Types of personal information, sources, and purposes for collection
Each table below tells you the types of personal information we collect, what we do with it, and where we get it from, based on your relationship with us. Remember, you might fit into more than one of these categories. In addition to the ways that each type of personal information is used in these tables, personal information is also used for service improvement and compliance if allowed by law.
Some types of personal information have one or more letters next to them, corresponding with the categories of personal information set out in California law.
You can find more information about the lawful basis for handling your personal information under European data protection laws here.
We do not use your personal information for purposes other than the ones listed in this document or that you have been told about elsewhere, unless you would reasonably expect it or we are allowed or required to do so by law.
Type of information | What we do with it | Where we get it from |
---|---|---|
Name A, B |
|
|
Other names you have used A, B |
If your name has been changed or corrected due to your gender identity, please contact us to help us complete services correctly while protecting your privacy |
|
Date of birth A, B, C |
|
|
Contact information A, B (including personal or business phone number, email address, and mailing address) |
|
|
Address history A, B |
|
|
Documents to prove identity or address A, B |
|
|
Sex or gender A, B, C |
If your legally recognized sex or gender has been changed or corrected, or if your identity is different from the sex or gender indicated on official documents, you are welcome to contact us to help us complete services correctly while protecting your privacy. |
|
Government-issued identity numbers A, B (examples: Social Security Number, Social Insurance Number, National Insurance Number, driver’s license number) |
|
|
Biometric information E (examples: fingerprints, fingerprint geometry, facial geometry, photographs) |
|
|
Physical attributes B, C, E (examples: race, weight, eye color, hair color) |
|
|
Criminal history, police records, and court records |
|
|
Credit or bankruptcy history B |
|
|
Employment history B, I |
|
|
Education history J |
|
|
Volunteering history B, I |
|
|
Travel history |
|
|
Professional credentials, designations, memberships, sanctions or reprimands B, I |
|
|
Opinions about you |
|
|
Appearance on government watch or sanctions lists |
|
|
Health information, including substance test results C |
|
|
Eligibility to work A, B, C |
|
|
Tax information A, B |
|
|
Driving records |
|
|
Directorship and corporate governance history B, I |
|
|
Place of birth C |
|
|
Publicly available social media activities |
|
|
Mentions in online or print media |
|
|
Other public record information |
|
|
Telephone call recordings H |
|
|
Your opinions about us and our services |
|
|
Skills and interests C, |
|
|
Billing and payment card information B |
|
|
IP address when you use our candidate platform A,F |
|
|
Location when you use our candidate platform F,G |
|
|
Login credentials for our candidate platform A,F |
|
|
Authentication information provided by a social media or cloud services platform A, |
|
|
Dates, times and length of session on our candidate platform F |
|
|
Access to and modification of data on our candidate platform F |
|
|
Device and browser information when you use our candidate platform F |
|
|
Your behavior on our candidate platform F |
|
|
Type of information | What we do with it | Where we get it from |
---|---|---|
Name A, B |
|
|
Job title and organization B, I |
|
|
Contact information A,B (examples: phone number, email address, mailing address) |
|
|
Registration or subscription preferences for webinars, whitepapers, newsletters or other content F |
|
|
IP address A,F |
|
|
Location F, G |
|
|
Your behavior on our websites F |
|
|
Dates, times and length of session F |
|
|
Device and browser information F |
|
|
Type of information | What we do with it | Where we get it from |
---|---|---|
Name A, B |
|
|
Job title and organization B, I |
|
|
Contact information A, B (examples: phone number, email address, mailing address) |
|
|
Telephone call recordings H |
|
|
Records of your use of our services D |
|
|
Records of email, chat and other communication with you, including whether you have read an email F |
|
|
Billing and payment card information B |
|
|
IP address when you use our client platform A, F |
|
|
Location when you use our client platform F, G |
|
|
Login credentials for our client platform A, F |
|
|
Authentication information provided by a social media or cloud services platform A, F |
|
|
Dates, times and length of session on our client platform F |
|
|
Access to and modification of data on our client platform F |
|
|
Device and browser information when you use our client platform F |
|
|
Your behavior on our client platform F |
|
|
Your opinions about us and our services |
|
|
Type of information | What we do with it | Where we get it from |
---|---|---|
Name A, B |
|
|
Job title and organization B, I |
|
|
Contact information A, B (examples: phone number, email address, mailing address) |
|
|
Telephone call recordings H |
|
|
Records of email, chat and other communication with you, including whether you have read an email F |
|
|
Type of information | What we do with it | Where we get it from |
---|---|---|
Name A, B |
|
|
Job title and organization B, I |
|
|
Contact information A, B (examples: phone number, email address) |
|
|
Your relationship with a candidate B, I |
|
|
Your opinions about a candidate |
|
|
Records of email, chat, and other communication with you F |
|
|
Telephone call recordings H |
|
|
Your opinions about your experience with us |
|
|
IP address when you use our platform A, F |
|
|
Location when you use our platform F, G |
|
|
Dates, times, and length of session on our platform F |
|
|
Access to and modification of data on our platform F |
|
|
Device and browser information when you use our platform F |
|
|
Your behavior on our platform F |
|
|
Type of information | What we do with it | Where we get it from |
---|---|---|
Name A, B |
|
|
Contact information A, B (examples: phone number, email address, mailing address, residential address) |
|
|
Interests and other personal characteristics you share with us C |
|
|
Professional background information A, B, I, J (examples: skills, education history, employment history, professional credentials, professional sanctions, other people’s opinions about your work) |
|
|
Personal background and identity information A, B, C, I, J (examples: date of birth, place of birth, sex or gender, address history, criminal history, police and court records, credit history, substance or health testing results, public social media activity, identity documents or numbers, appearance on government watch or sanctions lists, nationality, citizenship, or immigration status) |
|
|
Information about protected class or characteristics, if you tell us about them C (examples: sex or gender, gender identity, race, ethnicity, sexual orientation, disability or health status, and others) |
|
|
Attendance information I (examples: hours worked, reasons for leave or tardiness, information about a medical condition, information about your family, information about a disability) |
|
|
Information about workplace benefits, support, and health A, B, C (examples: medical information, substance test results, disability information, marital status, family information, transportation records, vehicle information, charitable donation information, professional development and education information, personal concerns or problems) |
|
|
Tax and payroll information A, B, C (examples: identity documents, date of birth, government ID numbers, loan information, wage garnishment information, banking information, marital status, family information) |
|
|
Network and equipment use information F (examples: access logs, IP address, login credentials, data access, internet browsing activities, email records, chat records, telephone calls, information about your home office, information about your mobile device, voicemails) |
|
|
Information about your job performance, quality, and productivity I (examples: computer and network activity, telephone call recordings, email and chat logs, performance appraisals, training records, corrective action records, assessments of quality and quantity of work done) |
|
|
Emergency contact information A, B |
|
|
Your opinions and feedback about Sterling, your job, and other workers |
|
|
Biometric information E (examples: fingerprints, fingerprint geometry, hand geometry, face geometry, photographs) |
|
|
Information about your personal belongings in our offices (examples: contents of bags or storage lockers) |
|
|
Information about your activities in our offices H (examples: entry and exit records, security video and audio recordings) |
|
|
Information collected as part of an investigation D, F, G, H, I (examples: activity on social media, in the news, or in public; information about interpersonal relationships; complaints or concerns voiced by others; internal and external communications) |
|
|
Service improvement and compliance
We constantly analyze our systems and services to make sure they work as well as possible. Whenever we can, we do this analysis with anonymous information, meaning identifiable information (for example, your name, date of birth, and government-issued identification numbers) is removed, but we also need to analyze identifiable information. Also, we have some legal obligations to ensure our systems are secure and our results are accurate. Finally, some sources audit us to make sure we are using information properly.
If the law and contracts with our clients allow it, we use personal information for these purposes:
- Watching system activity and data movement to make sure your personal information is secure
- Reviewing service fulfillment and results to make sure they have been done correctly
- Testing systems to make sure they work right and to find coding mistakes
- Making sure sources are providing us with consistent and accurate information
- Checking that our workers, service providers, and other people or organizations that help us operate are doing their work properly
- Looking for patterns, analyzing manual and automated business activities, and gathering other business information to help our people and our systems work faster, more accurately, and more efficiently in the future
- Allowing sources (like consumer and credit reporting agencies, courts, police services, government agencies, and others) to check that we are collecting and using information from them properly
Mergers and acquisitions
Like many industries, our industry undergoes a lot of changes. This means that we might buy other companies, or we might be bought by another company. We might also join together with other companies to create a new partnership or joint venture. When we do this, personal information from different companies might be mixed together. However, the commitments in this privacy statement remain the same. Any new company that has access to your personal information through merger, acquisition or joint venture activity will not use it for any new purposes.
Access and disclosure
Each table below tells you the people and organizations that might have access to your personal information (or to whom we might disclose your information) based on your relationship with us. Remember, you might fit into more than one of these categories.
When a person or an organization works on our behalf to store data, maintain our systems, or help us perform services, we only choose people or organizations that will protect your personal information appropriately and use it only the way we ask them to. We require these partners and service providers to make that commitment through a contract.
Who has access? | What information do they get? | What do they do with it? |
---|---|---|
Sterling’s client support, service fulfillment, finance, compliance, privacy, information technology, and data analytics teams |
|
|
Our client |
|
|
Organizations you ask us to share your information with |
|
|
Data storage and processing providers |
|
|
Technology support providers |
|
|
Other companies that provide services similar to ours |
|
|
Court researchers |
|
|
Drug and health testing sites and labs |
|
|
Local police services and national criminal record checking authorities like the Australian Criminal Intelligence Commission, the UK Disclosure and Barring Service, the Royal Canadian Mounted Police, or the Federal Bureau of Investigation |
|
|
Biometric collection or transmission services |
|
|
Translation services |
|
|
Survey services |
|
|
Credit card processing services |
|
|
Who has access? | What information do they get? | What do they do with it? |
---|---|---|
Sterling’s marketing and sales teams |
|
|
Marketing analytics, communications, and data aggregation providers |
|
|
Advertising and social media partners |
|
|
Data storage and processing providers |
|
|
Technology support providers |
|
|
Survey services |
|
|
Who has access? | What information do they get? | What do they do with it? |
---|---|---|
Sterling’s human resources, finance, and executive teams, and your direct and indirect supervisors |
|
|
Recruiting companies |
|
|
Payroll providers |
|
|
Data storage and delivery providers, including data centers/cloud providers, applicant tracking systems, recruiting systems, human resources information systems, and others |
|
|
Technology support providers |
|
|
Organizations involved in background screening (see the table for “candidates” above) |
|
|
Benefits providers, including healthcare providers, financial institutions, and others |
|
|
Survey services |
|
|
Retention
We keep personal information long enough to meet our and our clients’ contractual, legal, and business needs. Once we no longer need your personal information, it is deleted or anonymized, meaning you can no longer be identified from any remaining information. To delete data, we de-index it from our databases and overwrite it with new information. There are many factors that go into deciding how long to keep personal information. Our general retention guidelines are as follows:
- If you are a candidate or source in the United States or Canada, we usually need to keep your personal information for at least six years to comply with our legal and contractual obligations. If you are in another country, we may only need to keep your personal information for a few months so we can fulfill the services and collect payment for them, but sometimes we might need to keep it longer because of the type of information we collected about you or where we collected it from. Also, our clients use our system to keep records of all the services they have requested, so they might need us to keep your personal information longer. We do not delete personal information collected on behalf of our client until our client asks us to delete it
- If you are candidate having fingerprint collection or screening done with Sterling Identity, we keep fingerprints and criminal history information for no more than 29 days. After that, they are deleted. We are required to retain certain information about your fingerprint screening for one to three years for compliance with FBI audit requirements. Beyond that, we keep personal information in active accounts for seven years, after which it is anonymized. If your account is inactive, we anonymize your personal information three years after your last login
- If you are a candidate having a national coordinated criminal history check done in Australia, we do not keep the results of that check for more than 12 months, and we keep the information you submitted for us to complete the check for no less than 12 months and no more than 18 months
- If you are a candidate and we receive a UK criminal disclosure certificate about you, we do not keep the certificate for more than six months
To find out how long personal information is retained in your case, contact us and we will let you know or tell you how to find out.
Accuracy
Much of the personal information we collect comes directly from you, so you control if it is accurate or not. When we collect personal information from sources, the source is responsible for making sure it is accurate. No matter how we collect your personal information, we correct it if we find out it is inaccurate, either because you told us it was inaccurate, or we discovered it was inaccurate through regular quality control checks. To ask for correction of your personal information, contact us.
Information security
We have advanced security measures to secure and protect your personal information, such as internal and external firewalls, monitoring and alert systems to prevent and detect hackers, and 256-bit encryption of data in transit and at rest. Our servers are in secure locations that are carefully monitored and audited. Most of our employees access personal information only through secure virtual desktop interfaces, and our online interfaces are encrypted, password-protected, and monitored.
We have rigorous physical security policies to prevent unauthorized physical access to our offices. Our servers and offices, including electronic storage and paper documents containing personal information, are kept in access-controlled and monitored environments.
When we collect and communicate personal information outside of Sterling, we take care to do so through secure connections (like an SSL web connection or through a direct electronic integration) whenever possible. If we cannot exchange personal information that way because of technological limitations, we exceptionally collect and communicate personal information by phone, fax, postal mail, or email. If we have asked you to provide your personal information and you are not comfortable with the way you have been asked to provide it, contact us and we will provide an alternate method.
All our employees have been background checked and have taken security and privacy training courses. Our workers are only permitted to access your personal information if they need it to do their work.
Our contracts with service providers require them to protect your personal information properly and allow us to monitor them to be sure they do.
These information security practices are the same in all our offices around the world. Your personal information is protected to the same level whenever it is with Sterling, no matter where it goes.
International data transfers
Almost all the personal information we have is stored in data centers or with cloud providers in Canada, the European Union, Singapore, or the United States. A small amount of personal information is also stored in our offices around the world, including personal information about our workers, personal information that we have sent or received by mail or courier service, and information that is subject to special local rules. Our offices are in Australia, Canada, China, Hong Kong, India, Malaysia, Mexico, the Netherlands, the Philippines, Poland, Singapore, the United Arab Emirates, the United Kingdom, and the United States. We also have some workers who work remotely in other countries.
Any of the types of information we collect may be handled in any of the countries where we operate, for any of the purposes we collect personal information. The people and organizations who access personal information may be located anywhere in the world. Where your personal information is stored and accessed depends on why we have it and which part of our organization is using it. The following are general guidelines about where personal information is most frequently stored and accessed:
- If you are engaging with our United States companies (Sterling, Sterling Volunteers, Sterling Diligence, or Sterling NOW), then personal information will primarily be stored in the United States and processed in the European Union, India, Mexico, the Philippines, and the United States
- If you are engaging with Sterling Identity for fingerprinting services, your personal information is stored and accessed in the United States only
- If you are engaging with our Canadian company (Sterling Backcheck and myBackCheck.com), then personal information will primarily be stored in Canada and the United States and processed in Canada, the European Union, India, Mexico, the Philippines, and the United States
- If you are engaging with our Europe, Middle East, and Africa companies (Sterling EMEA), then personal information will primarily be stored in Germany, Canada or the United States and processed in the European Union, India, the Philippines, the United Arab Emirates, the United Kingdom, and the United States
- If you are engaging with our Asia-Pacific companies (Sterling APAC and National Crime Check), then personal information will primarily be stored in Australia, Singapore, and the United States and processed in Australia, China, Hong Kong, Malaysia, the Philippines, Singapore, and the United States
- If you are undergoing an Australian national coordinated criminal history check, your personal information will be stored in Singapore and processed in Australia, Malaysia, the Philippines, and Singapore
- If you are paying for a service using a card, your payment card data will be processed by our payment partner in the United States.
If we are asked to collect information about you from sources outside of a country where we are located or using a language we do not know, your personal information might be stored and accessed from additional countries.
We follow European rules for protecting cross-border transfers of personal information, including by being certified to the EU-US Data Privacy Framework and UK Extension.
Personal information disclosure: United States or overseas
When Sterling is acting as an Investigative Consumer Reporting Agency under California state law, personal information collected from candidates in the United States may be transferred outside of the United States as follows:
- To Sterling’s affiliate operations centers in Australia, Brazil, Canada, Colombia, the European Union, India, Malaysia, Mexico, the Philippines, Singapore, and the United Kingdom for service fulfillment
- To Sterling’s information technology service providers in Australia, Canada, Singapore and the European Union if needed to transfer personal information between the United States and our affiliates around the world
- To third parties from which personal information must be collected or verified to fulfill services requested by our client (for example, if our client asks for a criminal record check in Brazil, personal information will be transferred to the organization in Brazil that provides police certificates)
- To our affiliates, partners or service providers that provide country- or region-specific services, where our client has requested those services (for example, if our client asks for an education verification in Japan, personal information may be transferred to a company in Asia with expertise in verifying Japanese education history in the Japanese language)
Risks of international data transfers
No matter where we store or access your personal information, we protect it to the same high standard and your rights remain the same. This means that if we handle personal information in a country with weaker privacy and data protection laws than what would usually apply, we still follow the stricter laws. However, if local laws in a different country apply to your personal information, then local authorities in that country (like courts, police, or the government) might be able to demand access to personal information. This is very unlikely to happen, but if it does, we carefully consider our response before providing information to public authorities and always take your interests into account.
Requests for personal information from public authorities
Law enforcement agencies, national security agencies, courts, or other public bodies in any jurisdiction where we are subject to the law may ask us for personal information, no matter where it is stored. If we get a production order, warrant, subpoena, or other enforceable demand, we will comply as required by law. If we get a request by a public authority to provide information voluntarily, we will consider your interests, our business interests, the interests of our clients, public safety implications, and our legal obligations before we decide whether to communicate personal information. If the personal information was collected from or on behalf of a client, we will consult with the client before proceeding if allowed by law.
We may decide to share personal information with law enforcement or other third parties proactively if necessary to investigate or report a violation of the law or a contractual agreement, if allowed by law.
For the experts
There are some things that we are required to say by law, but that are difficult to understand for someone who is not an expert. Instead of making it harder to read about privacy by mixing those things into The Basics and The Details, we have added a section called The Legal and Technical Stuff for the people who are really interested. Lawyers, regulators, and privacy geeks, this is for you!