top of page

 

POPI ACT COMPLIANCE - Protection of Personal Information

PRIVACY POLICY

G Five Security Labour Solutions (Pty)Ltd. adopted a Privacy Policy as part of the business and operations of the company. G Five Security Services is committed to protecting the personal information of any individual or juristic person and will always ensure that personal information is processed fairly, lawfully and correctly, and within the ambit of the applicable legislation. As all people have the constitutional right to privacy, G Five Security Services will at all times maintain appropriate levels of security and privacy of such personal information about current, past and prospective clients and employees. 

The main objective of this policy is to align G Five Security Services operations to comply with the legislative requirements of Protecting Personal Information (POPIA). This policy will ensure the necessary securities are in place with regard to the collection and processing of personal information as well as deal with the retention and destruction of the same information. It will also deal with data breaches and the complaints process.

This policy applies to all Individuals and Juristic Entities (prospective, previous & and current) who had/have interactions or shared any Personal Information with G Five Security Service at any time.

Personal Information Definition

Personal Information

Personal information includes:

  • certain information that we collect automatically when you visit our website;

  • certain information we request relating to your risk portfolio in order to provide you with security services;

  • certain information for the purpose of the premium collection;

  • certain information regarding a loss or claim; But excludes;

  • information that has been made anonymous so that it does not identify a specific person;

  • permanently de-identified information that does not relate or cannot be traced back to you specifically;

  • non-personal statistical information collected and compiled by us; and

  • information that you have provided voluntarily in an open, public environment or forum including any blog, chat room, community, classifieds, or discussion board (because the information has been disclosed in a public forum, it is no longer confidential and does not constitute personal information subject to protection under this policy).

Common examples

Common examples of the types of personal information which we may collect, and process include your:

  • identifying information – such as your name, date of birth, and identification number of any kind;

  • contact information – such as your phone numbers and email address;

  • address information – such as your physical and postal address; and

  • demographic information – such as your gender or marital status. Sensitive personal information

Depending on the services required, we may also collect sensitive personal information including your:

  • financial information – such as your bank account details and financial history;

  • sensitive demographic information – such as your race or ethnicity;

 

Acceptance

Acceptance required 

By requesting G Five Security Services to render a service, you are deemed to have read, understood, accepted and agreed to be bound by all the terms of this policy.

Legal capacity

No person under the age of 18 years old may request any services or access our website to provide any details to G Five Security Services.

Your Obligations

You may only send us your own Personal Information or the information of another data subject where you have their explicit and specific permission to do so.

Changes

G Five Security Services may change the terms of this policy at any time. Notice of any changes will be placed in a prominent place on the website or by sending you an email detailing the changes that were made and indicating the date that they were last updated. The changed terms will apply to you and you will be deemed to have accepted those updated terms.

Collection & Processing of Personal Information

Consent

G Five Security Services will obtain your consent to collect and process Personal Information:

  • in accordance with applicable laws;

  • when you request a product or service from us.

The information obtained will have relevance to your portfolio and will be processed for the following reasons:

  • To verify your identity

  • To market new products that may ensure better risk coverage

  • To ensure your details are always up to date

  • To comply with all legal and regulatory obligations

Processing

It will be required that Personal Information is processed by G Five Security Services in order to fulfil our obligations. G Five Security Staff throughout the company, within the required security levels, will be responsible for securely processing your Personal Information. Processing will include collecting, recording, storing, updating and sharing with third parties. All precautionary measures have been implemented to ensure that Personal Information is kept safe throughout this process.

Recording & Storing

Personal Information will be recorded and stored on G Five Security devices, voice recording systems, financial systems, secure servers as well as hard copy storage facilities that comply with POPI security requirements.

G Five Security has full control over Personal Information when it is shared on any of our official communication platforms. Our official communication platforms are G Five Security email (@g5securitysolutions.co.za or @g5securitysolutons.com), G Five Security Teams and telephone lines as published on our website, our official Website (www.g5securitysolutions.com) as well as portals which you will have login rights to. If any other external platforms are used to communicate with us, we can unfortunately not guarantee the safety of your Personal Information.

Sharing personal information

In order for G Five Security to fulfil our obligations to you, it will be required to share your personal information with a third party after obtaining your consent to do so. G Five Security may also request your consent to share your Personal Information with our affiliates in order to provide you with additional risk coverage options.

Third parties include but are not limited to:

  • Industry bodies (PSIRA)

  • Regulatory bodies (PSIRA, SASA)

  • G Five Security Affiliates

Updating Personal Information

We will try to keep the Personal Information we collect as accurate, complete and up to date as is necessary for the purpose defined in this policy. From time to time, we may request you to update your Personal Information by contacting you. You are able to review or update any Personal Information that we hold at any time by emailing us at wmouton@g5securitysolutions.co.za or phoning us. Please note that in order to better protect you and safeguard your Personal Information, we take steps to verify your identity before granting you access to your account or making any corrections to your Personal Information.

No Selling

G Five Security will never sell Personal Information. No Personal Information will be disclosed to anyone except as provided in this Privacy Policy.

Marketing Consent

You will have the option at all times to indicate if you want to receive marketing and promotional material from G Five Security and/or its affiliates. If you choose to “Opt-Out” you will still receive communication from us regarding any administration requirements on your portfolio as well as enhancements on current products and services. You will however not receive any updates on new products or services we offer, which might have a negative effect on your portfolio.

As we remain duty-bound as your security provider and advisor to keep you abreast of relevant new security products and equipment as these become available, we will ask your specific permission to enable us to keep you informed as appropriate. You do however retain the right to disallow us from contacting you in this regard which then will negatively affect our contractual duty towards you.

Change of Ownership

If at any stage G Five Security undergoes a change in ownership, or a merger with, acquisition by, or sale of assets to, another entity, we may assign our rights to the Personal Information we process to a successor, purchaser, or separate entity. We will disclose the transfer by notifying all for whom we hold Personal Information on. If you are concerned about your Personal Information migrating to a new owner, you may request us to delete your personal information, other than in respect of your contracts which will be invalidated without such information.

Security

G Five Security has taken all necessary precautionary measures to ensure that any Personal Data collected and stored is done in line with all data protection laws. All email communication is end-to-end encrypted to ensure that whenever communication occurs over email, it is safely done. Internal servers as well as those hosted by 3rd party suppliers are all done in a secure environment with appropriate firewalls and other advanced security measures in place to prevent interference from outside intruders. Data classification ensures restricted access is given to sensitive information and only given to those employees who require it to fulfil their job responsibilities. Disaster recovery procedures have also been implemented where appropriate.

Transfer to Another Country

G Five Security will not transfer any personal information across a country border without your prior written consent. Personal information may be stored on servers located outside the country in which it was collected in a foreign country whose laws protecting personal information may not be as stringent as the laws in the country in which it was collected. You consent to us processing your personal information in a foreign country whose laws regarding the processing of personal information may be less stringent.

Incident and Breach

You will be informed as soon as any breach or possible breach occurred in which your data might have been obtained by any third party unlawfully. G Five Security has a Breach Policy and procedure in place to ensure the damage in this event is handled with urgency to minimize the loss. In the event that you are made aware of a possible breach, please notify us immediately at wmouton@g5securitysolutions.co.za

Enquiries – Promotion of Access to Personal Information

If you have any questions or concerns arising from this Privacy Policy or the way in which we handle personal information, please contact us on wmouton@g5securitysolutions.co.za

Complaints

If at any stage you feel that G Five Security has obtained or processed your information without the necessary consent or without due care, you can lodge a complaint to us at wmouton@g5securitysolutions.co.za

Review

This policy shall be reviewed annually or more frequently in the event of material amendments to the regulatory environment.

Disclaimer

This page or any other page on this site may contain other proprietary notices and copyright information, the terms of which must be observed and followed. Information on this website is provided “as is” without warranty of any kind, either express or limited, including, but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. Some jurisdictions do not allow the exclusion of implied warranties; therefore, the above exclusion may not apply to you.

Information on this website may contain technical inaccuracies or typographical errors. Information may be changed or updated without notice. G Five Security Labour Solutions may also make improvements and/or changes to this information at any time without notice.

Information that G Five Security Services publishes on this website may contain references or cross-references to other products, programmes and services that are not announced or available in your country. Such references do not imply that G Five Security intends to announce such products, programmes or services in your country. Consult an G Five Security representative for information regarding the products, programmes and services which may be available to you.

When you access a non-G Five Security website, please note that it is independent of G Five Security and that G Five Security cannot control the content on such websites. In addition, a link to a non-G Five Security Services website does not mean that G Five Security Services endorses or accepts any responsibility for the content, or the use, of such websites.

It is up to the individual visiting this website to take precautions to ensure that whatever you select for your use is free of such items as viruses, worms, Trojan Horses and other items of a destructive nature. In no event will G Five Security Services be liable to any party or for any direct, indirect, special or other consequential damages due to the use of this website, or on any other hyperlinked website, including without limitation, any lost profits, business interruption, loss of programs or other data on your information handling system or otherwise, even if we are expressly advised of the possibility of such damages.

G Five Security Services provides the https://www.g5securitysolutions.com website as a service to the public. The information and content on this website are curated and published by G Five Security Services and are intended for general purposes only. While G Five Security Services endeavours to keep the information up to date and correct, it makes no representations or warranties of any kind about the completeness, accuracy, reliability, suitability or availability, with respect to the website, content, views and opinions by authors, products, services, or related graphics contained on the website, for any purpose. Any reliance placed on such information is therefore strictly at the viewer’s own risk. Should you be aware of any unsuitable information or content, kindly inform us in writing at 21 Goedemoed street, Durbanville, Cape Town, 7550.

In no event will G Five Security Services be liable for any loss or damage including without limitation, indirect or consequential loss or damage, or any loss or damage whatsoever arising from loss of data or profits arising out of, or in connection with, the use of this website. Although the G Five Security Services website may include links providing direct access to other Internet resources, including websites, social media accounts, applications, and documents, G Five Security Services is not responsible for the accuracy of information or content contained on these websites and platforms. G Five Security Services has no control over the nature, content and availability of the information and content on those sites, and the inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.  Every effort is made to keep the website fully functional, however, G Five Security Services takes no responsibility for, and will not be liable for, the website being temporarily unavailable due to technical issues beyond our control.

Prices quoted include VAT and are in South African Rand unless otherwise stated. G Five Security Services and/or any of their employees, servants, agents or representatives do not accept any responsibility and/or any liability of any nature pursuant to any information contained here or the use of such information. This includes the provision of any products and/or services that may be provided by G Five Security Services or by any third party, including but not limited to suppliers, companies, or any person or entity referred to in this document or on any website. Information given does not necessarily represent the views of G Five Security Services and nothing contained herein shall in any way create any responsibility or liability by G Five Security Services. Use of any referred third-party products and/or services shall be between the user and such third party and G Five Security Services make no representation and/or warranty of any nature as to the performance and/or compliance and/or whether such services or products or suppliers are fit for purpose.

Social Media Disclaimer

We are thrilled to have you as part of the G Five Security Services Facebook community. While we encourage and appreciate your opinions, input and feedback, we would like to make you aware of our community guidelines, to ensure that you can join the conversation without being insulted or unjustly offended. Content shared or published by users does not reflect the opinions of and is not necessarily endorsed by G Five Security Services, its employees, representatives or its affiliates. Should you be aware of any unsuitable content, kindly inform us in writing at 21 Goedemoed street, Durbanville, Cape Town, 7550.

Community Guidelines
G Five Security Services reserves the right to remove content or comments that:

  • Are likely to provoke, attack or offend people

  • Are racist, sexist, homophobic, sexually explicit, abusive or otherwise objectionable in G Five Security Services’ view

  • Contain swear words or offensive and derogatory language

  • Break the law, condone or encourage unlawful activity, including breach of copyright, defamation and contempt of court

  • Advertise competitors’ products or services for profit

  • Are seen impersonating someone else

  • Repeatedly post identical or unsolicited messages, i.e., spam

  • Are not related to the topic

  • Include contact details such as contact numbers, postal or email addresses

  • Contain links that are irrelevant, advertising, spam, offensive, inappropriate or link to or are associated with G Five Security Services’ competitors

  • Describe or encourage activities that could endanger the safety or well-being of others

Furthermore, G Five Security Services reserves the right to restrict, limit or ban access to the G Five Security Services Facebook page, if, in the opinion of the G Five Security Services moderators, such persons are disrupting the page and have failed to abide by G Five Security Services Facebook community guidelines.

G Five Security Services will only respond in the universal business language, English, wherever possible.

We look forward to creating a community of G Five Security Services fans that we can engage with and learn from.

bottom of page