Privacy policy.

Data Privacy and Protection Policy

Introduction

This Data Privacy and Protection Policy outlines how Detect (“we”, “our”, “us”) ensures the privacy and protection of personal and non-personal data such as geospatial, historical, and imagery data related to utility assets. This policy is designed to comply with applicable laws and regulations and to foster trust with our users by safeguarding their data. 

Scope

This policy applies to all employees, contractors, and third-party service providers who handle data on behalf of Detect. 

Information We Collect

Personal Information: Name and email address.

Usage Data: Information about how you use our services, including your IP address, browser data, and usage patterns. This data is used solely for maintaining and managing our services.

Geospatial Data: Data related to utility assets including transmission/distribution poles and historical access data. 

Historical Data: Historical utility asset data including faults, defects and construction data.

Imagery Data: Imagery collected during infield inspections, used for reporting, defect detection and analytics. 

How We Use Your Information

  • To provide, operate, and maintain our services

  • To improve, personalize, and expand our services

  • To communicate with you for customer service purposes

  • To support the development of analytics and AI tools for utility asset management.

Information Sharing and Disclosure

Third-Party Service Providers: We work with third-party service providers (such as Google Cloud) to facilitate our services. These providers assist us in data storage, processing, and analysis. The data collected is solely owned by our users, and we ensure that third-party providers adhere to strict confidentiality and security measures to protect this data.

Legal Requirements: We may disclose your information if required to do so by law or in response to valid requests by public authorities. 

Business Transfers: In the event of a merger, acquisition, or sale of our business or assets, your information may be transferred. We will notify you of any such change in ownership or control of your personal information. 

Data Security

We implement appropriate technical and organizational measures to protect your personal information from unauthorized access, use, or disclosure. 

Your Rights

  • Access, update, or delete your personal information.

  • Access, update, or delete your asset data, including images and inspection data.

  • Opt-out of marketing communications.

  • Request the restriction of processing your personal information. 

Changes to This Privacy Policy

We may update this Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on our website.

Data Collection and Use

Personal Data: Includes name and email address collected for communication and account management purposes.

Usage Data: Information about how users interact with our services, including IP address, browser type, and usage patterns, used solely for maintaining and improving our services.

Geospatial and Historical Data: Data related to utility assets, such as transmission/distribution poles and historical access data.

Imagery Data: Collected during field inspections, used for reporting, defect detection, and analytics. 

Data Protection Principles

Lawfulness, Fairness, and Transparency: Data is processed lawfully, fairly, and transparently in relation to individuals and organizations.

Purpose Limitation: Data is collected for specified, explicit, and legitimate purposes and not further processed in a manner that is incompatible with those purposes.

Data Minimization: Data collected is adequate, relevant, and limited to what is necessary in relation to the purposes for which it is processed.

Accuracy: Data is accurate and, where necessary, kept up to date.

Storage Limitation: Data is kept in a form that permits identification of data subjects for no longer than is necessary for the purposes for which the data is processed.

Integrity and Confidentiality: Data is processed in a manner that ensures appropriate security, including protection against unauthorized or unlawful processing and against accidental loss, destruction, or damage. 

Data Subject Rights

Access: Organizations and individuals have the right to access their data and obtain information about how it is processed.

Rectification: Organizations and individuals have the right to request correction of inaccurate data.

Erasure: Organizations and individuals have the right to request the deletion of their data, subject to legal and contractual restrictions.

Restriction of Processing: Organizations and individuals have the right to request the restriction of processing of their data.

Data Portability: Organizations and individuals have the right to receive their data in a structured, commonly used, and machine-readable format and to transmit it to another controller.

Objection: Organizations and individuals have the right to object to the processing of their data in certain circumstances. 

Data Security Measures

Encryption: Data at rest is encrypted using AES-256 and data in transit is encrypted using TLS.

Access Controls: Implement role-based access controls to ensure that only authorized personnel have access to data.

Incident Response: Maintain an incident response plan to detect, respond to, and mitigate data breaches and other security incidents.

Regular Audits: Conduct regular security audits and assessments to ensure compliance with this policy and applicable laws. 

Third-Party Data Sharing

Due Diligence: Conduct due diligence on third-party service providers to ensure they comply with applicable data protection laws and this policy.

Data Processing Agreements: Require third-party service providers to sign data processing agreements that include data protection and confidentiality obligations. 

Employee Responsibilities

Training: Provide regular data protection training for all employees to ensure they understand their responsibilities under this policy.

Confidentiality: Require employees to sign confidentiality agreements and adhere to data protection policies and procedures.' 

Changes to This Privacy Policy

We may update this Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on our website.

Contact Us

If you have any questions about this Privacy Policy, please contact us at contact@detectinspections.com.