The process are as follows:
Kamu’s Community Standards are enforced through a structured process outlined in the Visit Safety and Integrity Program. Here’s how it works:
Complaint Logging:
• Any complaint raised by a Kamu, member, or internal team is logged into the issues management system.
Review by Grievance and Appeals Team:
• The Grievance and Appeals team assesses the complaint, considering factors such as priority and severity.
• They collaborate with relevant departments and employer clients to conduct a thorough investigation.
Investigation and Evidence Review:
• Evidence related to the complaint is reviewed meticulously by the team.
• Based on the findings, the team determines the appropriate action to take.
Communication of Action:
• The team communicates the action taken with the involved Kamu or member and employer.
• Records of this communication are maintained in the system.
Monitoring and Follow-up:
• If the Kamu or member is allowed to continue working with Munkamu, their behaviors are closely monitored.
• Depending on legal requirements, severity of the claim, and impact, a member or Kamu may be restricted from scheduling or taking visits during the investigation.
Case-by-Case Approach:
• All decisions regarding actions taken are made on a case-by-case basis to ensure fairness and appropriate resolution.
This structured process ensures that Kamu’s Community Standards are respected and maintained, promoting safety and integrity within the platform.
Self-Monitoring Plan:
• We implement a rigorous self-monitoring plan to ensure the safety and quality of our services.
• Regular check-ins and evaluations are conducted to assess performance and adherence to community standards.
• Any concerns or issues are promptly addressed and resolved to maintain the integrity of our platform.
Data Protection Plan:
• We prioritize the protection of personal data and adhere to strict data protection guidelines.
• All personal information is securely stored and handled in compliance with relevant data protection regulations.
• Access to personal data is restricted to authorized personnel only, and stringent measures are in place to prevent unauthorized access or breaches.