II.1 Silink Privacy Policy
Original effective date: 12 October 2018 Last updated: 31 March 2026
This Silink Privacy Policy is the principal privacy and personal-data governance statement of Silink Pte. Ltd. (UEN 201833784D). It is drafted to cover our actual operating model, including website lead capture, embedded forms, customer onboarding, recruitment and placement workflows, Helpering account functions, digital messaging, candidate review, after-sales servicing, internal workflow systems, AI-assisted operational processing, and other present or future Silink business lines that operate through shared customer, staffing, commerce, communications, or digital infrastructure.
This policy is intended to be read as a serious legal notice rather than a short-form marketing summary. It is written to protect the legitimate interests of Silink while setting out the basis on which personal data, communication records, platform logs, and workflow records may be collected, used, disclosed, transferred, retained, reviewed, and relied upon by us.
For the avoidance of doubt, this policy applies at the Silink enterprise level. Product, campaign, or interface names, including Helpering, do not create a separate privacy controller unless we expressly identify a different controller in writing.
This policy is Silink’s principal privacy and personal-data governance document. It governs the collection, use, disclosure, transfer, retention, review, preservation, and evidential handling of personal data and related records, but it does not by itself create or enlarge any pricing position, service scope, platform access right, replacement entitlement, refund entitlement, referral entitlement, or commercial remedy. Those matters remain governed by mandatory law together with the relevant current commercial, platform, third-party-service, or after-sales document.
This policy should be read together with the Silink Client Terms of Business, the Silink Digital Platform Terms, the Silink Third-Party Services Terms, the Silink After-Sales, Replacement & Refund Policy, and the Silink Technology & Service Provider Notice. This policy governs privacy, PDPA, records, retention, disclosure, transfer, and evidential subject matter, while those other documents govern their own respective commercial, platform, third-party-service, Silink domestic-helper or Migrant Domestic Worker after-sales, or transparency subject matter.
1. Controller identity and covered channels
In this policy, “Silink”, “we”, “us”, and “our” mean Silink Pte. Ltd. References in this policy to actions taken by Silink may, where the context permits, include actions carried out on our behalf or for our legitimate business, operational, legal, compliance, or security purposes by our affiliates, personnel, secondees, contractors, vendors, processors, service providers, overseas partners, and professional advisors.
This policy applies across Silink’s present and future business channels, service touchpoints, and operational contexts, whether online, offline, hybrid, staff-assisted, AI-assisted, workflow-assisted, field-based, or conducted through third-party infrastructure. The examples below are illustrative only and do not limit the businesses, channels, or fulfilment models to which this policy may apply where Silink processes personal data in connection with a relevant engagement, enquiry, transaction, operational step, compliance matter, or business activity:
https://www.silinksg.com- the client services entry at
https://www.silinksg.com/services/clients/ - website forms, Google Forms, embedded widgets, landing pages, booking flows, and enquiry tools
- Helpering and associated websites, iPhone applications, Android applications, Google Play releases, browser interfaces, and WeChat mini program functions
- WhatsApp, WeChat, email, phone, app chat, web chat, and similar communication channels
- video-meeting tools, enterprise-messaging tools, workplace collaboration platforms, and operational coordination channels used by us from time to time
- digital, AI-assisted, and staff-assisted internal systems used to support sales, matching, interviews, onboarding, post-placement support, and dispute handling
- in-person meetings, branch or office interactions, site visits, handovers, clinic accompaniment, transport coordination, accommodation coordination, airport support, and other on-the-ground or field-service activities
- current or future Silink business lines, campaigns, ventures, pilot programmes, offline operations, and service formats in which Silink lawfully collects, receives, generates, stores, or uses personal data
2. Persons to whom this policy applies
This policy applies to any person whose information is processed by us in connection with our business, including:
- visitors to our websites and pages
- prospective or current customers
- users of Helpering or any equivalent platform feature
- household members, family representatives, or authorised agents acting for a customer
- candidates, domestic helpers, transferees, referees, emergency contacts, and support contacts
- persons who communicate with us, whether or not they eventually purchase services
- persons whose information is submitted to us through an authorised representative, employer, family member, or partner organisation
3. Acceptance and authority
By visiting our websites, using Helpering, submitting a form, communicating with us, continuing a service request after notice of this policy, or supplying information to us, you acknowledge that your personal data may be processed in accordance with this policy and applicable law.
If you submit information relating to another person, you represent, warrant, and undertake that:
- you are authorised to provide that information to us
- you have provided any notice and obtained any consent required by law
- the information is accurate, current, complete, and not misleading
- you will indemnify us for loss arising from any lack of authority, inaccuracy, or unlawful disclosure attributable to you
4. Meaning of personal data and related information
In this policy, “personal data” includes data, whether true or not, about an individual who can be identified from that data alone or from that data together with other information to which we have or are likely to have access.
For operational clarity, this policy also addresses categories of related information that may not always be personal data in a strict legal sense but which we may nevertheless collect, use, or rely on, including:
- metadata
- device or browser signals
- customer service notes
- risk scores
- system-generated summaries
- chat transcripts
- audit trails
- workflow status records
- de-identified or aggregated analytics
5. Categories of information we may collect or generate
Depending on the service, channel, and stage of the relationship, we may collect, receive, infer, generate, or combine the following categories of information.
Identity, contact, and profile information
- full name
- phone number
- email address
- residential address
- nationality
- date of birth
- marital status
- household composition
- identity card, passport, work-pass, or equivalent identifiers where relevant
Household and service-requirement information
- number of adults, children, elderly persons, and dependants
- care, medical, mobility, dietary, religious, language, pet-care, and housekeeping requirements
- schedule, residence type, living arrangements, and budget parameters
- employer preferences, prior hiring history, and expected role requirements
- airport-arrival, transport, lodging, pickup, handover, clinic, welfare, or escort-related arrangements where relevant
Order, enquiry, and onboarding information
- lead and enquiry details
- answers submitted in Google Forms, embedded website forms, platform forms, or onboarding workflows
- declarations, checklists, questionnaires, screenshots, voice notes, images, and attachments
- interview preferences, scheduling requests, and staffing instructions
Candidate and placement-related information
- biodata
- photographs and videos
- education and training records
- employment history
- interview notes
- recommendation records
- matching logic outputs
- placement, deployment, and after-sales records
Technical and device information
- IP address
- browser type
- operating system
- app version
- device identifier
- language setting
- session information
- local storage data
- cookies and comparable technologies
- crash reports and error logs
Communications and support records
- emails
- in-app messages
- web chat messages
- WhatsApp and WeChat messages
- voice recordings and voice notes where lawful
- call metadata
- timestamps
- internal summaries and escalations
- complaint and dispute records
Commercial, payment, and compliance information
- quotations
- invoices
- receipts and payment references
- refund requests
- insurance details
- medical scheduling information
- travel or ticketing coordination details
- work-pass or regulatory submission records
- case notes relating to audits, investigations, debt recovery, or legal enforcement
AI-assisted and system-generated information
- summarisation outputs
- classification results
- workflow prompts
- translation outputs
- OCR text extraction
- semantic search indexing
- routing, prioritisation, and anomaly-detection outputs
- prompts, context windows, logs, and audit trails associated with internal tooling
6. Sources from which information may be obtained
We may obtain information:
- directly from you
- from your authorised representative
- from your family members or household members
- from candidates, helpers, transferees, or their representatives
- from overseas agencies, recruitment partners, training providers, clinics, insurers, travel partners, transport providers, accommodation providers, escorts, logistics partners, and operational vendors
- from platform providers, analytics tools, advertising technologies, messaging providers, collaboration providers, video-meeting providers, and cloud vendors
- from public registers, lawful public sources, or government-related portals where legally permitted
- from regulators, ministries, courts, insurers, advisors, or law-enforcement bodies where relevant
7. Main purposes for which we process information
We may process information for one or more of the following purposes:
- operating, administering, maintaining, securing, and improving our websites, apps, forms, mini programs, and support channels
- creating, maintaining, authenticating, or restricting accounts and user access
- understanding customer requirements and facilitating candidate matching, recommendation, or shortlisting
- handling enquiries, bookings, interviews, onboarding, deployment, transfer, and after-sales support
- generating quotations, invoices, payment instructions, and commercial records
- communicating with customers, candidates, partners, and regulators
- maintaining internal records, notes, evidence, and workflow history
- complying with PDPA, MOM requirements, licensing obligations, audit requirements, and other legal or regulatory duties
- protecting our commercial interests, platform integrity, intellectual property, personnel, users, and reputation
- preventing, detecting, investigating, or documenting fraud, impersonation, unlawful use, scraping, spam, harassment, abuse, security incidents, or other misconduct
- enabling staff training, service-quality review, internal governance, process design, and dispute management
- generating aggregated, anonymised, statistical, or de-identified analytics for internal improvement
8. Legal basis, consent, deemed consent, and legitimate operational necessity
Where relevant under applicable law, we may process personal data because:
- you have voluntarily provided the information to us
- the processing is reasonably necessary to evaluate, provide, administer, or support the service requested
- the processing is reasonably necessary for our legitimate business, legal, compliance, or security purposes
- the processing is required or authorised by law, regulation, court process, licence condition, or regulatory expectation
- you have given consent, express or deemed, to the extent recognised by law
You acknowledge that a refusal to provide information, a later withdrawal of consent, or the provision of incomplete or inaccurate information may prevent us from proceeding, may delay service delivery, or may limit our ability to continue support.
9. Website forms, Google Forms, and embedded third-party tools
Some customer orders, enquiries, and service-intake workflows are submitted through forms embedded in or linked from our websites. These forms may be hosted or technically supported by third-party providers selected by us.
By using such forms, you acknowledge and agree that:
- form data may be stored, transmitted, and processed through third-party infrastructure
- form submissions may feed into downstream CRM, ticketing, workflow, analytics, and messaging systems
- we may combine form responses with other information already held by us
- incomplete, inconsistent, or misleading submissions may adversely affect service handling and may be relied upon as evidence of the information you supplied
10. Communications monitoring, service records, and evidential use
When you communicate with us through phone, WhatsApp, WeChat, email, website chat, app chat, video call, or similar channels, we may collect, review, preserve, and rely upon:
- message content
- attachments and links
- timestamps
- sender and recipient metadata
- call and contact records
- summaries, notes, tags, and escalation records
- action logs and workflow outcomes derived from those communications
We may use such records for continuity of service, quality assurance, training, fraud prevention, dispute resolution, debt recovery, regulatory support, litigation support, and evidential purposes. You agree that digital records, transcripts, screenshots, logs, and internal system notes may be used by us to establish instructions, chronology, notice, acceptance, and factual context.
Internal classifications, legal risk assessments, escalation notes, compliance flags, fraud indicators, privileged communications, draft analyses, and investigation materials generated by or for Silink may also be created or maintained in connection with the same records. Unless applicable law requires otherwise, nothing in this policy obliges us to disclose internal legal strategy, protected deliberations, security logic, or privileged materials merely because they relate to information concerning you.
11. AI-assisted, automated, and system-assisted processing
To support efficiency, consistency, scale, and governance, we may use internal or third-party tools that perform or assist with:
- transcription
- translation
- OCR
- summarisation
- semantic search
- classification
- routing
- draft generation
- risk flagging
- matching support
- anomaly detection
- large language model processing
This means that information you provide may be processed by a combination of human personnel and machine-assisted systems.
You expressly acknowledge that:
- your communications and submissions may be used in AI-assisted workflows
- prompts, context, outputs, summaries, logs, and audit trails may be retained for service, security, training, legal, or compliance purposes
- we may use de-identified, anonymised, aggregated, or statistical information to improve our internal systems and operating processes
- we are not obliged to disclose our proprietary prompts, weighting models, fraud controls, ranking logic, or internal workflow design except where disclosure is required by law
Depending on the toolchain used, prompts, attachments, transcripts, outputs, moderation records, safety logs, abuse-monitoring records, technical logs, and backup copies may also be retained for a period determined by us, by the relevant vendor, or by the legal obligations applicable to that vendor or infrastructure provider.
While we may choose vendors, configure workflows, minimise data, and adopt internal controls as we consider appropriate, we do not guarantee that every third-party AI or LLM provider will offer zero-retention processing, immediate deletion, uniform jurisdictional treatment, or absolute insulation from lawful access requests, compulsory disclosures, or system-level logging requirements.
Unless we expressly agree otherwise in signed writing, no person is entitled to require us to use only single-tenant infrastructure, only Singapore-hosted infrastructure, only zero-retention environments, or only AI or LLM configurations that prohibit all service-improvement, safety-tuning, abuse-detection, or legally required logging functions that may exist within a vendor environment.
For illustrative transparency regarding the categories and examples of technology and AI service providers that Silink may use, please refer to the Silink Technology & Service Provider Notice. That notice is provided for transparency only and does not form part of any binding commitment regarding provider selection or continuity.
12. Cookies, analytics, device permissions, and similar technologies
Our websites and apps may use cookies, pixels, SDKs, scripts, local storage, session data, and device permissions for authentication, security, service continuity, analytics, debugging, preference storage, and performance optimisation.
If you disable or block certain technologies or permissions, some features may not operate correctly, and we will not be responsible for degraded functionality caused by user-side settings or third-party platform restrictions.
13. Disclosures to third parties
We may disclose information where reasonably necessary to:
- our employees, managers, and authorised personnel
- cloud, hosting, analytics, CRM, payment, communication, collaboration, video-meeting, AI, storage, security, and support vendors
- insurers, banks, payment processors, clinics, hospitals, training centres, travel partners, transport providers, accommodation providers, logistics partners, escorts, and operational service providers
- overseas agencies, placement partners, or counterparties involved in a workflow
- our lawyers, auditors, accountants, consultants, and professional advisors
- regulators, ministries, licensing bodies, law-enforcement authorities, courts, tribunals, or governmental agencies
- debt collectors, assignees, financiers, transaction counterparties, or restructuring participants where commercially or legally required
- any person where disclosure is necessary to protect our rights, preserve evidence, recover sums due, prevent harm, investigate misconduct, or comply with law
Some such recipients may act as our processors, service providers, independent controllers, professional advisers, regulated counterparties, or legally compelled recipients depending on the circumstances. Where a third party is entitled or required by law, court order, regulatory request, subpoena, statutory notice, lawful governmental demand, or its own binding legal obligations to disclose, preserve, review, scan, or hand over information in its possession or control, that third party may do so in accordance with the applicable legal framework, and we do not guarantee that we can prevent, reverse, or always be permitted to notify you of such action.
Depending on the relevant workflow and legal context, we may act as an organisation determining the purposes and means of processing, as a service provider handling information on behalf of a customer, or in a mixed operational capacity. Nothing in this policy requires us to accept any characterisation proposed unilaterally by a user if that characterisation is inconsistent with the actual legal or operational structure of the relevant activity.
14. International transfers and overseas access
Our systems, vendors, and partners may operate from jurisdictions outside Singapore. Information may therefore be transferred to, hosted in, accessed from, backed up in, or otherwise processed in locations outside Singapore where reasonably necessary for business continuity, system architecture, service delivery, support, or disaster recovery.
Where required, we will take steps that we consider commercially and legally appropriate to ensure a standard of protection that is comparable to the protection required by applicable law. You acknowledge that perfect parity between jurisdictions cannot always be guaranteed and that international digital services necessarily involve transmission risk.
This may include the use of cloud infrastructure, analytics providers, communications platforms, workflow vendors, transcription services, model providers, AI or LLM service providers, storage environments, and support teams that process or can technically access information from outside Singapore. In some cases, those providers may store logs, prompts, outputs, safety-monitoring records, abuse-detection records, or legal-compliance records in other jurisdictions.
Where reasonably necessary for our operations, we may submit instructions, prompts, transcripts, documents, metadata, summaries, or operational context to third-party AI, automation, or language-model providers for processing on our behalf, subject to the controls, limitations, and risk allocation described in this policy and our internal governance arrangements.
If a third-party processor, infrastructure provider, AI or LLM provider, communications platform, or overseas partner receives a lawful access request, disclosure order, preservation demand, law-enforcement request, national-security demand, regulatory requirement, or other compulsory process applicable to it, data held by or accessible through that provider may be reviewed, preserved, or disclosed in accordance with the law binding on that provider. Subject to applicable law, we may or may not be able to challenge, limit, or notify you of such disclosure.
15. Candidate data and controlled access information
Candidate and helper information is controlled information. It may contain sensitive employment, personal, image, or family-related details and is provided only for legitimate evaluation of a possible service, match, or placement.
You must not:
- scrape, harvest, or systematically extract such information
- republish, forward, sell, or circulate it outside authorised channels
- build your own database or dossier from it
- use it for unlawful profiling, blacklisting, harassment, or discrimination
- contact candidates outside channels authorised by us
We may redact, watermark, limit, restructure, summarise, monitor access to, or withdraw candidate information at any time.
16. Accuracy, verification, and reliance
We rely substantially on information supplied by customers, candidates, vendors, and representatives. You must notify us promptly if you become aware of any material error or change.
We may verify information where we consider it appropriate, but we are not obliged to independently verify every statement, declaration, or document. We may act on information apparently supplied by an authorised person unless we have clear reason not to do so.
17. Retention and deletion
We may retain information for as long as reasonably necessary in light of:
- the purpose for which it was collected
- the duration of the customer or user relationship
- after-sales servicing and replacement support needs
- audit, accounting, licensing, employment-agency, tax, insurance, and legal requirements
- dispute, complaint, investigation, recovery, and enforcement needs
- platform security, anti-fraud, and evidence-preservation needs
At the end of an appropriate retention period, we may delete, anonymise, aggregate, archive, de-link, suppress, or otherwise restrict access to the relevant data.
Where we consider it necessary to protect our legal position, preserve evidence, respond to actual or anticipated complaints, investigate misconduct, comply with insurer, auditor, regulator, or court expectations, or support debt recovery, enforcement, or litigation strategy, we may place information under legal hold or operational hold and retain it beyond an ordinary business-retention cycle.
We may also retain de-identified, aggregated, model-training, testing, audit, security, service-improvement, and statistical records for as long as reasonably useful to our business, provided that such retained material is handled in a manner we consider appropriate to its sensitivity and the purposes for which it is kept.
Deletion, suppression, or anonymisation may also be delayed or incomplete in residual backups, archived snapshots, disaster-recovery environments, vendor-side logs, evidential exports, security records, or legally preserved datasets, and we are not required to purge information instantly from every medium if staged retirement, restricted access, or retention by a binding third party remains reasonably necessary.
18. Security and user responsibility
We use administrative, contractual, organisational, and technical measures that we consider appropriate having regard to the nature of the information and the risks involved.
However:
- no internet transmission is completely secure
- no cloud environment, messaging platform, mobile device, or public network is free from risk
- no consumer communication channel should be treated as absolutely confidential
You remain responsible for the security of your own devices, passwords, one-time passwords, recovery credentials, and personal communication accounts.
19. Marketing, service messages, and operational notices
We may send you service-related messages, reminders, appointment notices, payment notices, case updates, document requests, security notifications, and regulatory or operational communications as part of our service delivery.
Where separate consent is required for marketing communications, we will seek such consent in the manner required by law. If you opt out of marketing, we may still send non-promotional communications necessary to perform services, protect security, or comply with law.
20. Access, correction, withdrawal, and other requests
Subject to applicable law, you may request:
- access to personal data held by us
- correction of inaccurate personal data
- withdrawal of consent for certain forms of processing
We may require identity verification, supporting detail, clarification, reasonable processing time, and a reasonable administrative fee where permitted by law.
To the fullest extent permitted by law, we may refuse, limit, redact, defer, or condition our response where compliance would:
- prejudice another person’s rights or safety
- compromise an investigation, security review, or fraud-control process
- disclose legally privileged material or confidential internal deliberations
- reveal trade secrets, scoring methods, prompts, fraud signals, or protected business logic
- undermine the integrity of our systems or records
We are not obliged to erase, anonymise, or cease using information where continued processing remains reasonably necessary for legal compliance, contractual administration, dispute handling, insurance response, debt recovery, fraud prevention, evidence preservation, or the exercise or defence of legal claims.
Any deletion, access, portability, or correction request is also subject to the practical limits of system architecture, record integrity, privilege, security, anti-abuse controls, and evidential continuity. We may refuse requests that would require us to alter historical logs, rewrite archived communications, impair safety or fraud systems, disclose confidential model-governance information, or interfere with legal holds, preservation duties, or regulator-facing records.
21. Children, dependants, and special-category context
Where information about children, dependants, elderly persons, or medical or care conditions is provided to us, the person providing that information must ensure that the disclosure is lawful and genuinely necessary for the relevant service or household requirement. We reserve the right to minimise, redact, or delete unnecessary sensitive details.
22. Data incidents, containment, and notification
We may investigate, document, contain, remediate, and respond to actual or suspected data incidents, security events, unauthorised access, or misuse affecting our systems, channels, or records.
Where required by law, we may notify affected individuals or the relevant authority. Nothing in this policy limits our right to suspend access, isolate systems, preserve evidence, restrict communications, or take immediate containment action where we consider that a security or misuse risk exists.
We may also cooperate with regulators, law-enforcement bodies, courts, insurers, forensic providers, incident-response advisors, and other appropriate counterparties in investigating, containing, documenting, preserving, or responding to security events, misuse allegations, legal claims, or compliance concerns, including by producing logs, metadata, screenshots, structured exports, or preserved records where we consider such cooperation necessary or appropriate.
23. External platforms and independent third parties
Our services may interact with or be distributed through third-party environments such as Apple, Google Play, Google services, WhatsApp, WeChat, enterprise-messaging tools, workplace collaboration tools, video-meeting providers, payment gateways, embedded form providers, logistics or accommodation coordinators, or analytics vendors. Those third parties may process information under their own terms and policies. We do not control their infrastructure, retention practices, or service decisions, and you should review their terms independently where relevant.
24. Corporate transactions, restructuring, and advisory disclosure
We may disclose or transfer information as part of financing, insurance review, audit, due diligence, restructuring, merger, acquisition, sale of assets, outsourcing, or business reorganisation, provided that such disclosure is reasonably necessary and subject to appropriate controls in light of the transaction.
25. No waiver, severability, and evidential continuity
No failure or delay by us in exercising any right, discretion, or protective measure under this policy or at law operates as a waiver.
If any part of this policy is held invalid, illegal, or unenforceable, the remaining provisions continue to apply to the fullest extent permitted by law.
The expiry, replacement, or amendment of this policy does not affect our right to retain, rely on, disclose, or preserve pre-existing records, logs, communications, metadata, consents, notices, or evidential materials relating to prior events, transactions, or disputes.
26. Policy updates and prevailing version
We may amend, restate, replace, expand, or reorganise this policy from time to time. The latest version published by us will apply from the date stated by us or, if no date is stated, from the time of publication.
If a particular transaction, workflow, or regulated process is also governed by a more specific privacy notice, consent statement, or signed agreement, that more specific document may supplement this policy to the extent of the overlap.
If the same facts also engage the Silink Client Terms of Business, the Silink Digital Platform Terms, the Silink After-Sales, Replacement & Refund Policy, or the Silink Technology & Service Provider Notice, this policy continues to govern the privacy, PDPA, records, retention, disclosure, transfer, and evidential aspects of the matter, while those other documents govern their own respective commercial, platform, Silink domestic-helper or Migrant Domestic Worker after-sales, or transparency subject matter.
No failure by any person to read an updated version, and no continued reliance on an older screenshot, cached page, forwarded PDF, or informal summary, limits the effect of a later prevailing version once it has been validly issued or published by us.
27. Contact details
For privacy, PDPA, or data-governance matters, you may contact:
- Data Protection Officer: Liya Li
- Email:
liya.li@silinksg.com - General contact:
contact@silinksg.com - Phone:
+65 9437 1690 - Website:
https://www.silinksg.com
28. Governing law
This policy is governed by the laws of Singapore, subject always to any mandatory legal requirement that applies to the relevant processing activity.