fix encoding

This commit is contained in:
Moses Rolston 2025-04-24 22:39:15 -07:00
parent dd24396bd1
commit ecb22097b8
3 changed files with 8 additions and 8 deletions

View File

@ -1,4 +1,4 @@
This policy outlines what happens with your personal data once youve applied to a job through our careers page. This policy outlines what happens with your personal data once you've applied to a job through our careers page.
Applicant Information: If you apply for a job at Lab6ix through our careers page we will ask you to provide some personal information, including: Applicant Information: If you apply for a job at Lab6ix through our careers page we will ask you to provide some personal information, including:
@ -6,17 +6,17 @@ Applicant Information: If you apply for a job at Lab6ix through our careers page
Home Address Home Address
Phone number Phone number
Email address Email address
Links to social media sites relevant to the job(s) youre applying for Links to social media sites relevant to the job(s) you're applying for
Various basic questions to gain a high level understanding of your skills and interest in the job(s) youre applying for Various basic questions to gain a high level understanding of your skills and interest in the job(s) you're applying for
We also receive information via your shared social platforms like LinkedIn, as well as resumes cover letters. Your information gets stored in some of our IT platforms such as Greenhouse, Enboarder, Entelo, LinkedIn, and potentially any others we might use to evaluate your candidacy. We also receive information via your shared social platforms like LinkedIn, as well as resumes cover letters. Your information gets stored in some of our IT platforms such as Greenhouse, Enboarder, Entelo, LinkedIn, and potentially any others we might use to evaluate your candidacy.
We use this personal information to gain an understanding of your skills, qualifications, and experience. If youve applied for jobs at Lab6ix in the past, we use the new information youve provided to sync and update the previous information so we have the most accurate and current view of you as an applicant. We hang on to your contact information for one year in order to communicate with you throughout the application process, keep you informed of any new fitting opportunities, and to report on and improve on our own recruitment process. After the end of that window, we will send you an email to see if youd like us to keep your personal information on file so we can continue to consider you for new opportunities. We use this personal information to gain an understanding of your skills, qualifications, and experience. If you've applied for jobs at Lab6ix in the past, we use the new information you've provided to sync and update the previous information so we have the most accurate and current view of you as an applicant. We hang on to your contact information for one year in order to communicate with you throughout the application process, keep you informed of any new fitting opportunities, and to report on and improve on our own recruitment process. After the end of that window, we will send you an email to see if you'd like us to keep your personal information on file so we can continue to consider you for new opportunities.
We may also request and collect additional information such as: We may also request and collect additional information such as:
Desired salary or other compensation-related benefits Desired salary or other compensation-related benefits
Location youll plan to work from Location you'll plan to work from
How you heard about Lab6ix How you heard about Lab6ix
Whether you are legally authorized to work in the country you are applying to work in Whether you are legally authorized to work in the country you are applying to work in
Notes from interviews with Lab6ix team members Notes from interviews with Lab6ix team members

View File

@ -5,8 +5,8 @@ This Data Security Policy ("Data Security Policy") is provided by LAB6IX, Inc.,
1.2 Security Management and Third-Party Security Audit. Lab6ix will maintain an externally accredited and business-wide Information Security Management System based on ISO 27001, or equivalent, as recommended by good industry practice, as applicable. Lab6ix engages an industry-recognized third-party auditor to conduct a SOC 2 security audit ("SOC 2") on at least an annual basis. Lab6ix will, upon written request, provide Customer with copies of its then-current SOC 2, including the applicable scope. 1.2 Security Management and Third-Party Security Audit. Lab6ix will maintain an externally accredited and business-wide Information Security Management System based on ISO 27001, or equivalent, as recommended by good industry practice, as applicable. Lab6ix engages an industry-recognized third-party auditor to conduct a SOC 2 security audit ("SOC 2") on at least an annual basis. Lab6ix will, upon written request, provide Customer with copies of its then-current SOC 2, including the applicable scope.
1.3 Customer Audit. Customer may, at its sole cost and expense, upon no less than thirty (30) business days advance written notice to Lab6ix, and no more than once per calendar year, perform, and Lab6ix will reasonably assist with (during regular business hours), a remote vendor risk assessment ("VRA"). The VRA shall consist of a review of Lab6ixs security related documentation (at a scope to be mutually agreed) regarding its compliance with this Data Security Policy. Upon review of such materials, if Customer cannot find the assurances it considers necessary by review of such security documentation, then Customer may submit reasonable requests for information security and audit questionnaires that are necessary to confirm Lab6ixs compliance with this Data Security Policy, and Lab6ix will make appropriate personnel reasonably available (during regular business hours) to answer such questions related to Lab6ixs compliance with this Data Security Policy. In the event of a Security Breach that requires reporting to a supervisory authority or other governmental authority, Customer may conduct an additional VRA on no less than thirty (30) business days notice. In addition to Customers audit rights herein, Lab6ix will reasonably cooperate and respond (during regular business hours) to Customers annual security questionnaires. Any information exchanged with the activities described in this Section is deemed to be Lab6ixs Confidential Information. 1.3 Customer Audit. Customer may, at its sole cost and expense, upon no less than thirty (30) business days' advance written notice to Lab6ix, and no more than once per calendar year, perform, and Lab6ix will reasonably assist with (during regular business hours), a remote vendor risk assessment ("VRA"). The VRA shall consist of a review of Lab6ix's security related documentation (at a scope to be mutually agreed) regarding its compliance with this Data Security Policy. Upon review of such materials, if Customer cannot find the assurances it considers necessary by review of such security documentation, then Customer may submit reasonable requests for information security and audit questionnaires that are necessary to confirm Lab6ix's compliance with this Data Security Policy, and Lab6ix will make appropriate personnel reasonably available (during regular business hours) to answer such questions related to Lab6ixs compliance with this Data Security Policy. In the event of a Security Breach that requires reporting to a supervisory authority or other governmental authority, Customer may conduct an additional VRA on no less than thirty (30) business days' notice. In addition to Customer's audit rights herein, Lab6ix will reasonably cooperate and respond (during regular business hours) to Customer's annual security questionnaires. Any information exchanged with the activities described in this Section is deemed to be Lab6ix's Confidential Information.
1.4 System Protection & Disaster Recovery. Lab6ix has disaster recovery and business continuity plans, and reviews each, and tests its disaster recovery plan, annually. Upon request, Lab6ix will provide a summary of its disaster recovery and business continuity planning and management practices, and the same shall be treated as Lab6ixs Confidential Information under this Data Security Policy. 1.4 System Protection & Disaster Recovery. Lab6ix has disaster recovery and business continuity plans, and reviews each, and tests its disaster recovery plan, annually. Upon request, Lab6ix will provide a summary of its disaster recovery and business continuity planning and management practices, and the same shall be treated as Lab6ix's Confidential Information under this Data Security Policy.
1.5 Security Breach. Lab6ix will notify Customer without undue delay after detecting a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, Personal Data transmitted, stored or otherwise processed by Lab6ix (any such incident, a “Security Breach”). Such notification will include (to the extent known by Lab6ix): (a) a description of the nature of the Security Breach (including, where possible, the categories and approximate number of Data Subjects and data records concerned); (b) the details of a contact point where more information concerning the Security Breach can be obtained; (c) its likely consequences; and (d) the measures taken or proposed to be taken to address the Security Breach, including to mitigate its possible adverse effects. Where, and insofar as, it is not possible to provide all this information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay. 1.5 Security Breach. Lab6ix will notify Customer without undue delay after detecting a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, Personal Data transmitted, stored or otherwise processed by Lab6ix (any such incident, a “Security Breach”). Such notification will include (to the extent known by Lab6ix): (a) a description of the nature of the Security Breach (including, where possible, the categories and approximate number of Data Subjects and data records concerned); (b) the details of a contact point where more information concerning the Security Breach can be obtained; (c) its likely consequences; and (d) the measures taken or proposed to be taken to address the Security Breach, including to mitigate its possible adverse effects. Where, and insofar as, it is not possible to provide all this information at the same time, the initial notification shall contain the information then available and further information shall, as it becomes available, subsequently be provided without undue delay.

View File

@ -99,4 +99,4 @@ A particular Issue will not be eligible for this SLA, and Lab6ix may resolve a p
SLA Credits SLA Credits
In the event of a violation of this SLA, Customer will be issued a SLA credit of $5000 per incident. Requests for Invoice Credits must be made within 30 days of the Incident that triggered the credit. In no event shall Invoice Credits exceed the invoice value of the term in which they are accrued. A pending credit does not release Client from its obligation to pay Lab6ixs submitted invoices in full when due. SLA Credits are the Customers sole and exclusive remedy to violations of this SLA. In the event of a violation of this SLA, Customer will be issued a SLA credit of $5000 per incident. Requests for Invoice Credits must be made within 30 days of the Incident that triggered the credit. In no event shall Invoice Credits exceed the invoice value of the term in which they are accrued. A pending credit does not release Client from its obligation to pay Lab6ix's submitted invoices in full when due. SLA Credits are the Customer's sole and exclusive remedy to violations of this SLA.