Data Management Policy

Policy Owner: Dokimi, Inc.
Effective Date: June 1, 2023

Dokimi, Inc. (d.b.a EduSynch) (“Dokimi“, “EduSynch,“ “we,“ or “us“) welcomes you to www.edusynch.com and any and all applications or mobile applications offered by Dokimi, Inc (the “Site“). This Privacy Policy describes how EduSynch collects and receives information about you through the Site, Services and Content and through EduSynch’s businesses, including offline. The Privacy Policy together with the Terms and Conditions of use govern your use of the Site and EduSynch’s collection and use of your information.

1. Purpose


To ensure that information is classified, protected, retained and securely disposed of in accordance with its importance to the organization.

2. Scope


All Dokimi Inc. data, information and information systems.

3. Policy


Dokimi Inc. classifies data and information systems in accordance with legal requirements, sensitivity, and business criticality in order to ensure that information is given the appropriate level of protection. Data owners are responsible for identifying any additional requirements for specific data or exceptions to standard handling requirements.

Information systems and applications shall be classified according to the highest classification of data that they store or process.

4. Data Classification


To help Dokimi Inc. and its employees easily understand requirements associated with different kinds of information, the company has created three classes of data.

5. Confidential


Highly sensitive data requiring the highest levels of protection; access is restricted to specific employees or departments, and these records can only be passed to others with approval from the data owner, or a company executive. Example include:

  • Customer Data
  • Personally identifiable information (PII)
  • Company financial and banking data
  • Salary, compensation and payroll information
  • Strategic plans
  • Incident reports
  • Risk assessment reports
  • Technical vulnerability reports
  • Authentication credentials
  • Secrets and private keys
  • Source code
  • Litigation data
  • Design items pertaining to proprietary EduSynch processes on Figma or other design software

6. Restricted


Dokimi Inc. proprietary information requiring thorough protection; access is restricted to employees with a “need-to-know“ based on business requirements. This data can only be distributed outside the company with approval. This is default for all company information unless stated otherwise. Examples include:

  • Internal policies
  • Legal documents
  • Meeting minutes and internal presentations
  • Contracts
  • Internal reports
  • Slack messages
  • Email

7. Public


Documents intended for public consumption which can be freely distributed outside Dokimi Inc.. Examples include:

  • Marketing materials
  • Product descriptions
  • Release notes
  • External facing policies


8. Labeling


Confidential data should be labeled " confidential " whenever paper copies are produced for distribution.

  • Marketing materials
  • Product descriptions
  • Release notes
  • External facing policies


9. Data Handling

a) Confidential Data Handling


Confidential data is subject to the following protection and handling requirements:

  • Access for non-pre-approved roles requires documented approval from the data owner
  • Access is restricted to specific employees, roles and/or departments
  • Confidential systems shall not allow unauthenticated or anonymous access
  • Confidential Customer Data shall not be used or stored in non-production systems/environments
  • Confidential data shall be encrypted at rest and in transit over public networks in accordance with the Cryptography Policy
  • Mobile device hard drives containing confidential data, including laptops, shall be encrypted
  • Mobile devices storing or accessing confidential data shall be protected by a log-on password (or equivalent, such as biometric) or passcode and shall be configured to lock the screen after five (5) minutes of non-use
  • Backups shall be encrypted
  • Confidential data shall not be stored on personal phones or devices or removable media including USB drives, CD ' s, or DVD ' s
  • Paper records shall be labeled " confidential " and securely stored and disposed of in a secure, approved manner in accordance with data handling and destruction policies and procedures
  • Hardcopy paper records shall only be created based on a business need and shall be avoided whenever possible
  • Hard drives and mobile devices used to store confidential information must be securely wiped prior to disposal or physically destroyed
  • Transfer of confidential data to people or entities outside the company shall only be done in accordance with a legal contract or arrangement, and the explicit written permission of management or the data owner


b) Restricted Data Handling

Restricted data is subject to the following protection and handling requirements:

  • Access is restricted to users with a need-to-know based on business requirements
  • Restricted systems shall not allow unauthenticated or anonymous access
  • Transfer of restricted data to people or entities outside the company or authorized users shall require management approval and shall only be done in accordance with a legal contract or arrangement, or the permission of the data owner
  • Paper records shall be securely stored and disposed of in a secure, approved manner in accordance with data handling and destruction policies and procedures
  • Hard drives and mobile devices used to store restricted information must be securely wiped prior to disposal or physically destroyed


c) Public Data Handling

No special protection or handling controls are required for public data. Public data may be freely distributed.



10. Data Retention

Dokimi Inc. shall retain data as long as the company has a need for its use, or to meet regulatory or contractual requirements. Once data is no longer needed, it shall be securely disposed of or archived. Data owners, in consultation with legal counsel, may determine retention periods for their data.

Personally identifiable information (PII) shall be deleted or de-identified as soon as it no longer has a business use.

Retention periods shall be documented in the Data Retention Matrix in Appendix B to this policy.



11. Data & Device Disposal

Data classified as restricted or confidential shall be securely deleted when no longer needed. Dokimi Inc. shall assess the data and disposal practices of third-party vendors in accordance with the Third-Party Management Policy. Only third-parties who meet Dokimi Inc. requirements for secure data disposal shall be used for storage and processing of restricted or confidential data.

Dokimi Inc. shall ensure that all restricted and confidential data is securely deleted from company devices prior to, or at the time of, disposal.

onfidential and Restricted hardcopy materials shall be shredded or otherwise disposed of using a secure method.

Personally identifiable information (PII) shall be collected, used and retained only for as long as the company has a legitimate business purpose. PII shall be securely deleted and disposed of following contract termination in accordance with company policy, contractual commitments and all relevant laws and regulations. PII shall also be deleted in response to a verified request from a consumer or data subject, where the company does not have a legitimate business interest or other legal obligation to retain the data.



12. Annual Data Review

Management shall review data retention requirements during the annual review of this policy.
Data shall be disposed of in accordance with this policy.



13. Legal Requirements

Under certain circumstances, Dokimi Inc. may become subject to legal proceedings requiring retention of data associated with legal holds, lawsuits, or other matters as stipulated by Dokimi Inc. legal counsel. Such records and information are exempt from any other requirements specified within this Data Management Policy and are to be retained in accordance with requirements identified by the Legal department. All such holds and special retention requirements are subject to annual review with Dokimi Inc. ' s legal counsel to evaluate continuing requirements and scope.



14. Policy Compliance

Dokimi Inc. will measure and verify compliance to this policy through various methods, including but not limited to, business tool reports, and both internal and external audits.



15. Exceptions

Requests for an exception to this policy must be submitted to Rodrigo Lima, CTO, for approval.



16. Violations & Enforcement

Any known violations of this policy should be reported to the Rodrigo Lima, CTO. Violations of this policy can result in immediate withdrawal or suspension of system and network privileges and/or disciplinary action in accordance with company procedures up to and including termination of employment.

VersionDateDescriptionAuthorApproved by
1.0 June 1, 2023First versionRodrigo LimaSean Kilachand


17. APPENDIX A - Internal Retention and Disposal Procedure

Dokimi Inc. ' s CTO is responsible for setting and enforcing the data retention and disposal procedures for Dokimi Inc. managed accounts and devices.

Customer Accounts:
  • 1. Customer accounts and data shall be deleted within 60 days of contract termination through manual data deletion processes.
Customer Accounts:

While Dokmi inc. does not currently provide devices to employees or contractors, the rules set forth below will apply to any device given to an employee or contractor in the future.


Devices include:
  • 1. Employee devices will be collected promptly upon an employee ' s termination. Remote employees will be sent a shipping label and the return of their device shall be monitored.
  • 2. Collected devices will be cleared to be re-provisioned—or removed from inventory;, Dokimi Inc. will securely erase the device when reprovisioning.
  • 3. Device images may be retained at the discretion of management for business purposes

Destroying devices or electronic media

In cases where a device is damaged in a way that Dokimi Inc. cannot access the Recovery Partition to erase the drive, Dokimi Inc. may optionally decide to use an E-Waste service that includes data destruction with a certificate. Dokimi Inc. will keep certificates of destruction on record for one year. Physical destruction can be optional if it is verified that the device is encrypted with Full Disk Encryption, which would negate the risk of data recovery.

Management will review this procedure at least annually.



18. APPENDIX B - Data Retention Matrix

System or ApplicationData Description Retention Period
Dokimi Inc. SaaS Products (AWS)Customer DataUp to 60 days after contract termination
Dokimi Inc. Customer Support Tickets (ZenDesk, Crisp)Support Tickets and CasesIndefinite
Dokimi Inc. Customer Support Phone Conversations (ZenDesk)Support Phone ConversationsIndefinite
Dokimi Inc. Security Event Data (Amazon Inspector)Security and system event and log data, network data flow logsOn-Premise - Indefinite AWS Instance - 1 year
Dokimi Inc. Customer Sales (Pipedrive)Opportunity and Sales DataIndefinite
Dokimi Inc. QA and Testing DataQA, testing scenarios and results dataIndefinite
Security Policies Security Policies1 year after archive
Temporary FilesAWS /tmp ephemeral storageautomatically when process finishes