Overview
Surge members and partners handle sensitive business, client, and partner information daily. Protecting this data is essential to maintaining trust, compliance, and the integrity of our platform. This policy outlines how all Surge members - including Scouts, Strategists, Mentors, and partners - must manage, store, and share information.
Purpose
Why This Policy Exists
This policy ensures that all confidential data is handled responsibly, securely, and in compliance with privacy and data protection laws.
It protects Surge, our clients, and our partners from potential risks related to data misuse, loss, or unauthorized disclosure.
Who Must Follow It
All Surge members, team members, affiliates, and partner organizations are required to comply with this policy as part of their Independent Contractor Agreement and Code of Conduct.
What Is Considered Confidential
Confidential information includes, but is not limited to:
Client or project data (names, contact information, utility bills, property data, contracts)
Partner pricing, allowances, and financial terms
Internal company documents, proposals, or project reports
Platform data, CRM records, and system access credentials
Member or affiliate information not publicly available
Any proprietary business processes, technology, or intellectual property belonging to Surge
If you’re unsure whether something is confidential, assume it is and handle it accordingly.
Handling Confidential Information
Step 1: Store Data Securely
All confidential data must be stored within approved Surge systems, such as the official platform dashboard, CRM, or document portals. Personal devices should be password-protected, encrypted where possible, and never used for long-term storage of client or partner data.
Step 2: Limit Access
Only access or share information relevant to your specific role or project. Never forward documents, spreadsheets, or credentials to individuals outside the Surge ecosystem without written approval.
Step 3: Communicate Securely
Use official Surge communication channels (platform chat, approved email accounts, or secure document portals) for sharing sensitive information. Avoid sending confidential details through unsecured text messages or social media platforms.
Step 4: Dispose of Data Responsibly
When project files or records are no longer needed, delete or archive them in compliance with Surge retention protocols. Never retain or share old customer or partner data after contract completion.
Data Protection and Cybersecurity
Step 1: Protect Your Credentials
Keep your platform login credentials private. Do not share your Surge password or two-factor authentication codes with anyone - including team members or clients.
Step 2: Identify Potential Threats
Be alert for phishing emails, suspicious attachments, or unauthorized data requests. Report any unusual activity immediately to [email protected].
Step 3: Use Approved Tools Only
Only use Surge-approved applications, cloud drives, and CRMs for data storage and communication. Third-party systems not verified by Surge may violate privacy laws or compromise security.
Sharing and Disclosure
Internal Sharing
You may share confidential information internally with other Surge members who are directly involved in the same project or task.
External Disclosure
Sharing data with EPCs, financing partners, or vendors is permitted only for official project purposes and must follow Surge’s confidentiality and data security guidelines. All third-party partners are bound by similar confidentiality agreements.
Prohibited Disclosures
Do not share Surge internal information with media outlets, external consultants, or competitors without written approval from Surge leadership.
Violations and Consequences
Any member found to have mishandled confidential data, whether intentionally or through negligence - may face disciplinary action up to and including termination of membership, loss of commissions, and legal action if damages occur.
Reporting a Data Concern
If you believe data has been shared, lost, or accessed improperly:
Report it immediately to [email protected].
Include details such as what data was affected, how it occurred, and when.
Do not attempt to fix or conceal the issue yourself; allow Surge’s compliance team to investigate.
Summary
Policy Area | Key Requirement |
Data Storage | Keep all information in approved Surge systems |
Access Control | Only view or share data related to your role |
Communication | Use official Surge channels for sensitive information |
Security | Protect passwords and devices |
Reporting | Notify [email protected] immediately of any breach |
