You are about to access a page that collects personal information. Here is a brief overview of how we use and protect your data.
Guiding Principles
Individual ownership, control and access.
This means that you can request that we update or remove your information at any time.
Clear responsibility.
This means that we will clearly outline who you can contact and how we are responsible for the safeguarding of your data.
Informed consent.
This means that we will clearly indicate how and when we’re collecting your information and give you the opportunity to opt-out.
Minimal burden.
This means we will collect only the minimal information required to provide our services and retain it only for as long as necessary.
Prioritized security.
This means that we will use appropriate security tools including physical security, encryption, hashing, policies, access control, training and audit logs, to protect your data and will not take shortcuts or otherwise knowingly put your data at risk.
What information is collected?
We collect data that is directly submitted by you, via forms on paper and on this website.
When you go to a website, the website receives data about you from your computer. All websites receive this information.
For example, we receive your IP address, the web browser and operating system you are using and any cookies (small pieces of data stored on your computer) that have been set in the past. The only cookie we set indicates whether you have accepted this privacy policy in the past.
Who is my information shared with?
We sometimes work with other service providers to provide our services. For example, we may use services like Google Suite, Google Analytics, Microsoft Office 365, Stacker, or AirTable.
We may — or you may directly — disclose your information to other service providers. When we do this, we try to select service providers who have strong privacy policies and enforcement of their procedures via technological tools we can verify.
When we do work with partners, we monitor data privacy through a range of technological measures proportional to the type of data being stored. For sensitive data, partner selection will be especially careful to ensure this data is adequately protected.
We will never sell your information to a third party, nor will we use your information to sell you anything or target advertising.
Who can access my information and how is it used?
Kitselas Employment & Training and Kitselas Five Tier System LP collect, store and may use information that you provide to us via submissions on this website. We use the provided information:
- To provide services to you.
- To maintain contact with you.
- To evaluate your needs and eligibility for our programs.
- To understand and evaluate our community’s needs and programs.
- To comply with legal requirements, including contractual agreements with funding agencies and legitimate court orders.
- To do analysis, such as statistical analysis, but never in a way which would compromise your privacy. For example, we may identify and publish the average age of the population, but we would never publish uniquely-identifying data.
We will only allow people who have a legitimate need to access the information for one of those reasons to access the information.
Is my information secure?
Security of your information is core to our decision-making process. We currently use a variety of safeguards to protect your information including requiring encryption (both in-transit and at-rest), secure passwords, and audit logs.
Who do I contact? How do I access or remove my information?
If you have someone at Kitselas Employment & Training or Kitselas Five Tier System LP you have been working with, such as a coordinator, counsellor, or caseworker, you can contact them to discuss the use and security of your personal information.
For any reason, you can always contact our information controller via email at info@k5t.ca to answer any questions about how we collect, use, share, disclose and store your information or to access, update or remove your personal information.
For your protection, to access or remove your personal information, you will have to prove your identity.
Would you like to continue?