Updated November, 2024
Jeffer Mangels Butler & Mitchell LLP (“JMBM”, the "Firm", or “we”) is committed to protecting and respecting the privacy of its current and past employees, partners, independent contractors, and job applicants. Please read this Internal Privacy Policy (the “Policy”) carefully to understand the Firm's views and practices regarding the Personal Information of Covered Persons (as defined in Section 1) and how the Firm will treat it.
The Firm only collects the Personal Information it needs to perform the functions described in this Policy. Accordingly, the Firm does not necessarily collect all of the categories and types of Personal Information identified in this Policy from all categories of Covered Persons. For example, the Firm only collects a subset of the Personal Information specifically discussed in this Policy from prospective employees and job applicants. Please contact [Keilani Afalava] if you have any questions about whether certain information in this Policy applies to you.
All Covered Persons at JMBM are covered by and must comply with this Policy. Any Covered Person who fails to comply with this Policy may be subject to disciplinary action, up to and including dismissal. You should immediately contact [Keilani Afalava] if you become aware of a breach or potential breach of this Policy.
The Firm is also committed to respecting both your Personal Information and the Personal Information it receives from customers, vendors, website users, mobile app users and other external sources. Covered Persons should therefore also familiarize themselves with and be aware of the commitments we make in relation to such Personal Information. For a copy of JMBM’s current Public Privacy Policy, please visit https://www.jmbm.com/privacy-policy.html. You can also contact the Firm’s director of human resources for a copy of any JMBM Privacy Policy.
The following definitions apply to this Policy:
“CCPA” means the California Consumer Privacy Act, as amended.
“Consumer” means a living individual about whom the Firm holds Personal Information.
“Contractor” means a natural person who provides any service to a business pursuant to a written contract.
“Covered Person” refers to:
“Electronic” or “Electronically” means relating to technology having electric, digital, magnetic, wireless, optical, electromagnetic, or similar capabilities.
“Encrypted“ means the transformation of data through an algorithmic process or an alternative method that is at least as secure, so that the data can only be accessed with confidential key or password.
“Partner” means a natural person who holders a partnership interest in the Firm or is designated as an “partner” (whether directly or as the owner of a business entity that holds a partnership interest in the Firm).
“Personal Information” means information (whether stored Electronically or in physical filing systems) relating to a living individual who can be identified from that data (or from that data and other information in JMBM’s possession). Personal Information can be factual (such as a name, address, date of birth, Social Security number or driver’s license number), Sensitive Personal Information as described below, or it can be an opinion (such as a performance appraisal). It can even include a simple e-mail address. The categories of Personal Information as defined by the CCPA that pertain to this Policy include:
Identifiers | Name, alias, postal address, unique personal identifier, online identifier, IP address, email address, account name, Social Security number, driver’s license number, passport number, or other similar identifiers |
Other Data | Financial information, medical information, health insurance information, signature, physical characteristics or description, telephone number, geolocation |
Protected Classes | Race, color, sex, age (40 and older), religion, national origin, citizenship status, genetic information, sexual orientation, gender identity or gender expression, ancestry, AIDS/HIV, disability, marital status, familial status, military or veteran status, political affiliations or activities, status as a victim of domestic violence, assault, stalking, or any other classification protected under California or federal law |
Biometric Information | Fingerprints, retina scans, face prints, DNA |
Internet Activity | Browsing history, search history, website interactions |
Geolocation Data | Data which allows for determining, with reasonable precision, the location of any person or object |
Sensory Data | Audio, electronic, visual, thermal, olfactory, or similar data |
Professional Data | CV, resume, employment history, licenses, certificates |
Education Data | Educational background, grades, scores |
Inferences | Profiles about a consumer reflecting the individual’s preferences, characteristics, psychological trends, predispositions, behavior, attitudes, intelligence, abilities drawn from other Personal Information |
“Processing”, “Process”, or “Processed” is any activity that involves use of the Personal Information. It includes obtaining, recording, or holding the Personal Information, or organizing, amending, retrieving, using, disclosing, erasing, or destroying it including by automated means. Processing also includes transferring Personal Information to third parties.
“Sensitive Personal Information” is Personal Information that reveals about a Covered Person one or more of the following types of information, including: Social Security, driver’s license, state identification card or passport number; account log-in, financial account, debit card or credit card number in combination with any required security or access code, password or credentials allowing access to an account; precise geolocation; racial or ethnic origin, religious or philosophical beliefs, or union membership; contents of a consumer’s mail, email, and text messages unless the business is the intended recipient of the communication; genetic data; biometric information; health information; information about sex life or sexual orientation. This Sensitive Personal Information will be handled with extra care as further described in this Policy. Sensitive Personal Information includes financial account information, protected health or medical details, physical or mental health or condition information.
2. Purpose and Scope of this PolicyThis Policy sets out the basis on which Personal Information the Firm collects from you, or you provide to the Firm, will be processed by the Firm. This Policy supports the Firm’s efforts to safeguard Personal Information in any format to, in particular:
This Policy applies to all Personal Information relating to Covered Persons that exists in any of the Firm’s Processing environments, on any media, at all times.
As an employer, the Firm needs to collect, store and Process Personal Information about its Covered Persons. Personal Information may be provided to the Firm by a variety of means, including through the Internet, the Firm’s intranet, by email, by telephone, by fax or in person. Personal Information, which may be held on physical or Electronic media, is subject to certain legal safeguards that impose restrictions on how the Firm may Process Personal Information. The Firm strives to uphold these key principles when Processing Personal Information:
The Firm may collect and Process, and/or has, in the 12-month period immediately preceding the effective date of this Policy, collected and Processed, the following Personal Information about its Covered Persons (excluding children under 16 years of age) for the following purposes:
The Firm is permitted under relevant laws to undertake a range of human resources-related Processing. The Firm will notify you about how your Personal Information being Processed as set forth in this Policy at the time any Personal Information is collected, or after such collection if new types of Processing are to be carried out.
If a Covered Person engages with the Firm outside of the context as a Covered Person, information collected in that relationship will be subject to either the Firm’s Public Privacy Policy available at https://www.jmbm.com/privacy-policy.html or from the Firm’s director of human resources.
4. The Firm's Responsibility for Your Personal InformationSecurity Procedures. The Firm will strive to protect your Personal Information through the following methods:
Security Incidents. Any Covered Person who becomes aware of circumstances that may indicate an intrusion or compromise in the Firm's security is obliged to immediately report the incident to the CIO or the IT Help Desk, a member of the Firm's Management Committee (Stan Gibson or, if Mr. Gibson is not available, Neil Erickson), the Firm's Cybersecurity Counsel (Michael Gold or Robert Braun), and the Executive Director (Doug Walton). The circumstances requiring notice include evidence of unauthorized access to Personal Information in any format, loss or theft of equipment or records containing Personal Information, evidence of an intrusion into the Firm’s system, or Personal Information transmitted or disclosed in error. The Firm maintains appropriate logs of all monitoring and security activity. The Firm has established a response plan to address breaches in its security that is reviewed and updated periodically. If there is a breach of security, the affected individuals will be notified as required by law. The Firm reviews all security events and all responsive actions in order to improve its protection of Personal Information.
5. Sensitive Personal InformationIt is sometimes necessary for the Firm to Process Sensitive Personal Information as described in Section 3 above. The Firm may collect or Process Sensitive Personal Information for the purpose of inferring characteristics about Covered Persons, consistent with applicable law.
While the Firm has the right to Process Sensitive personal Information in certain circumstances under applicable law, Covered Persons have certain rights with respect to the Firm’s Processing of Sensitive Personal Information as addressed in Section 9 below.
6. Disclosure and Transfer of Personal InformationSecurity of Personal Information During Transfer.
Where Personal Information is transferred within the Firm's course of performing its duties, the level of security appropriate to the type of Personal Information and anticipated risks will be applied. For example, if transferred by e-mail, Personal Information may be encrypted with the password supplied separately where it is appropriate and necessary. The Firm also employs recognized technology and/or private networks to protect Personal Information transferred over the Internet where it is appropriate and necessary.
Disclosures to Third Parties.
By providing Personal Information to the Firm, you agree that the Firm may share certain information with third parties and, by submitting Personal Information to the Firm, you agree to this transfer and Processing.
Personal Information will only be transferred to a third party if the third party agrees to comply with procedures and policies that comply with this Policy and the Firm's data protection procedures, or if that third party puts in place adequate measures which are compliant with all applicable laws and regulations.
Personal Information will only be shared with third parties in limited circumstances, including:
If the Firm is required by a client agreement to disclose identification information to grant access to the client’s worksite, you will be provided with that information prior to the disclosure and required to sign a waiver.
7. Restrictions on Access to Personal InformationThe Firm employs physical, administrative, and technological means to restrict access to Personal Information including:
The Firm will only retain your Personal Information or portions of your Personal Information for as long as is necessary to perform its obligations to you or as is required by law. The Firm has a legal duty to retain employment records that may include Covered Persons’ Personal Information after the termination of employment. There are varying requirements as to how long an employer must maintain employment records depending on the type of record being maintained. Accordingly, different categories of Personal Information may be kept for different periods of time in compliance with the law.
All Personal Information you provide will be stored on secure servers or in secure files which may be based in the United States. By submitting your Personal Information, you fully consent to this transfer, storing and Processing. The Firm will take reasonable steps to treat your data securely and in accordance with this Policy.
9. California Privacy RightsThe following disclosures and the rights described below are applicable to Covered Persons who are residents of California.
9.1 Information the Firm CollectsDescriptions of the categories of information the Firm collects, the sources of the information, and the uses of that information are contained in Sections 2 and 3 above.
9.2 Your Rights Under the CCPAUnder the CCPA, Covered Persons located in California have certain rights regarding their Personal Information, including the following:
Please note that the above rights are not absolute, and we may be entitled to refuse requests, wholly or partly, where exceptions under applicable law apply.
Discrimination and retaliation against any Covered Person for exercising their CCPA data rights under this policy and applicable law is strictly prohibited.
9.3 Exercising Your RightsYou may submit an individual rights request by calling us at 888-810-0411, completing our online form located at https://www.jmbm.com/privacy-policy-form.html or emailing the Firm at human@jmbm.com. The Firm shall maintain records of requests for at least 24 months.
Before the Firm can process a request to delete, a request to correct, or a request to provide a copy of a Covered Person’s Personal Information, the Firm will verify the identity of the individual making such request. To verify your identity, the Firm will rely upon information we have previously collected about you, such as known phone number or email address.
You may designate an authorized agent to exercise these rights on your behalf. If a Covered Person utilizes an authorized agent to exercise these rights, the following proof that the agent has been authorized to act on the individual’s behalf must be provided:
The Firm will acknowledge a request within 10 days of receipt of a request. A verified request will generally be fulfilled within 45 days of receipt of any such request. If necessary, the Firm may take an additional 45 days to respond to the request, for a maximum total of 90 days, provided that the Firm provides the requester with notice and an explanation of the reason the Firm will take more than 45 days to respond. The Firm shall inform the requestor whether it has complied, in whole or part, with the request or the basis for denial. Prior to deleting or releasing any information, the Firm will need to verify the requestor is authorized to have the information deleted or to receive the information through the authentication method described above.
10. Enforcement of This PolicyYou should direct any questions or concerns about the interpretation or operation of this Policy, or about what may or may not be done with regard to Personal Information, to our director of human resources.
Any Covered Person found to have violated this Policy is subject to disciplinary action, up to and including termination of employment for employees.
11. Changes to this PolicyThis Policy is updated and effective as of the date shown on the title page. The Firm shall review this Policy and the particular security measures whenever there is a material change in business practices that may reasonably have an impact on the security or integrity of records containing Personal Information or as required by applicable law. Any changes the Firm may make to this Policy in the future will be posted on the Firm's Intranet.