A & C Christofi Ltd
Data Protection & Information Security Policy
ICPAC Licence: E543/543/2023
Company Registration: HE 378179
Effective Date: 1 December 2025 | Version: 2.0
Approved by the Board of Directors: 28 December 2025
1. Policy Statement & Senior Management Commitment
The Board of Directors of A & C Christofi Ltd (“the Firm”) recognises that the protection of personal data and the maintenance of the highest standards of information security constitute both a legal obligation and a core professional duty under the Institute of Certified Public Accountants of Cyprus (ICPAC) Code of Ethics, the International Federation of Accountants (IFAC) standards, and our contractual commitments to clients.
We are fully committed to compliance with:
- Regulation (EU) 2016/679 (General Data Protection Regulation – GDPR)
- Law 125(I)/2018 of the Republic of Cyprus, and EU ePrivacy Directive 2002/58/EC – as transposed into Cyprus law
- Directive (EU) 2022/2555 (NIS-2 Directive) as transposed into Cyprus law
- UK GDPR and Data Protection Act 2018 – where applicable to UK-based clients and representatives
- Regulation (EU) 2022/2554 (Digital Operational Resilience Act – DORA) – where applicable
- All successor legislation and regulatory guidance
The processing of personal data – of client representatives, employees, and beneficial owners – is also conducted in adherence to other key regulatory frameworks, including but not limited to the Prevention and Suppression of Money Laundering and Terrorist Financing Laws of Cyprus.
This Policy represents the Firm’s binding internal rulebook. Breach of its provisions will be treated as serious misconduct.
Signed: Chris Christofi, Managing Director & Data Protection Officer
Date: 28 December 2025
2. Scope & Applicability
2.1 This Policy applies without exception to:
- all directors, employees, trainees, seconded staff and contractors;
- all personal data processed by the Firm irrespective of format (electronic, paper, audio, biometric);
- all processing activities whether carried out in Cyprus, another EEA state, the UK or third countries;
- all systems, devices, cloud services, removable media and third-party processors under the Firm’s control or instruction.
2.2
The Policy extends to former staff and third parties for as long as they continue to have access to the Firm’s systems or personal data.
3. Definitions & Interpretation
The following definitions shall apply throughout this Policy:
“Personal Data”, “Special-Category Data”, “Processing”, “pseudonymization”, “Controller”, “Processor”, “Data Subject”, “Personal Data Breach” bear the meanings given in Article 4 GDPR.
However:
- “Firm” means A & C Christofi Ltd.
- “DPO” means the appointed Data Protection Officer.
- “Engagement Letter” means the formal contract governing professional services.
- “Record of Processing Activities” (RoPA) means the register required by Article 30 GDPR.
- “Transfer Impact Assessment” (TIA) means the risk assessment required following the Schrems II judgment (C-311/18).
Interpretation shall follow GDPR Recitals and Cyprus Law 125(I)/2018.
4. Governance Structure & Accountability
- Ultimate responsibility rests with the Board of Directors.
- Day-to-day oversight is delegated to the Data Protection Steering Committee comprising:
- Managing Director (Chair)
- Data Protection Officer
- IT Manager
- Compliance & Risk Partner
- External legal counsel (advisory capacity)
- The Committee meets quarterly and maintains minutes that are reviewed by the Board annually.
- Accountability is demonstrated through this Policy, the RoPA, DPIA register, training records, breach register, third-party DPA register and annual management review.
- All user access rights are reviewed quarterly by the DPO + IT Manager.
- Access removal for leavers occurs before or at the moment employment ends (zero-lag deactivation).
5. Data Protection Officer – Role & Independence
- Mr Chris Christofi is appointed DPO pursuant to Articles 37–39 GDPR.
- The DPO:
- reports directly to the Board;
- cannot be dismissed or penalised for performing his tasks;
- is provided with adequate resources, continuous training and full access to all data processing activities;
- acts independently and is not subject to instructions regarding the exercise of his tasks.
- Contact: dataprotection@acccyp.com (monitored daily).
6. Data Protection by Design & by Default
- Every new service, system, process or engagement must undergo a Data Protection Threshold Assessment before launch.
- Default settings shall always be the most privacy-friendly (e.g., pseudonymisation where possible, minimal retention, no non-essential cookies).
- Privacy Impact Assessments (DPIA) are mandatory for high-risk processing (see Section 17).
- All client-facing documents (Engagement Letters, proposals, portals) contain a standard Data Protection Schedule referencing this Policy.
The use of unapproved systems (shadow IT), including cloud storage, messaging apps (e.g., WhatsApp for transmitting documents), and personal devices, is strictly prohibited. Violations may lead to disciplinary action.
All software or portal changes follow formal change-management: peer review, staging environment testing, rollback plan, vulnerability scan before release.
7. Lawful Bases & Special Category Data Framework
7.1 The Firm relies on the following lawful bases (documented in the RoPA):
| Processing Purpose | Primary Lawful Basis | Alternative / Secondary Basis |
|---|---|---|
| Client onboarding & KYC/AML | Legal obligation (AML Law) | Contract |
| Performance of accounting, audit, tax services | Contract (Engagement Letter) | Legal obligation |
| Statutory filings & regulatory reporting | Legal obligation | — |
| Billing & debt recovery | Contract | Legitimate interests |
| Direct marketing to business contacts | Legitimate interests (LIA documented) | Consent (where required) |
| Website analytics & security | Legitimate interests | — |
| Payroll processing (health data) | Explicit consent + Employment law | — |
7.2 The processing of Special Category Data (health, biometric, etc.) always executed under specific condition arising Article 9(2). In line with the Firm’s B2B practice, such processing may occur only where strictly necessary for;
- The establishment, exercise, or defence of legal claims – Article 9(2)(f) GDPR
- Reasons of substantial public interest, based on Cyprus Law which provides the necessary condition for processing under Article 9(2)(g) GDPR, specifically for compliance with statutory AML and CFT obligations
- For internal HR purposes, processing of employee Special Category Data conducted under Article 9(2)(b) GDPR in connection with Employment and Social Security Law.
8. Data Minimisation & Purpose Limitation Procedures
- Engagement teams must complete a Data Mapping Checklist at kick-off identifying exactly which data items are required.
- Clients are requested to provide only necessary documents; excess data is returned or securely destroyed.
- Purpose limitation is enforced via folder-level access controls and audit-log tagging.
Data Classification Levels
All data is classified into the following categories:
- Public – approved for external publication
- Internal – non-sensitive Firm information
- Confidential – client data, internal financials, regulatory correspondence
- Highly Confidential / Restricted – passports, tax IDs, AML files, audit evidence, special-category data
Each classification has mandatory handling rules (storage, access, transmission, logging).
9. Accuracy & Up-to-Date Obligations
- Clients are contractually required (via Engagement Letter) to notify us of material changes within 14 days.
- Annual client verification letters are sent to corporate clients requesting confirmation of continued accuracy of KYC data.
- Errors discovered internally trigger immediate rectification and, where necessary, notification to competent authorities.
10. Retention, Archiving & Secure Destruction Schedule
The following schedule is mandatory and audited annually:
| Category | Retention Period (from trigger event) | Legal / Professional Basis | Destruction Method |
|---|---|---|---|
| Full client accounting & tax files | 10 years after engagement ends | Cyprus Tax Procedure Code, Companies Law Cap.113 | Certified digital shredding + paper cross-cut |
| Audit working papers & final reports | 7 years after audit report signature | ISA 230, ICPAC Directive, Statutory Audit Law | As above |
| AML/KYC identification documents | 7 years after relationship ends | Cyprus Anti-Money Laundering Law, EU AML Directives | As above |
| Payroll records (including health data) | 7 years after employment ceases | Social Insurance Law | As above |
| Statutory registers & corporate records | Permanent (archived) | Cyprus Companies Law (Cap. 113) | Secure off-site fire-proof storage |
| Engagement Letters & fee agreements | 10 years after expiry | Cyprus Contract Law & Civil Limitation Periods, ICPAC, AML Law | As above |
| Data Subject Access Request files | 3 years after closure | Internal accountability | As above |
| Website & system logs | 24 months | Cybersecurity & incident response needs | Automatic overwrite |
| Marketing consent records | Until withdrawal + 3 years | Proof of compliance | As above |
- 10.1 Destruction is performed by licensed contractor with certificate issued.
- 10.2 Archived data is encrypted and access-restricted to DPO and Managing Director only.
11. Technical Security Controls
- The Firm operates a zero-trust architecture: no user or device is trusted by default.
- Mandatory controls include:
- Encryption of data at rest (e.g., AES-256) and in transit (e.g., TLS 1.3), including full-disk encryption (e.g., BitLocker) and file-level data protection solutions
- Multi-factor authentication (MFA) with hardware keys for all cloud and remote access
- Data Loss Prevention (DLP) policies blocking exfiltration of tax IDs, passports
- Security Information & Event Management (SIEM) system with 24/7 alerting
- Endpoint Detection & Response (EDR) on every workstation and laptop
- Regular (at least quarterly) penetration testing and vulnerability scanning by ISO-27001-certified provider
- Patch management SLA: critical patches within 48 hours
- Privileged Access Management (PAM) with just-in-time elevation and session recording
- Mobile devices are centrally managed; personal devices are prohibited from storing client data.
- All users must comply with acceptable-use requirements covering:
- prohibition of unapproved software
- no use of personal email for work
- mandatory use of VPN for remote access
- restrictions on use of AI tools for client data unless expressly approved
- prohibition on storing client data on local drives
- Backups (daily incremental, weekly full) are tested quarterly for integrity and restorability. Disaster recovery testing is conducted annually.
- Encryption keys are stored in a Hardware Security Module (HSM), rotated annually or immediately upon compromise, and subject to strict role-based access control.
- Users are prohibited from exporting data to non-approved countries, downloading data onto local devices, or transferring any personal data using consumer-grade tools. Violations constitute a breach under Section 20.
12. Physical & Environmental Security
- Office premises are protected by:
- Electronic access control with individual PIN + proximity card
- 24/7 CCTV (90-day retention) covering entrances, server room and archive area
- Server room with biometric lock, fire suppression and environmental monitoring
- Clean-desk and clear-screen policy strictly enforced
- Locked fire-proof cabinets for paper archive accessible only to authorised personnel
- Visitor badges, escort requirement and sign-in register
- Off-site backups are stored in two geographically separate Tier-IV data centers.
- The Firm maintains a tested Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) covering:
- maximum tolerable downtime (MTD) of 24 hours
- recovery time objective (RTO) of 8 hours
- recovery point objective (RPO) of 24 hours
- alternate workspace / remote working fallback
- annual testing and Board approval
13. Organisational & Human-Factors Measures
- All staff receive:
- Mandatory onboarding and annual refresher data-protection training (certificate required)
- Quarterly phishing simulation exercises (failure → immediate retraining)
- Signed lifetime confidentiality undertaking
- Disciplinary sanctions for breaches:
| Breach Severity | Sanction |
|---|---|
| Minor / negligent | Written warning + retraining |
| Serious / reckless | Suspension without pay + final warning |
| Gross / intentional | Summary dismissal + referral to ICPAC + civil/criminal action |
13.3 Whistle-blower channel (anonymous, managed by external law firm) for reporting concerns without fear of retaliation.
14. Third-Party & Processor Management
- No processor is engaged without:
- Pre-engagement due-diligence questionnaire and on-site or remote audit where high-risk
- Signed Data Processing Agreement incorporating EU Standard Contractual Clauses (SCCs) 2021/914, Modules 2 and 3, along with the UK Addendum.
- Annual review and re-certification
- Current approved processors are listed in the restricted-access Processor Register maintained by the DPO.
15. International Data Transfers & Transfer Impact Assessments
- Transfers outside the EEA/UK are restricted to:
- Countries with adequacy decision (UK, Switzerland, Japan, Canada, etc.)
- Recipients bound by SCCs + documented TIA (template stored in Compliance Drive)
- The Firm maintains a prohibited/high-risk country list (currently: Russia, China mainland, Belarus). No transfers permitted without Board approval and exceptional safeguards.
- All TIAs are reviewed annually or upon material change in destination-country law.
16. Data Subject Rights – Operational Procedure
- Requests are received exclusively via dataprotection@acccyp.com.
- Workflow: Day 0 → auto-acknowledgement + identity verification request; Day 1–3 → verification completed; Day 4–25 → compilation and internal legal review; Day ≤30 → response (extension notice if required).
- No charge except where requests are manifestly unfounded or excessive (>4 per year).
- Full audit trail maintained in the DSAR Register.
17. Data Protection Impact Assessments (DPIA)
- Mandatory for:
- New client portal features
- Introduction of AI-assisted audit tools
- Processing of health data for payroll clients exceeding 50 employees
- Any processing likely to result in high risk (EDPB list)
- DPIA template follows Cyprus Commissioner guidelines and is reviewed by the Steering Committee before implementation.
- Any use of AI-for-audit, anomaly detection or data extraction must:
- undergo a DPIA,
- avoid transfer of personal data to AI models with unknown training provenance,
- use Firm-approved AI tools only,
- log all automated analysis used as audit evidence.
18. Personal Data Breach Response Protocol
- 72-hour incident response flowchart displayed in every office and intranet homepage.
- Breach Register maintained by DPO (encrypted, access).
- Notification obligations:
- Cyprus Commissioner ≤72 hours if risk to rights & freedoms
- UK ICO ≤72 hours where UK GDPR applies
- Data subjects without undue delay if high risk
- ICPAC notification within 5 days for breaches affecting professional privilege
- Post-breach root-cause analysis and lessons-learned review mandatory.
19. Monitoring, Audit & Continuous Improvement
- Annual programme:
- Internal audit of RoPA, DPIAs, processor compliance (Q1)
- External ISO-27001-style audit by independent firm (Q3)
- Management review meeting with Board (December)
- Policy refresh and staff re-certification
- Key performance indicators tracked monthly: training completion rate, open high-risk findings, breach incidents (target = 0).
20. Violations, Disciplinary Measures & Contact Details
- Any violation of this Policy is treated as serious professional misconduct and may lead to sanctions listed in Section 13.2 and, where appropriate, referral to ICPAC disciplinary proceedings.
- Queries, reports or requests for advice:
Data Protection Officer: Chris Christofi
Email: dataprotection@acccyp.com (monitored 24/7)
Telephone: +357 25 332 177
Postal: 37 Nicou & Despinas Pattichi Avenue, Evi Court, 3rd Floor, Offices 302–303, CY-3071 Limassol, Cyprus
