Privacy of your personal information
Synchronous Health is obligated to keep information about you on file. We greatly respect and protect your privacy.
Federal and State laws have certain guideline that we use as our foundation and then we amplify that with encryption to maintain personnel records and documents.
Upon your being hired, a file is established that contains, but is not limited to, the following documentation when applicable:
- Name, address, age, social security number, citizenship.
- Company application, resume, and other supporting documents from the hiring process.
- Occupation, including dates and particulars of hire.
- A written offer of employment.
- Compensation (please do not share what you are paid with others).
- Banking information.
- Tax information.
- Accumulation & Dissemination of leave time.
- Performance metrics and reviews.
- Change of status forms for any term of employment or personal information that has been altered.
- Emergency contact information.
- Written employment agreements.
Changes to your information
Common Sense – Please keep this information updated
You are responsible for notifying your manager or the Talent management team of any applicable information changes.
Use of Personal Contact Info
We also will provide reasonable access to your contact information to relevant Synchronous Health Employees, for business collaboration and in case of emergency. If someone abuses this access, inform the privacy officer, Kati Lohr immediately.
Use of Company IT and Privacy
Company IT resources and communications systems are to be used for business purposes only unless otherwise permitted under applicable law.
All content maintained in Company IT resources and communications systems are the property of the Company. Therefore, associates should have no expectation of privacy in any message, file, data, document, facsimile, telephone conversation, social media post, conversation, or any other kind or form of information or communication transmitted to, received, or printed from, or stored or recorded on Company electronic information and communications systems.
The Company reserves the right to monitor, intercept, and/or review all data transmitted, received, or downloaded over Company IT resources and communications systems in accordance with applicable law. Any individual who is given access to the system is hereby given notice that the Company will exercise this right periodically, without prior notice and without prior consent.
The interests of the Company in monitoring and intercepting data include, but are not limited to: protection of Company trade secrets, proprietary information, and similar confidential commercially-sensitive information (i.e. financial or sales records/reports, marketing or business strategies/plans, product development, customer lists, patents, trademarks, etc.); managing the use of the computer system; and/or assisting associates in the management of electronic data during periods of absence.
You should not interpret the use of password protection as creating a right or expectation of privacy, nor should you have a right or expectation of privacy regarding the receipt, transmission, or storage of data on Company IT resources and communications systems.
Do not use Company IT resources and communications systems for any non-work matter that you would like to be kept private or confidential.
This policy governs the use of all IT resources and communications systems owned by or available at the Company, and all use of such resources and systems when accessed using your own devices, including but not limited to: email systems and accounts; internet and intranet access, telephones and voicemail systems, including wired and mobile phones, smartphones, and pagers, printers, photocopiers, and scanners, fax machines, e-fax systems, and modems all other associated computer, network, and communications systems, hardware, peripherals, and software, including network key fobs and other devices, closed-circuit television (CCTV) and all other physical security systems and devices, including access key cards and fobs.