Privacy policy
Policy for protection of personal data
Introduction
For the protection against unauthorized access and use of personal data of its users and entities for which it stores and processes data, The Central Registry undertakes all necessary technical and organizational measures, in accordance with: legislation and bylaws relating to protection of personal data, the rulebook on technical and organizational measures for ensuring the security and protection of the processing of personal data of the Central Registry, the Policy for information security in the Central Registry, etc. documents adopted in this area.
Implementation and processing of personal data
- Central Registry undertakes secrecy measures and protection of personal data processing by applying technical and organizational measures that provide:
- Confidentiality - protection of information from unauthorized disclosure and access;
- Integrity - ensuring accuracy and expediency of information and processing methods;
- Availability - providing access to authorized users to information and information systems when needed.
- Personal data is collected for specific, clear and legally established purposes and are processed in a manner consistent with those objectives;
- The Central Regisrty will provide personal data for use, to competencies determined by law;
- The processing of the personal identification number of the entity with the prior consent of the personal data of the subject, for exercising the legally determined rights or obligations of the personal data of the subject and in other cases determined by the Law on Trade Companies;
- Publication of the personal identification number of the citizen only in accordance with the legal regulations;
- The entities for which the Central Registry keeps personal data have the right to inspect and correct the personal data processed by the Central Registry.
Protection against mishandling and abuse
The Central Registry undertakes all necessary technical and organizational measures to protect personal data from unauthorized access as well as their misuse, using regular controls and the latest technological mechanisms in this area.