforms
- Our corporate customers (meaning an entity, as opposed to a natural person, that purchases, leases, or finances any of our products or services)
- IT, cybersecurity, and privacy vendors and consultants
By referring to the letter corresponding to the category, the above table specifies what categories of service providers and third parties we disclose, sell or share personal information.
We may collect and use your personal information for the following business purposes:
- To fulfill or meet the purpose for which you provided the information. For example, if you share your name and contact information to become an employee, we will use that Personal Information in connection with your employment.
- To comply with local, state, and federal laws and regulations requiring employers to maintain certain records (such as immigration compliance records, travel records, personnel files, wage and hour records, payroll records, accident or safety records, and tax records).
- To manage and process payroll and/or Company travel and expenses.
- To validate an employee’s identity for payroll and timekeeping purposes.
- To maintain commercial insurance policies and coverages, including workers’ compensation and other liability insurance.
- To manage workers’ compensation claims.
- To administer, manage, and maintain group health insurance benefits, 401K and/or retirement plans, and other Company benefits and perks.
- To manage employee performance of their job duties and/or employee conduct, including by engaging in lawful monitoring of employee activities and communications when they are on duty, on Company premises, or utilizing Company internet and WiFi connections, computers, networks, devices, software applications or systems.
- To conduct workplace investigations (such as investigations of workplace accidents or injuries, harassment, or other misconduct).
- To evaluate job applicants and candidates for employment or promotions.
- To obtain and verify background checks on job applicants and employees and to verify employment references.
- To evaluate, make, and communicate decisions regarding an employee’s employment, including hiring, terminating, promoting, demoting, transferring, suspending, or disciplining.
- To communicate with employees regarding employment-related matters such as upcoming benefits enrollment deadlines, action items, availability of W2s, and other alerts and notifications.
- To grant employees access to secure Company facilities and maintain information on who accessed the facility.
- To keep Company facilities secure.
- To engage in corporate transactions requiring review or disclosure of employee records subject to non-disclosure agreements, such as for evaluating potential mergers and acquisitions of the Company.
- To communicate with an employee’s family or other contacts in case of emergency or other necessary circumstances.
- To manage employee recognition programs.
- To promote and foster workplace diversity, equity, and inclusion.
- INFECTIOUS DISEASE PURPOSES (pandemic, outbreak, public
health emergency, etc.)
- To reduce the risk of spreading the disease in or through the workplace.
- To protect employees and other consumers from exposure to infectious diseases (e.g., COVID-19).
- To comply with local, state, and federal law, regulations, ordinances, guidelines, and orders relating to infectious diseases, pandemics, outbreaks, and public health emergencies, including applicable reporting requirements.
- To facilitate and coordinate pandemic-related initiatives and activities (whether Company-sponsored or through the U.S. Center for Disease Control and Prevention, other federal, state, and local governmental authorities, and/or public and private entities or establishments, including vaccination initiatives).
- To identify potential symptoms linked to infectious diseases, pandemics, and outbreaks (including through temperature checks, antibody testing, or symptom questionnaire).
- To permit contact tracing relating to any potential exposure to infectious diseases.
- To communicate with employees and other consumers regarding potential exposure to infectious diseases (e.g., COVID-19) and properly warn others who have had close contact with an infected or symptomatic individual so that they may take precautionary measures, help prevent the further spread of the virus, and obtain treatment, if necessary.
- To evaluate, assess, and manage the Company’s business relationship with vendors, service providers, and contractors that provide services to the Company.
- To improve user experience on Company computers, networks, devices, software applications or systems, and to debug, identify, and repair errors that impair existing intended functionality of our systems.
- To detect security incidents involving potentially unauthorized access to and/or disclosure of Personal Information or other confidential information, including proprietary or trade secret information and third-party information that the Company receives under conditions of confidentiality or subject to privacy rights.
- To protect against malicious or illegal activity and prosecute those responsible for such actions.
- To prevent identity theft.
- To verify and respond to consumer requests under applicable consumer privacy laws.
We may disclose your personal information for the following business purposes as numbered above 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, and 26.
We do NOT and will not sell your personal information in exchange for monetary or other valuable consideration. We do not share your personal information for cross-context behavioral advertising.
We do NOT and will not use or disclose your sensitive personal information for purposes other than the following:
- To perform the services reasonably expected by an average employee who requests those services.
- To detect security incidents compromising the availability, authenticity, integrity, and confidentiality of stored or transmitted personal information.
- To resist malicious, deceptive, fraudulent, or illegal actions directed at the business and prosecute those responsible.
- To ensure the physical safety of natural persons.
- For short-term, transient use.
- To perform services on behalf of the Company.
- To verify or maintain the quality or safety of a product, service or device that is owned, manufactured, manufactured for, or controlled by the Company, and to improve, upgrade, or enhance the service or device that is owned, manufactured by, manufactured for, or controlled by the Company.
- For purposes that do not involve inferring characteristics about the consumers.
Retention of Personal Information
We will retain each category of personal information in accordance with our data retention schedule, which you can access here . In deciding how long to retain each category of personal information that we collect, we consider many criteria, including, but not limited to, the business purposes for which the Personal Information was collected; relevant federal, state, and local recordkeeping laws; applicable statute of limitations for claims to which the information may be relevant; and legal preservation of evidence obligations.
We apply our data retention procedures on an annual basis to determine if the business purposes for collecting the personal information, and legal reasons for retaining the personal information, have both expired. If so, we will securely purge the information.
We may use other companies and individuals to perform certain functions on our behalf. Examples include administering e-mail and payroll services. Such parties only have access to the personal information needed to perform these functions and may not use or store the information for any other purpose.
In the event we sell or transfer a particular portion of our business assets, employee information may be one of the business assets transferred as part of the transaction. If substantially all of our assets are acquired, employee information may be transferred as part of the acquisition.
Compliance With Law and Safety
We may disclose specific personal and/or sensitive personal information based on a good faith belief that such disclosure is necessary to comply with or conform to the law or that such disclosure is necessary to protect our employees or the public.
The personal data record created through your registration for your employee email account and timekeeping and payroll system applications can only be accessed with the unique password associated with those records. To protect the integrity of the information contained in those records, you should not disclose or otherwise reveal your passwords to third parties.
Employees and Their Family Members, Dependents, and Beneficiaries Under the Age of 16
We do not knowingly sell or share the personal information of employees or any of their family members, dependents, or beneficiaries under 16 years of age.
How We Protect the Information That We Collect
The protection of the information that we collect about employees is of the utmost importance to us, and we take every reasonable measure to ensure that protection, including:
- We use commercially reasonable tools and techniques to protect against unauthorized system access.
- We restrict access to private information to those who need such access in the course of their duties for us.
Rights Under the CCPA and CPRA
- Right to Know. The right to request, up to 2 times in a 12-month period, that we identify to you (1) the categories of personal information we have collected, shared or sold about you, (2) the categories of sources from which the personal information was collected, (3) the business purpose for which we use this information, and (4) the categories of third parties with whom we disclose or have disclosed your personal information;
- Right to Access. The right to request, up to 2 times in a 12-month period, that we provide you access to or disclose to you the specific pieces of personal information we have collected about you;
- Right to Delete. The right to request, up to 2 times in a 12-month period, that we delete personal information that we have collected from you, subject to certain exceptions;
- Right to Correct. The right to request that we correct inaccurate personal information (to the extent such an inaccuracy exists) that we maintain about you;
- The right to designate an authorized agent to submit one of the above requests on your behalf. See below for how you can designate an authorized agent; and
- The right not to be discriminated against or retaliated against for exercising the above rights.
You Can Submit Any of the Above Types of Requests by Any of the 2 Options Below
- Submit an online request via email at email@example.com
- Call our privacy toll-free line at 833-821-4989.
How We Will Verify That it is Really You Submitting the Request
If you are a California resident, when you submit a Right to Know, Right to Access, Right to Delete, or Right to Correct request through one of the above methods, we will ask you to provide some information to verify your identity and to respond to your request. Specifically, we will ask you to verify information that can be used to link your identity to particular information in our possession, which depends on the nature of your relationship and interaction with us. For example, we may need you to provide your name, address, email, phone number, last four digits of your social security number, and your date of birth.
Responding to your Right to Know, Right to Access, Right to Delete, and Right to Correct Requests
Upon receiving a verifiable request from a California resident, we will confirm receipt of the request no later than ten (10) business days after receiving it. We endeavor to respond to a verifiable request within forty-five (45) calendar days of receipt. If we require more time (up to an additional 45 calendar days, or 90 calendar days total from the date we receive your request), we will inform you of the reason and extension period in writing. Our response will also explain why we cannot comply with a request, if applicable. We will deliver our written response by mail or electronically, at your option.
We do not charge a fee to process or respond to your verifiable request unless it is excessive, repetitive, or manifestly unfounded. If we determine that the request warrants a fee, we will tell you why we made that decision and provide a cost estimate before completing your request.
For a request to correct inaccurate personal information, we will accept, review, and consider any documentation you provide. We may require that you provide documentation to rebut our own documentation that the personal information is accurate. You should make a good-faith effort to provide us with all necessary information at the time that you make the request to correct. We may deny a request to correct if we have a good faith, reasonable, and documented belief that a request to correct is fraudulent or abusive. If we deny your request to correct, we shall inform you of our decision not to comply and explain why we believe the request is fraudulent.
If You Have an Authorized Agent
If you are a California resident, you can authorize someone else as an authorized agent who can submit a request on your behalf. To do so, you must either (a) execute a valid, verifiable, and notarized power of attorney or (b) provide other written, signed authorization that we can then verify. When we receive a request submitted on your behalf by an authorized agent who does not have a power of attorney, that person will be asked to provide written proof that they have your permission to act on your behalf. We will also contact you and ask you for information to verify your own identity directly and not through your authorized agent. We may deny a request from an authorized agent if the agent does not provide your signed permission demonstrating that you have authorized them to act on your behalf.
Consent to Terms and Conditions
Individuals With Disabilities
This Policy is in a form that is or will be made accessible to individuals with disabilities.
Questions About the Policy