In order to comply with and operationalize the T.R.U.S.T. principles, Axiata shall implement the following Data Privacy Practices:
![]()
1. Data must be collected and processed from data subjects in a lawful, fair and transparent manner
To process personal data lawfully, fairly and in a transparent manner. To provide the data subjects with a Privacy Notice which specifies details on the purpose for which the personal data is being collected and processed, source of the personal data, class of the third parties to which the personal data is disclosed or may be disclosed to, security measures towards protection of personal data, data retention requirements, rights available to data subjects and other relevant information in line with applicable Privacy laws.
![]()
2. Lawful basis for processing Personal Data:
We will process Personal Data when it is necessary and meets at least one of the following lawful basis where:
3. Lawful basis for processing Sensitive Personal data:
We will ensure that while processing Sensitive Personal Data explicit consent is required of data subjects except for other lawful basis stated below:
4. We will take reasonable steps to maintain accurate, complete, not misleading and up to date personal data only for the purpose(s) identified in the Privacy Notice.
5. We will ensure that personal data collected and processed shall be adequate, relevant and not excessive for the purpose(s) identified in the Privacy Notice.
Axiata respects the rights of data subjects and shall provide them with the opportunity and platform to exercise their rights. We have established processes for receiving, recording and responding to such requests.
We will define and document retention periods for various categories of personal data in accordance with the stated purpose or as required by the law. We will ensure that personal data is retained as per the defined retention periods. Post expiry of the retention period, personal data shall be securely disposed or de-identified.
Privacy by Design is a methodology that enables Privacy to be built into the design and architecture of systems, products and processes.
Axiata has adopted Privacy by Design methodology to ensure that Data Privacy issues are considered at the design phase of any system, service, product or process and then throughout the personal data lifecycle.
We will conduct Data Protection Impact Assessments (DPIAs) to identify underlying Privacy risks in the high-risk personal data processing activities.
Axiata has established processes with respect to managing high-risk data processing vendors from a Data Privacy standpoint. The processes include the following activities:
|
Due Diligence |
Conduct due diligence on prospective high-risk vendor’s information security and Privacy posture prior to onboarding. |
|
Data Processing Agreements |
Include adequate Privacy and information security clauses in all contractual agreements. |
|
Periodic Vendor Assessment |
Conduct periodic assessment of existing high-risk vendors’ compliance with contractual and regulatory obligations. |
|
DPIAs for Projects |
Conduct DPIAs prior to onboarding high-risk projects from existing vendors. |
![]()
We will assess the permissibility of Cross-Border Data Transfers in accordance with applicable Privacy laws. Further, the Company shall also ensure that necessary safeguards (such as Data Transfer Agreements) are in place to protect all the Cross-Border Data Transfers.
We have defined and implemented a process for reporting, assessing, resolving, communicating, escalating, notifying, and performing of any other actions required in the effective management of Privacy incidents and data breaches.
![]()
We have implemented appropriate technical safeguards and organizational measures to maintain the confidentiality, integrity and availability of personal data.
![]()
Axiata will carry out periodic Privacy audits on our data processing environment to monitor its compliance against this Policy, Group Privacy standards and applicable Privacy laws.
Axiata mandates annual Data Privacy awareness trainings for our employees and contract staff. We will also raise awareness through knowledge sharing sessions, e-mailers, posters, Privacy campaigns and other such means.