The purpose of this Code of Conduct and Ethics (the “Code”) is to ensure that all employees, contractors, consultants and representatives of Hospitality Growth Benefits LTD (the “Company”) adhere to the highest standards of ethical conduct and professional behaviour. This Code provides guidelines to help individuals act with integrity, accountability, and respect in accordance with UK laws and regulations.
This Code applies to all employees, contractors, consultants, temporary and agency staff, and any other individuals working for or on behalf of Hospitality Growth Benefits LTD .
4.1 Professionalism:
4.2 Respect & Non-Discrimination:
4.3 Honesty & Integrity:
All employees of Hospitality Growth Benefits LTD are required to acknowledge their understanding and commitment to this Code of Conduct & Ethics.
1.1 Background to the UK-General Data Protection Regulation (‘UK-GDPR’)
This policy is based on the UK-GDPR and the ICO’s guidance on the UK-GDPR and also complies with the Data Protection Act 2018, which defines the law of processing data on identifiable living people and most of it does not apply to domestic use. Anyone holding personal data for other purposes is legally liable to comply with this Act, with a few notable exceptions.
This policy applies to all personal information processed by, or on behalf of our Company.
All personal data must be handled and dealt with appropriately however it is collected, recorded and used, and whether it is on paper, in electronic records or recorded in other formats, on other media, or by any other means. It includes information held on computers (including email), paper files, photographs, audio recordings and CCTV images.
The purpose of this policy is to help you understand what personal data our Company collects, why we collect it and what we do with it. It will also help you to identify what your rights are and who you can contact for more information, to exercise your rights or to make a complaint.
1.2 Definitions according to Article 4 of the UK-GDPR
Personal data – any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person;
Data controller – the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data;
Data processor – means a natural or legal person, public authority, agency or other body which processes personal data on behalf of the controller;
Processing – any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction;
Personal data breach – a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed;
Consent of the data subject – means any freely given, specific, informed and unambiguous indication of the data subject’s wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her;
Child – the UK-GDPR defines a child as anyone under the age of 13 years old. The processing of personal data of a child shall be lawful only if and to the extent that consent is given or authorised by the holder of parental responsibility over the child.
Third party – a natural or legal person, public authority, agency or body other than the data subject, controller, processor and persons who, under the direct authority of the controller or processor, are authorised to process personal data;
Filing system – means any structured set of personal data which are accessible according to specific criteria, whether centralised, decentralised or dispersed on a functional or geographical basis.
Third country– means a country or territory outside the United Kingdom;
2.1 Hospitality Growth Benefits LTD, is committed to compliance with all relevant domestic laws in respect of personal data, and the protection of the “rights and freedoms” of individuals whose information we collect and process in accordance with the UK-GDPR.
2.2 Compliance with the UK-GDPR is described by this policy and other relevant policies such as the Information Security Policy (ISP) along with connected processes and procedures.
2.3 The UK-GDPR and this policy shall apply to all of our Company’s data processing functions, including those performed on customers’, clients’, employees’, suppliers’, and partners’ personal data, and any other personal data the organisation processes from any source.
2.4 Our Company has established objectives for data protection and privacy, which are in the Personal Information Management System (PIMS).
2.5 Hospitality Growth Benefits LTD shall be responsible for reviewing the register of data processing annually in the light of any changes to the Company activities and to any additional requirements identified by means of Data Protection Impact Assessment (DPIA).
2.6 This policy applies to all Employees/Staff/Contractors/Clients/Partners and third-party providers of our Company. Any breach of the UK-GDPR will be dealt with as described under our Data Breach Notification Procedure and may also be a criminal offence, in which case the matter will be reported as soon as possible to the appropriate authorities.
2.7 Partners and any third parties working with or for our Company, and who have or may have access to personal data, will be expected to have read, understood and to comply with this policy. No third party may access personal data held by our Company without having first entered into a Data Confidentiality Agreement, which imposes on the third-party obligations no less onerous than those to which our Company is committed, and which gives us the right to audit compliance with the agreement.
To support compliance with the UK-GDPR, our Board has approved and supported the development, implementation, maintenance and continual improvement of a documented PIMS, which is integrated within the ISP, for our Company.
All our Employees/Staff and third-party providers identified in the inventory are expected to comply with this policy and with the PIMS/ISP that implements this policy. All Employees/Staff will receive appropriate training.
Scope
The scope of the PIMS will cover all of the PII (Personally Identifiable Information) that the organisation holds including PII that is shared with external organisations such as suppliers, cloud providers, etc.
In determining its scope for compliance with the UK-GDPR, we consider:
The PIMS is documented within the ISP system, maintained in our Intranet. Our Company’s objectives for compliance with the UK-GDPR are consistent with this policy, measurable, take into account UK-GDPR privacy requirements and the results from risk assessments and risk treatments, monitored, communicated and updated as appropriate.
4.1 We are a data controller for staff and marketing data and a data processor for client data under the UK-GDPR.
4.2 All those in managerial or supervisory roles throughout our Organisation are responsible for developing and encouraging good information handling practices within our Company.
4.3 Hospitality Growth Benefits LTD and our Board of Directors are accountable for the management of personal data within our Company and for ensuring that compliance with data protection legislation and good practice can be demonstrated. This accountability includes development and implementation of the UK-GDPR as required by this policy, and security and risk management in relation to compliance with the policy.
4.4 The Legal Compliance Department has been appointed to take responsibility for our Company’s compliance with this policy on a day-to-day basis and has direct responsibility for ensuring that our Company complies with the UK-GDPR.
4.5 The Legal Compliance Department is the first point of contact for Employees/Staff seeking clarification on any aspect of data protection compliance.
4.6 Compliance with data protection legislation is an obligation for all our Employees/Staff who process personal data.
4.7 Our Company’s Training Policy sets out specific UK-GDPR training and awareness requirements in relation to specific roles of our Employees/Staff generally.
4.8 Our Employees/Staff are responsible for ensuring that any personal data about them and supplied by them to our Company is accurate and up-to-date.
All processing of personal data must be conducted in accordance with the data protection principles as set out in Articles 5 and 6 of the UK-GDPR. Our policies and procedures are designed to ensure compliance with the principles.
Personal data must be processed lawfully, fairly and transparently
Lawfully – you must identify a lawful basis before you can process personal data. These are often referred to as the “conditions for processing”, for example, consent.
Fairly – in order for processing to be fair, the data controller has to make sure that personal data are handled in ways that the data subject would reasonably expect and not use it in ways that have unjustified adverse effects on it.
Transparently – Transparent processing is about being clear, open and honest with people from the start about who you are, and how and why you use their personal data. We ensure that we tell individuals about our processing in a way that is easily accessible and easy to understand. You must use clear and plain language.
The specific information that must be provided to the data subject must, as a minimum, include:
Personal data can only be collected for specific, explicit and legitimate purposes
Personal Data must be collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes; The Privacy Procedure sets out the relevant procedures.
Personal data must be adequate, relevant and limited to what is necessary for processing
The Legal Compliance Department is responsible for ensuring that we do not collect information that is not strictly necessary for the purpose for which it is obtained.
All data collection forms (electronic or paper-based), including data collection requirements in new information systems, must include a fair processing statement or a link to privacy statement and approved by the Legal Compliance Department.
The Legal Compliance Department will ensure that, on an annual basis all data collection methods are reviewed by internal audit to ensure that collected data continues to be adequate, relevant and not excessive.
Personal data must be accurate and kept up to date with every effort to erase or rectify without delay
Data that is stored by the data controller must be reviewed and updated as necessary. No data should be kept unless it is reasonable to assume that it is accurate. The Legal Compliance Department is responsible for ensuring that all staff are trained in the importance of collecting accurate data and maintaining it.
Employees/Staff/clients/contractors and third-party providers should be required to notify the Company of any changes in circumstance to enable personal records to be updated accordingly. It is the responsibility of the Company to ensure that any notification regarding change of circumstances is recorded and acted upon.
The Legal Compliance Department is responsible for ensuring that appropriate procedures and policies are in place to keep personal data accurate and up to date, taking into account the volume of data collected, the speed with which it might change and any other relevant factors.
On at least an annual basis, the Legal Compliance Department will review the retention dates of all the personal data processed by our Company, by reference to the data inventory, and will identify any data that is no longer required in the context of the registered purpose. This data will be securely deleted/destroyed in line with the Information Disposal Policy.
The Legal Compliance Department is responsible for responding to requests for rectification from data subjects within one month. This can be extended to a further two months for complex requests. If our Company decides not to comply with the request, the Legal Compliance Department must respond to the data subject to explain its reasoning and inform them of their right to complain to the supervisory authority and seek judicial remedy.
Personal data must be kept in a form such that the data subject can be identified only as long as is necessary for processing.
Where personal data is retained beyond the processing date, it will be minimised/ encrypted/ pseudonymised in order to protect the identity of the data subject in the event of a data breach. Personal data will be retained in line with the ISP and, once its retention date is passed, it must be securely destroyed as set out in this procedure.
The Legal Compliance Department must specifically approve any data retention that exceeds the retention periods defined in the ISP and must ensure that the justification is clearly identified and in line with the requirements of the data protection legislation. This approval must be written.
Personal data must be processed in a manner that ensures the appropriate security
The Legal Compliance Department will carry out a Data Protection Risk Assessment (DPIA) taking into account all the circumstances of our Company’s controlling or processing operations.
In determining appropriateness, the Legal Compliance Department should also consider the extent of possible damage or loss that might be caused to individuals (e.g., staff or customers) if a security breach occurs, the effect of any security breach on the Company itself, and any likely reputational damage including the possible loss of customer trust.
When assessing appropriate technical measures, the Legal Compliance Department shall consider the following:
When assessing appropriate organisational measures, the Legal Compliance Department shall consider the following:
These controls have been selected on the basis of identified risks to personal data, and the potential for damage or distress to individuals whose data is being processed. Our Company’s compliance with this principle is contained in its PIMS, which has been developed in line with the ISP.
The controller must be able to demonstrate compliance with the UK-GDPR’s other principles (accountability)
The UK-GDPR includes provisions that promote accountability and governance. These complement the UK-GDPR’s transparency requirements. The accountability principle in Article 5(2) requires you to demonstrate that you comply with the principles and states explicitly that this is your responsibility.
Our Company will demonstrate compliance with the data protection principles by implementing data protection policies, adhering to codes of conduct, implementing technical and organisational measures, as well as adopting techniques such as data protection by design, DPIAs, breach notification procedures and incident response plans.
Each individual shall have the following rights regarding data processing, and the data that is recorded about them:
Our Company ensures that individuals may exercise these rights by making data access requests as described in the Acceptable Use Agreement, which shall include the Subject Access Request Procedure. This procedure also describes how our Company will ensure that its response to the data access request complies with the requirements of the UK-GDPR.
Individuals shall also have the right to complain to the Company related to the processing of their personal data, handling of a request from a data subject and appeals from a data subject on how complaints have been handled in line with the Complaints Procedure.
7.1 Our Company understands “consent” to mean that it has been explicitly and freely given, and a specific, informed and unambiguous indication of the data subject’s wishes that, by statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her. The data subject can withdraw their consent at any time.
7.2 Our Company understands “consent” to mean that the data subject has been fully informed of the intended processing and has signified their agreement, while in a fit state of mind to do so and without pressure being exerted upon them. Consent obtained under duress or on the basis of misleading information will not be a valid basis for processing.
7.3 There must be some active communication between the parties to demonstrate active consent. Consent cannot be inferred from non-response to a communication. The Controller must be able to demonstrate that consent was obtained for the processing operation.
7.4 For sensitive data, explicit written consent of individuals must be obtained unless an alternative legitimate basis for processing exists.
7.5 In most instances, consent to process personal and sensitive data is obtained routinely by the Company using standard consent documents e.g., when a new client signs a contract, or during induction for participants on programmes.
7.6 Where our Company provides online services to children, parental or custodial authorisation must be obtained. This requirement applies to children under the age of 13. Our Company does not routinely process data in this category.
8.1 All Employees/Staff are responsible for ensuring that any personal data that our Company holds and for which they are responsible, is kept securely and is not under any conditions disclosed to any third party unless that third party has been specifically authorised by our Company to receive that information and has entered into a confidentiality agreement.
8.2 All personal data should be accessible only to those who need to use it, and access may only be granted in line with the Access Control Policy.
8.3 Care must be taken to ensure that PC screens and terminals are not visible except to authorised Employees/Staff of the Company. All Employees/Staff are required to enter into an Acceptable Use Agreement before they are given access to organisational information of any sort, which details rules on screen time-outs.
8.4 Manual records may not be left where they can be accessed by unauthorised personnel and may not be removed from business premises without explicit written authorisation. As soon as manual records are no longer required for day-to-day client support, they must be removed from secure archiving in line with the Information Disposal Policy.
8.5 Personal data may only be deleted or disposed of in line with the Information Retention procedure. Manual records that have reached their retention date are to be shredded and disposed of as “confidential waste”. Hard drives of redundant PCs are to be removed and immediately destroyed as required by the Information Disposal Policy.
The Company must ensure that personal data is not disclosed to unauthorised third parties which includes family members, friends, government bodies, and in certain circumstances, the Police. All Employees/Staff should exercise caution when asked to disclose personal data held on another individual to a third party. It is important to bear in mind whether or not disclosure of the information is relevant to, and necessary for the conduct of our Company’s business.
10.1 The Company shall not keep personal data in a form that permits identification of data subjects for longer a period than it is necessary, in relation to the purpose(s) for which the data was originally collected.
10.2 The Company may store data for longer periods if the personal data will be processed solely for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes, subject to the implementation of appropriate technical and organisational measures to safeguard the rights and freedoms of the data subject.
10.3 The retention period for each category of personal data will be set out in the Information Retention procedure along with the criteria used to determine this period including any statutory obligations the Company has to retain the data.
10.4 The Company’s information retention and information disposal procedures apply in all cases.
10.5 Personal data must be disposed of securely in accordance with the sixth principle of the UK-GDPR. Any disposal of data will be done in accordance with the secure disposal procedure.
On 28 June 2021 the EU Commission adopted decisions on the UK’s adequacy under the EU’s General Data Protection Regulation (EU GDPR) and Law Enforcement Directive (LED). In both cases, the European Commission has found the UK to be adequate. This means that most data can continue to flow from the EU and the EEA without the need for additional safeguards.
All exports of data from the UK and the European Economic Area (EEA) to non-European Economic Area countries (referred to in the UK-GDPR as “third countries”) are unlawful unless there is an appropriate “level of protection for the fundamental rights of the data subjects”.
The broader area of the EEA is granted “adequacy” on the basis that all such countries are signatories to the GDPR. The non-EU EEA member countries (Liechtenstein, Norway and Iceland) apply EU regulations through a Joint Committee Decision.
Binding corporate rules
The Company may adopt approved binding corporate rules for the transfer of data outside the EU. This requires submission to the relevant supervisory authority for approval of the rules that the Company is seeking to rely upon.
Model contract clauses
The Company may adopt approved model contract clauses for the transfer of data outside of the UK and the EEA. If the Company adopts the model contract clauses approved by the relevant supervisory authority there is an automatic recognition of adequacy.
Exceptions
In the absence of an adequacy decision, Privacy Shield membership, binding corporate rules and/or model contract clauses, a transfer of personal data to a third country or international organisation shall only take place on one of the following conditions:
The Company has established a Data Inventory and Data Flow process as part of its approach to address risks and opportunities throughout its UK-GDPR compliance project. The Company’s Data Inventory and Data Flow determines:
Our Company is aware of any risks associated with the processing of particular types of personal data:
The purpose of this policy is to detail procedures for the retention and disposal of information and personal data. This policy refers to both hard and soft copy documents, unless specifically stated otherwise.
This policy covers all data collected by and stored on the Company owned or leased systems and media, regardless of location. It applies to both data collected and held electronically (including photographs, video and audio recordings) and data that is collected and held as hard copy or paper files. The need to retain certain information may be mandated by federal or local law, federal regulations and legitimate business purposes, as well as the EU General Data Protection Regulation (GDPR).
The Company retains only that data that is necessary to effectively conduct its program activities, fulfil its mission and comply with applicable laws and regulations. Reasons for data retention include:
a. Providing an ongoing service to the data subject (e.g. sending a
newsletter, publication or ongoing program update to an individual,
ongoing training or participation in the Company’s programs, processing
of employee payroll and other benefits).
b. Compliance with applicable laws and regulations associated with
financial and programmatic reporting by the Company to its funding
agencies and other donors.
c. Compliance with applicable labour, tax and immigration laws.
d. Other regulatory requirements.
e. Security incident or other investigation.
f. Intellectual property preservation.
g. Litigation.
Each department processing personal data must go through its ‘closed records’ at least every 6 months to determine whether the records should be destroyed, retained for a further period or transferred to an archive for permanent preservation.
a. Records should only be kept for as long as they are needed to meet
the operational needs of the business, and to fulfil legal and
regulatory requirements.
b. If any (or more) below applies then you must determine the length the
records should be kept for, otherwise the records must be destroyed in
line with this policy.
Is it necessary as a source of information for operations at Hospitality Growth Benefits LTD? | Is it necessary as evidence of business activities and decisions? | Is it necessary because of legal or regulatory retention requirements? |
No destruction of a record should take place without assurance that:
Records should be destroyed in the following ways:
Non-sensitive information | Information/records that are clearly in the ‘public domain’ can be placed in a normal recycling rubbish bin |
Confidential information | Must be cross cut shredded and placed in paper rubbish sacks for collection by an approved disposal firm. |
Electronic devices containing information (must be overseen by the Head of IT) |
Option 1 – ‘Factory’ system restore Option 2 – destroy all information using specialised software programs. Hospitality Growth Benefits LTD may work with approved contractors to recycle redundant IT equipment and must securely sanitise all hard drives. A certificate confirming the complete destruction of records must be provided by the contractors. Equipment must be kept in a secure location until collected. Managers of each department must ensure locally stored confidential information is removed as appropriate before a device is reassigned to another person in their team. |
a. There is no requirement to document the disposal of records which
have been listed on the records retention schedule.
b. If records are disposed of earlier or kept for longer than listed on
the records retention schedule, then they must be recorded for audit
purposes.
c. This will provide an audit trail for any inspections conducted by the
Information Commissioner Office and will aid in addressing Subject
Access Request, where we no longer hold the material.
Disposal Schedule
(Should you become aware of any records missing from the schedule, please notify the Company so that they may be added at the next opportunity). |
|||
Heading | Description | Retention Period | Comments |
Payroll | Employee pay records | for the period of employment plus six 6 years after the employee leaves the organisation | |
Salary records | for the period of employment plus six 6 years after the employee leaves the organisation | ||
Copy of payroll sheets | for the period of employment plus six 6 years after the employee leaves the organisation | ||
Employee Files | Paper and hardcopy employee files | for the period of employment plus six 6 years after the employee leaves the organisation | Limitations Act 1980 |
Income Tax Records and Wages | Income Tax and NI returns, Income tax records and correspondence with the Inland Revenue | At least 3 years after the end of the financial year to which they relate. | The Income Tax (Employments) Regulations 1993 |
Wages/salary records (including overtime, bonuses, expenses) | for the period of employment plus six 6 years after the employee leaves the organisation | Taxes Management Act 1970 | |
National minimum wage records | 3 years after the end of the pay reference period following the one that the records cover | National Minimum Wage Act 1998 | |
Pensions and Retirement | Autoenrollment member and scheme details | for the period of employment plus six 6 years after the employee leaves the organisation | Autoenrollment regulations |
Sickness records | Statutory Maternity Pay records, calculations, certificates (Mat B1s) or other medical evidence | 3 years after the end of the tax year in which the maternity period ends | The Statutory Maternity Pay (General) Regulations 1986 |
Statutory Sick Pay records, calculations, certificates, self- certificates | 3 years after the end of the tax year to which they relate | The Statutory Sick Pay (General) Regulations 1982 | |
Employee Files – General Exceptions | Records relating to working time | 2 years from the date on which they were made | The Working Time Regulations 1998 |
Accident books, accident records/report | 3 years after the date of the last entry | The Reporting of Injuries, Diseases and Dangerous Occurrences Regulations 1995. |
Questions, comments, complaints and requests regarding this policy are
welcomed and should be addressed to our office address, Suite 3 34 Market
Street, Atherton, Manchester, England, M46 0DN or to our Legal Compliance
Department at
legal@hospitalitygrowthbenefits.co.uk.
In addition, please do not hesitate to contact us if you suspect any
privacy or security breaches.
This policy supplements and should be read in conjunction with our other policies and procedures in force from time to time, including without limitation our:
All users need to read, understand, and comply with this Policy.
The Company collects, holds, processes and shares large amounts of personal data and has an obligation to ensure that it is kept secure and appropriately protected.
Information is a key Company asset and as such ensuring the continued confidentiality, integrity and availability is essential to support the Company operations. The Company is also required to operate within the law, specifically the expectations set out in the Data Protection Act 1998 (DPA) and the General Data Protection Regulation (UK-GDPR).
Data security breaches are increasingly common occurrences whether these are caused through human or technical error or via malicious intent. As technology trends change and the volume of data and information created grows, there are more emerging ways by which data can be breached. The Company needs to have in place a robust and systematic process for responding to any reported potential data security breach, to ensure it can act responsibly, protect individual’s data, Company information assets and reputation as far as possible.
Data security breaches will vary in impact and risk depending on the content and quantity of data involved, the circumstances of the loss and the speed of response to the incident. By managing all perceived data security breaches in a timely manner, it may be possible to contain and recover the data before it an actual breach occurs, reducing the risks and impact to both individuals and the Company. Breaches can result in fines for loss of personal information and significant reputational damage, and may require substantial time and resources to rectify the breach. As of May 2018, the GDPR replaced the DPA with fine limits increasing up to €20 million for a breach. Breach reporting within 72 hours of identifying a breach is mandatory under the GDPR, with fines of up to €10 million for failing to report a breach.
2.1. The purpose of this procedure is to ensure that:
2.2. This document sets out the procedure to be followed to ensure a consistent and effective approach in managing personal data security breaches across the Company.
3.1. This procedure applies to all staff, partner organisations and partner staff, suppliers, contractors, consultants, representatives and agents that work for or process, access, use or manage personal data on behalf of the Company.
3.2. This procedure relates to all personal and special category (‘sensitive’) information handled, stored, processed or shared by the Company whether organised and stored in physical or IT based record systems.
4.1. What is a data security breach?
A personal data security breach means “a breach of security leading to the loss, unauthorised destruction, alteration or disclosure of, or access to, personal data transmitted, stored or otherwise processed”.
A data security breach is considered to be any loss of, or unauthorised access to, Company data, normally involving Personal or Confidential information including intellectual property.
Data security breaches include the loss, modification, or theft of data or equipment on which data is stored, inappropriate access controls allowing unauthorised use, human error (e.g. information sent to the incorrect recipient), hacking attacks and ‘blagging’ where information is obtained by deception.
A personal data breach in the context of this procedure is an event or action that has affected the confidentiality, integrity or availability of personal data, either accidentally or deliberately, that results in its security being compromised, and has caused or has the potential to cause damage to the Company and/or the individuals to whom the information relates to.
4.2. What is a data security incident?
A data security incident is where there is the risk of a breach but a loss or unauthorised access has not actually occurred.
It is not always clear if an incident has resulted in a breach; by reporting all perceived data breaches quickly, steps can be taken to investigate, secure the information and prevent the incident becoming an actual breach (e.g. by reporting an email IT can remove the email before it has been read and therefore the data has been contained and not been seen by the incorrect recipient).
For the purposes of this policy, data security breaches include both confirmed and suspected incidents and breaches.
4.3. A data breach incident includes, but is not limited to:
5.1. The Company adopts a culture in which data protection breaches are reported. Any staff, contractor, partnership organisation, partner staff or individual that processes, accesses, uses or manages personal data on behalf of the Company is responsible for reporting information security incidents and data breaches immediately or within 24 hours of being aware of a breach to their supervisor or to the Legal Compliance Department at legal@hospitalitygrowthbenefits.co.uk, who will investigate the potential breach.
5.2. If the breach occurs or is discovered outside normal working hours, it must be reported as soon as is practicable.
5.3. A Data Breach Report Form (see Appendix 1 ) should be completed as part of the reporting process process and emailed it to their supervisor or to the Legal Compliance Department at legal@hospitalitygrowthbenefits.co.uk. The report will include full and accurate details of the incident, when the breach occurred (dates and times), who is reporting it, the nature of the information and how many individuals are involved.
6.1. The Legal Compliance Department in liaison with supervisor and/or the Information Security Officer, will determine if the breach is still occurring. If so, the appropriate steps will be taken immediately to minimise the effect of the breach.
6.2. An initial assessment will be made to establish the severity of the breach, who will take the lead as designated Investigating Officer to investigate the breach (this will depend on the nature of the breach) and determine the suitable course of action to be taken to ensure a resolution to the incident.
6.3. The Investigating Officer will establish whether there is anything that can be done to recover any losses and limit the damage the breach could cause.
6.4. The Investigating Officer will establish who may need to be notified as part of the initial containment.
6.5. Advice from experts across the Company such as IT, HR and legal and in some cases contact with external third parties may be sought in resolving the incident promptly.
7.1. An investigation will be undertaken by the Investigating Officer immediately and wherever possible within 24 hours of the breach being discovered/reported.
7.2. The Investigating Officer will investigate the breach and assess the risks associated with it, for example, the potential adverse consequences for individuals, how likely they are to happen and how serious or substantial they are.
7.3. The level of risk associated with a breach can vary depending on the type of data and its sensitivity.
7.4. The investigation will need to consider the following:
8.1. The Investigating Officer in consultation with the Legal Compliance Department and/or the Information Security Officer, will determine who needs to be notified of the breach.
8.2. Any notification must be agreed by the management.
8.3. Every incident will be assessed on a case-by-case basis.
8.4. Not every incident merit notification and over notification may cause disproportionate enquiries and work.
The following will need to be considered:
8.5. If a breach is likely to result in a high risk to the rights and freedoms of individuals, notification to the individuals whose personal data has been affected by the incident must be without undue delay describing:
8.6. If the Company decides not to notify the individuals affected, it will still need to notify the ICO unless it can demonstrate that the breach is unlikely to result in a risk to rights and freedoms.
8.7. The Investigating Officer must consider notifying third parties such as the police, insurers, professional bodies, bank or credit card companies who can help reduce the risk of financial loss to individuals. This would be appropriate where illegal activity is known or is believed to have occurred, or where there is a risk that illegal activity might occur in the future.
8.8 The Investigating Officer will consider whether the Marketing and Communications Team should be informed regarding a press release and to be ready to handle any incoming press enquiries.
8.9. All personal data breaches and actions will be recorded by the Investigating Officer regardless of whether or not they need to be reported to the ICO.
9.1. Data protection breach management is a process of continual review. Once the initial incident is contained, the Investigating Officer will carry out a full review of the causes of the breach; the effectiveness of the response(s) and whether any changes to systems, policies and procedures should be undertaken.
9.2. Existing controls will be reviewed to determine their adequacy, and whether any corrective action should be taken to minimise the risk of similar incidents occurring.
9.3. The review will consider:
9.4. Regardless of the type and severity of incident, there will always be recommendations to be made even if it is only to reinforce existing procedures.
9.5. All recommendations will be assigned an owner and have a timescale by when they should be implemented which has a dual purpose. The first is to ensure that the Company puts in place whatever measures have been identified and that there is an individual that can report back to the Investigating Officer on progress. The second is that where incidents are reported to the ICO, the Company can demonstrate that the measures have either been put in place or that there is a documented plan to do so.
9.6. Identifying recommendations is more than just damage control. The knowledge of what has happened together with the impact is a fundamental part of learning and continual improvement which can then be disseminated throughout the Company.
Hospitality Growth Benefits LTD (the “Company”) recognises that everyone has a contribution to make to our society and a right to equal opportunity. The purpose of this Policy is to ensure that Hospitality Growth Benefits LTD promotes equality and diversity in the workplace and provides a working environment where all employees are treated with dignity and respect. This Policy outlines Company’s commitment to preventing discrimination and fostering an inclusive culture.
This Policy applies to all employees, contractors, consultants, and any other individuals working for or on behalf of the Company. It covers all aspects of employment, including recruitment, training, promotion, and working conditions.
Hospitality Growth Benefits LTD is committed to:
4.1 Equality: Ensuring that every individual has an equal opportunity to make the most of their lives and talents, and that no one is treated unfairly or discriminated against.
4.2 Diversity: Recognizing, valuing, and taking account of people’s different backgrounds, knowledge, skills, and experiences, and encouraging and using those differences to create a productive and effective workforce.
5.1 Management Responsibilities:
5.2 Employee Responsibilities:
Company shall not tolerate any form of discrimination based on age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, religion or belief, sex, or sexual orientation. Therefore shall:
Company is committed to creating a diverse workforce by:
Harassment and bullying are unacceptable and will not be tolerated. Company shall:
We will provide training and development to ensure that all employees understand their rights and responsibilities under this Policy. This includes:
We will regularly monitor and review the effectiveness of this Policy to ensure it remains relevant and effective. This includes:
Employees who believe they have been subjected to discrimination, harassment, or bullying should:
Complaints will be treated confidentially and investigated in accordance with Company’s grievance procedures.
This Policy has been approved by the senior management of Hospitality Growth Benefits LTD and is effective as of July 2024.
The successful implementation of this Policy depends on the awareness and commitment of all staff members and associates.
All employees of the Company are required to acknowledge their understanding and commitment to this Workplace Equality & Diversity Policy.
The purpose of this Policy is to ensure that Hospitality Growth Benefits LTD (the “Company”) provides a working environment that is free from harassment and discrimination. This Policy outlines our commitment to preventing and addressing any form of harassment and discrimination in the workplace. Harassment and Discrimination Policy applies to all employees, contractors, consultants, and any other individuals working for or on behalf of the Company. It covers all work-related activities, including those occurring on Company premises, during business trips, at work-related social events, and through electronic communications.
Hospitality Growth Benefits LTD is committed to:
3.1 Harassment: Unwanted conduct related to a relevant protected characteristic, which has the purpose or effect of violating an individual’s dignity or creating an intimidating, hostile, degrading, humiliating, or offensive environment.
3.2 Discrimination: Treating someone less favourably because of a protected characteristic, which includes age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, religion or belief, sex, and sexual orientation.
4.1 Management Responsibilities:
4.2 Employee Responsibilities:
Hospitality Growth Benefits LTD shall not tolerate any form of harassment or discrimination. To prevent this, the Company shall:
6.1 Employees who believe they have been subjected to harassment or discrimination should:
6.2 All complaints will be treated confidentially and investigated promptly. The investigation process will include:
If the investigation finds that harassment or discrimination has occurred, appropriate disciplinary action will be taken. This may include:
Company shall provide support to employees affected by harassment or discrimination.
This may include:
Company shall provide training to ensure that all employees understand their rights and responsibilities under this Policy.
This includes:
We will regularly monitor and review the effectiveness of this Policy to ensure it remains relevant and effective.
This includes:
This Policy has been approved by the senior management of Hospitality Growth Benefits LTD and is effective as of July 2024.
The successful implementation of this Policy depends on the awareness and commitment of all staff members and associates. All individuals related to the Company are required to acknowledge their understanding and commitment to this Harassment & Discrimination Policy.
The purpose of this Policy is to provide guidelines for the appropriate use of social media and the internet by employees of Hospitality Growth Benefits LTD (the “Company”). This Policy aims to protect the Company’s reputation, ensure the security of company information, and comply with legal and regulatory requirements.
This Policy applies to all employees, contractors, consultants, and any other individuals working for or on behalf of the Company. It covers all work-related activities conducted on social media and the internet, both during and outside of working hours.
Hospitality Growth Benefits LTD recognises the importance of social media and the internet as tools for communication, collaboration, and business development. Company encourages their use in a responsible and professional manner that aligns with our values and complies with legal requirements.
4.1 Social Media: Includes all forms of online communication and platforms, such as Facebook, Twitter, LinkedIn, Instagram, blogs, forums, and any other websites that allow users to create and share content.
4.2 Internet Use: Refers to the use of the internet for browsing, communication, and accessing information, whether for personal or professional purposes.
5.1 Management Responsibilities:
5.2 Employee Responsibilities:
Employees must:
Employees must not:
While personal use of social media is generally permitted, employees must:
Employees must:
Company reserves the right to monitor employees’ use of social media and the internet to ensure compliance with this Policy. Any violations of this Policy may result in disciplinary action, up to and including termination of employment.
Company shall provide training to ensure that all employees understand their rights and responsibilities under this Policy.
This includes:
This Policy will be reviewed regularly to ensure its effectiveness and compliance with current laws and regulations. Any updates or changes will be communicated to all employees.
This Policy has been approved by the senior management of Hospitality Growth Benefits LTD and is effective as of July 2024.
Hospitality Growth Benefits LTD (the “Company”) is committed to providing a safe, healthy and productive work environment.
The misuse of drugs and alcohol can impair employee performance, health, and safety, and adversely affect the Company’s operations and reputation.
This Policy outlines our commitment to preventing drug and alcohol misuse and providing support to employees.
This Policy applies to all employees, contractors, consultants, temporary and agency staff, and any other individuals working for or on behalf of the Company within the UK.
3.1 Prohibited Conduct:
3.2 Exceptions:
The moderate consumption of alcohol may be permitted at company-sanctioned events or with prior authorisation from senior management, provided it does not impair work performance or pose a safety risk.
4.1 Employees:
4.2 Managers & Supervisors:
5.1 Drug and Alcohol Testing:
5.2 Searches:
The Company reserves the right to conduct searches of Company property and premises, including lockers, desks and vehicles, where there is reasonable suspicion of Policy violation.
All information regarding drug and alcohol issues will be treated confidentially and disclosed only to those with a legitimate need to know.
This Policy will be communicated to all employees, and training will be provided to ensure understanding and compliance.
This Policy complies with relevant UK legislation, including the Health and Safety at Work Act 1974 and the Misuse of Drugs Act 1971, as amended and in force.
All employees of Hospitality Growth Benefits LTD are required to acknowledge their understanding and commitment to this Drug & Alcohol Policy.
1.1 Hospitality Growth Benefits LTD (the “Company”) is dedicated to providing exceptional service to our customers. The purpose of this Policy is to ensure that the Company consistently provides services that meet or exceed customer expectations and comply with all applicable legal and regulatory requirements. This Policy demonstrates our commitment to quality, continuous improvement, and customer satisfaction and Policy applies to all employees, contractors, consultants, temporary and agency staff, and any other individuals working for or on behalf of Hospitality Growth Benefits LTD within the UK.
1.2 Company is committed to:
2.1 Communication:
2.2 Product and Service Information:
2.3 Accessibility:
3.1 Encouraging Feedback:
3.2 Handling Feedback:
4.1 Complaint Submission:
4.2 Complaint Resolution:
4.3 Escalation Process:
5.1 Management Responsibilities:
5.2 Employee Responsibilities.
Hospitality Growth Benefits LTD has established a Quality Management System (QMS) to support the implementation of this Policy.
The QMS includes:
Company recognises that success depends on Company’s ability to meet the needs and expectations of customers. To ensure customer satisfaction, Company shall:
Company is committed to the principle of continuous improvement, shall:
Ensure all customer interactions comply with relevant UK legislation, including consumer protection laws and data protection regulations.
Maintain customer confidentiality and protect personal data in accordance with the General Data Protection Regulation (GDPR).
This Policy has been approved by the senior management of Hospitality Growth Benefits LTD.
All employees of Hospitality Growth Benefits LTD are required to acknowledge their understanding and commitment to this Quality Services Policy.
Know Your Customer (KYC) Policy is to prevent and mitigate the risks of money laundering, terrorist financing, and other financial crimes. Hospitality Growth Benefits LTD (the “Company”) is committed to ensuring compliance with all relevant UK regulations and international standards.
KYC concerns all employees, contractors, consultants, temporary and agency staff, and any other individuals working for or on behalf of Hospitality Growth Benefits LTD and it covers all customer interactions, including account opening, ongoing monitoring, and transaction processing.
This Policy is based on the following UK and international regulations and standards, as amended and in force:
The Company is committed to:
4.1 Customer Due Diligence (CDD):
A. Obtain and verify the following information for individual customers:
B. Obtain and verify the following information for corporate customers:
4.2 Enhanced Due Diligence (EDD):
A. Apply enhanced measures for high-risk customers, including:
B. Additional measures may include:
5.1 Conduct a risk assessment of each customer based on factors such as:
5.2 Assign a risk rating (low, medium, high) and apply appropriate due diligence measures.