Candidates Privacy Policy

Duns

General

This privacy policy (the “Policy”) reflects the policy of Q CYBER TECHNOLOGIES LTD. and/or NSO GROUP TECHNOLOGIES LTD. (together – the “Company” or “NSO”) with respect to collection, use, storage and transfer of personal data of candidates for positions at NSO, including candidates whose application was considered and denied. NSO respects the candidates’ right to privacy and, accordingly, will use their personal data in accordance with this privacy and the applicable law.

Job Application

An application for a position at NSO could be submitted by you directly (i.e., via NSO’s website or email) or indirectly (i.e., via a human resources company or a friend’s referral). It is hereby clarified that you are not required to provide the data collected under this Policy by law. However, refusal to provide such data may prevent NSO from considering your candidacy for a position at the Company. By submitting an application for a position, directly or indirectly, you agree to this Policy and its terms.

Types of Collected Data

The recruitment process involves collection and storage of your personal data. The data collected by the Company includes all the information provided in the application and CV (i.e., identifying data and contact info, gender, marital status, birthdate or year, occupation, education, professional experience, hobbies) and any other information included in the recruitment process (interviews, tests, tasks, opinions and diagnosis). The collected information may also include data from public resources.

Purpose of Collection and Usage

The collected data could be used by the Company for: (1) the recruitment process and considering your application for a position; (2) contacting you and responding to your inquiries; (3) contacting you in the future and sending alerts regarding positions that NSO believes might be relevant to you; (4) trend analysis, polls, statistics and analyses, etc., with respect to NSO’s recruitment process; and (5) as required under law, judicial order or regulatory requirement, and/or as part of a legal proceeding (including a dispute).

Transfer of Data to Third Parties

The Company shall be entitled to transfer the data to third parties in the following cases:

  • To its advisors, contractors and/or service providers for the purpose of managing the recruitment process and considering your application (including preforming background checks, managing and storing the related data or preforming analyses with respect to the recruitment process).
  • In the event of reorganization of the Company’s activity under another entity, including in case of a merger or an acquisition, for the purpose of such reorganization (i.e., as part of a due diligence process).
  • In the event of, and for the purpose of, handling a legal dispute, and/or legal or regulatory proceeding.

Data Security

The Company is implementing security measures and procedures to ensure the security of the collected data and its systems. While these measures reduce the risks for unauthorized access to data, they cannot guarantee the data is 100% secure. Therefore, NSO does not warrant that its systems are entirely immune from unauthorized access.

Right to Review

You have the right under the law to review the data the Company has about you and to request its amendment in case that such data is false, inaccurate of incomplete. Requests in this matter, as well as any question or inquiry regarding this Policy, should be sent to the following Email: info@nsogroup.com.

Changes to this Policy

The Company reserves its right to change, from time to time, the terms of this Policy. In case of such change, the updated policy shall be available for review on this page. It is recommended to rereview the Policy from time to time. If you do not agree to the updated terms, you may request the deletion of your data from the Company’s system by sending a request to the following Email: info@nsogroup.com.

Annual Transparency & Responsibility Report – Read The Report That Highlights The Safeguards Against Misuse of Our Technology, And Outlines Internal Governance and Compliance Processes