Protocols for the confidentiality
“Protocols for the confidentiality” is designed to collect and maintain identifiable information about applicants. Data will be collected anonymously by the specified person and will be removed and destroyed as soon as possible by the completion of this specific assignment. No access to any other organizations/ person and shall be based on a “need to know” and "minimum necessary" standard.
CONFIDENTIALITY PROTOCOL— PROTECTION OF INFORMATION OF APPLICANTS
Information, applications and documents that are deemed to be of a highly sensitive nature or to be inadequately protected by the CONFI¬DENTIAL classification shall be classified as STRICTLY CONFIDENTIAL and access to them shall be restricted solely to persons with a specific need for specific assignment only.
The staffs of the Rolling Plans including client institution shall establish a control and tracking system for documents classified as STRICTLY CONFIDENTIAL, including the maintenance of control logs. Documents classified as STRICTLY CONFIDENTIAL shall be (i) maintained by only specific staff with written commitment; (ii) kept under security key or given equivalent protection when not in use; and (iii) in the case of physical documents, transmitted by an inner envelope indicating the classification marking and an outer envelope indicating no classification, or, in the case of documents in electronic form, transmitted by encrypted or password-secured system.
For purposes of this protocol, the following individuals are deemed to have a specific need to know: (i) the executive consultant; (ii) the project manager/recruitment and selection consultant; (iii) the international consultant of Rolling Plans and; (v) the respective designated representatives of Government of Nepal.
Confidentiality pertains to the treatment of information that an individual has disclosed in any documents/files of trust and with the expectation that it will not be divulged to others/ process without permission in ways that are inconsistent with the understanding of the original disclosure. Rolling Plans assure that the information shall be used for specific purpose published in this system and service only.
When it is necessary to collect and maintain identifiable data, Rolling Plans will ensure that the protocol includes the necessary safeguards to maintain confidentiality of identifiable data and data security appropriate to the degree of risk from disclosure.