Responsive Navigation Menu

Data Protection and Privacy Policy

Data Protection & Privacy Policy

Eldercare Foundation (EF)

Version 1.0 – Effective from: 10th May, 2024.

1. Introduction

At Eldercare Foundation (EF) we work with people – their stories, needs, hopes, and sometimes their most sensitive information. Because each piece of data represents a real person, we treat it with the same dignity and care we offer face-to-face.

This policy explains – in plain language – how and why we collect, use, store and share personal information and what rights every individual has. It meets the requirements of India’s data-protection laws, including:

  • The Information Technology Act, 2000
  • The IT (Reasonable Security Practices and Sensitive Personal Data or Information) Rules, 2011
  • The Digital Personal Data Protection (DPDP) Act, 2023

2. Why This Policy Matters

  1. Respect & Trust – People share data with us because they trust us. We must honour that trust.
  2. Safety & Dignity – Wrong use of data can hurt people. We commit to keeping them safe.
  3. Accountability – Good data practice is not optional; it is the law and a donor expectation.
  4. Efficiency – Clear rules help staff avoid mistakes and focus on serving communities.

3. Who Must Follow This Policy

Everyone who touches personal data for EF, no matter where they sit:

Group Examples
Employees program, M&E, finance, admin, communications
Contract & Part-time staff project hires, short-term researchers
Consultants / Experts IT firms, evaluators, trainers
Interns & Volunteers students, fellows, community volunteers
Vendors & Service Providers MIS developers, auditors, survey teams
Partner Organizations NGOs or CBOs working with / funded by EF

These rules apply in every EF office, field site, and any online system we use.

4. Key Terms You Should Know

Term What It Means in Simple Words
Personal Data Anything that can identify a person – e.g. name, phone, photo, UIDAI Id, address.
Sensitive Personal Data Extra‑private details – e.g. health, finances, caste, biometrics, gender identity. Needs stronger protection.
Data Principal The person the data belongs to (beneficiary, staff, donor, etc.).
Data Fiduciary The organization that decides “why” and “how” the data is processed – here, EF.
Data Processor A third party that handles data for us (e.g. payroll company, survey vendor).

5. When We Are Allowed to Use Personal Data

We will only collect or use data if at least one of these grounds applies:

  1. Clear Consent – The person has said “yes” after understanding what we will do with their data. Consent can be withdrawn at any time.
  2. Legal Duty – A law, court, or regulator says we must keep or share the data.
  3. Contract – We need the data to deliver what we promised in a contract (e.g. pay salary).
  4. Vital Interests – To save a life or handle a medical emergency when consent is impossible.
  5. Legitimate Organizational Purpose – We have a genuine program need that does not override the person’s rights (e.g. anonymized data for research). We will run a quick “legitimate‑interest check” before doing this.

6. Our Guiding Principles

  1. Lawful, Fair & Transparent – We act openly and within the law.
  2. Purpose‑Limited – We only use data for the reason we collected it.
  3. Data‑Minimal – We ask for the least information needed.
  4. Accurate & Up‑to‑date – Wrong data can cause harm; we keep it current.
  5. Time‑Bound – We do not keep data forever. Retain only as long as needed or legally required.
  6. Secure & Confidential – Locks, passwords, and encryption keep data safe.
  7. Accountable – We document what we do and fix problems quickly.

7. Consent and Notices – Keeping People in Control

  • People will always get a plain‑language notice (English + local language) that covers:
    • What we are collecting
EF Privacy Policy – Sections 7 to 10
  • Why we need it
  • Who will see it
  • How long we will keep it
  • Their rights
  • Sensitive data (health, caste, biometrics, etc.) needs explicit written or digital consent.
  • Consent can be withdrawn. Unless a law says otherwise, we will then delete or anonymize the data.
  • Minors (under 18) – parent or guardian consent required. If literacy is low, we will record verbal consent with a witness or audio evidence.
  • For long projects (over a year) we will refresh consent yearly or whenever the purpose changes.
  • 8. How We Collect Data

    Method Typical Use
    Registration forms (paper / digital) Enroll beneficiaries, staff, volunteers
    Mobile apps & MIS dashboards Real-time field data, geo-tags
    Surveys, interviews, PRA tools Baseline, end line, feedback
    M&E templates Monthly activity logs, attendance, case follow-ups
    Special case files Child protection, health interventions

    Every tool is designed to capture only what is necessary.

    9. Why We Collect Data

    1. Deliver Services – Identify who needs what.
    2. Run Trainings & Events – Track attendance, learning, and certificates.
    3. Manage HR & Payroll – Pay salaries, maintain records, handle grievances.
    4. Report to Donors & Regulators – Show evidence of impact, comply with audits.
    5. Research & Advocacy – Produce anonymized insights to improve programs or influence policy.

    10. Your Rights (Data Principals)

    Right What It Means
    Know Ask what data we hold and why.
    Access Get a copy within 15 working days.
    Correct Fix mistakes or update details.
    Withdraw Consent Stop us from using your data (unless a law requires us to keep it).
    Erase Ask us to delete data that is no longer needed.
    Complain Raise an issue with our Data Protection Officer (details below).
    Nominate Appoint someone to manage your data if you are unable to.
    Data Protection Policy

    11. Sharing Data – With Care

    We share personal data only:

    1. With the person’s explicit consent – and only with named parties.
    2. When the law demands it – e.g. court order, government audit.
    3. With donors/partners – mostly in anonymized or aggregated form. Identifiable data requires consent and a clear data-sharing clause.
    4. With vendors – under a strict Data-Processing Agreement (confidentiality, security, no re-use).
    5. In emergencies – to protect life or safety.

    12. How We Keep Data Safe

    • Role-based access – staff see only what they need.
    • Encryption – data locked both while stored and while moving.
    • Secure servers & backups – with firewalls, anti-virus, and regular patching.
    • Physical security – locked cabinets, controlled entry to record rooms.
    • Device safety – password / biometric login, remote-wipe on loss.
    • Regular training & drills – everyone knows phishing risks and breach steps.
    • Vendor checks – third-party systems must meet our security standards.
    • Incident Response Plan – clear steps and contacts for any breach.

    13. How Long We Keep Data & How We Dispose of It

    Type of Data Typical Retention Disposal Method
    Donor-project records 5–7 years post-project Secure digital wipe / shredding
    HR files 7 years after exit Secure digital wipe / shredding
    Beneficiary data Review yearly; delete if inactive If deleted / anonymize
    Legal or audit hold Until case closed As advised

    All disposals are logged and, for paper, witnessed.

    14. If Something Goes Wrong – Data Breach Protocol

    1. Report Immediately – Staff inform the DPO and Executive Director.
    2. Rapid Assessment (within 24 h) – How serious? What data? How many people?
    3. Contain & Fix – Revoke access, patch systems, restore backups.
    4. Document – Log every step in the Breach Register.
    5. Notify Regulators (within 72h) – if risk of harm.
    6. Notify Affected People – explain what happened and what we’re doing.
    7. Review & Learn – root-cause analysis, update controls, extra training.
    Raise a Concern

    15. How to Raise a Concern

    Contact our Data Protection Officer (DPO):

    • Name:
    • Email:
    • Phone:
    • Office Address:

    We will acknowledge within 3 working days and aim to resolve within 30 days.
    No one will face retaliation for raising a genuine concern.

    16. Keeping Ourselves Accountable

    • Policy is part of on-boarding and annual refreshers for all staff.
    • Program teams keep consent forms and audit their data tools.
    • The DPO runs quarterly checks and reports to the Executive Director & Board.
    • An internal data audit happens every year with documented action points.

    17. Reviewing and Updating This Policy

    • Annual review led by the Executive Committee with the DPO.
    • Early review if laws change, a major breach occurs, or new tech is adopted.
    • All updates are version-controlled and shared with staff, along with refresher training.
    Footer - Eldercare Foundation
    Scroll to Top