Cyber Security Specialists Limited is responsible for the data we collect and process for our own purposes. We’re committed to maintaining the security and privacy of the personal data we process, whether through our website or through our interactions with clients, prospects or industry partners.
Whether we are supporting our clients or managing our own data, privacy and security are at the heart of our operations. Whilst we take appropriate measures in our own practices, security and privacy is at the core of our business operations, so it is imperative we operate in accordance and where possible above industry and regulatory requirements.
Cyber Security Specialists only processes personal data for as long as necessary to meet our legal obligations or where we have a legitimate business reason for keeping it. We review personal data on a case by case basis and document the period of retention for each.
For further information on how long Personal Data is likely to be kept before being removed from our systems and databases, please contact us.
Should you wish to contact us in order to find out more about how we process personal data, exercise your rights, make a complaint to us or just discuss some of our practices then please contact us using the following details:
- Email: email@example.com
- Post: Data Protection Officer, Cyber Security Specialists Limited, Grove House, 774-780 Wilmslow Rd, Manchester, M20 2DR
- Telephone: +44 (0) 161 706 0244
Data we process and why
Cyber Security and Data Privacy Consulting Services
Although our core services do not revolve around collecting and processing personal data, we often process personal data as part of delivering our Consulting services to clients. This can range from our client’s data or our client’s, client data.
We do not collect personal data as a matter of course in these interactions, except for pre-contractual material and communications relating to individual pieces of work. There are instances where our Penetration Testing services process data but this is covered directly with the client and not collected by us.
This work and subsequent processing of data is all performed under a contract or with a view of entering into one, which Cyber Security Specialists Limited and our clients are subject to.
Data Types – Name, email addresses, address, telephone details, signatures, business contact details.
We have a Contact Us page on this website, which allows individuals to ask questions about our services, including exercising your rights under Data Protection Law. The Contact Us page, and sending an email into firstname.lastname@example.org is monitored by our internal team, to ensure we identify and handle your request effectively. The Contact Us form contains basic contact information and free text fields, allowing you to provide details of your enquiry. We request that you do not include sensitive information in this form, as we have other secure ways in which you can send us information, should we require any. This data is processed under our legitimate Interests and only used to facilitate your enquiry.
Data Types – Name, Company name, email addresses, phone number and Enquiry (which should not include personal data).
We process basic business contact information of prospective clients and opportunities, which may initially be collected via sales meetings, business cards, verbally, events we may host, speak at or attend. This includes the prospective client’s business contact information, which includes their personal information and details about each opportunity. We use a cloud based CRM solution to host this data, which also integrates into our email services and as such prospect emails are also synchronised into our cloud based solution, so that we can keep track of our interactions with you and manage the relationship effectively. This processing is in Cyber Security Specialists Legitimate Interests or fulfilling our requirements when entering into or in the Performance of a Contract with a client.
Data Types – Name, Company, email addresses, address, telephone details, signatures, business contact details, email conversations.
Financial management, accounting and administration
Our financial management and accounting services process basic client contact information in order to fulfil our accounting requirements. This ranges from invoices, account details, timesheet approvals, statement of works, terms and conditions and bank details. We use a cloud based solution to process this data and use a separate cloud based document storage solution. This processing is primarily to enable us to perform our side of the contract with our client and meet our legal obligations for financial reporting.
Data Types – Name, Company name, email addresses, address, telephone details, client and supplier bank account details, signatures, business contact details.
We process basic contact and work information in relation to associates and contractors who would like to work with us or one of our clients. This information could be collected through our website, email, Linkedin, recruitment agencies or job advertising boards. Contractors who are working with us or who could potentially be working with us in the future will have their details stored in a cloud based solution, so that we can keep track of their skills, contact details and availability. This processing is undertaken under Cyber Security Specialists legitimate interests and in the performance of a contract or with a view to entering into one.
Data Types – Name, email addresses, address, telephone details, skills, job history, bank account details, company insurance details, passport, driving licence, references and email conversations.
Marketing and Events
We want to ensure that our customers and businesses with an interest in Cyber Security and Data Privacy are able to receive the latest insights, news and information regarding our services. We only send communications to individuals within organisations where we believe we have a legitimate interest to do so. Where an individual uses our contact page we also ask for consent to send communications, as a simple enquiry does not satisfy grounds to send communications of this nature after dealing with your request.
Our main form of providing information on our products, services, events and industry research and insight are via;
Industry Events – This is where Cyber Security Specialists are either showcasing our services, whereby we produce information about our services and capabilities. We may also run competitions but will only communicate with you for the purposes of that competition, so entering a competition doesn’t mean you get bombarded with marketing material. We may also exchange business cards at events and we will email you to follow up on our interaction with you. This does not mean we will send you marketing material, but we will enter any information about opportunities into our sales system to ensure we have provided you with the information you require.
Social Media – Cyber Security Specialists make use of social media platforms such as Linkedin and Twitter. We as a business sign up to the terms and conditions of the provider and use the platforms to provide insight into the latest cyber security and data privacy activities taking place across the world, to promote Cyber Security Specialists employees, services and provide you with our latest thought leadership content on different subject matter.
If you do not wish to receive any form of communication from Cyber Security Specialists then simply inform us through our contact page, email email@example.com or unsubscribe from any communication.
Use of Third Parties
We use third party system providers to enable us to deliver our services effectively and store our information (including personal data) securely, which allows us to focus on delivering our industry leading security and privacy solutions to our clients. Our providers consists of:
Our own infrastructure – We used world leaders in cloud based infrastructure services, which means that the provider looks after all of the physical equipment and management of it and Cyber Security Specialists do the rest. This means that there are high levels of physical security on our systems and Cyber Security Specialists provide additional layers above that. We build our systems and services in these environments, which also allow you to choose the location of where data is held (including personal data).
Cyber Security Specialists always choose the United Kingdom (UK), which means if we deliver a service from these systems, data will reside in the UK
Email, office applications and document storage – We use an externally hosted provider for these services who are world renowned experts in providing these services. The data is all processed in Europe and we are responsible for ensuring its configured securely. These systems are critical to our company and if you have dealings with us, no doubt your data will be held within these, unless it’s been deleted, as we no longer required it.
Customer Relationship Management – We use an externally hosted system, which is hosted in the United States of America (USA). This system is used to record all sales related information such as prospect information through to our communications with you as a client engaged in pre-sales and contractual dialogue with us. Our employees also have the capability to sync their emails to you into this solution, which allows us to ensure we are continually up to speed with you as a client and able to meet all your needs on time. This means that effectively your emails will be sent to our sales system and be processed in the USA.
Marketing Communication Software – In order to keep people up to date with our services and information within the Cyber Security and Data Privacy industry, we often send direct marketing communications, as described under our Marketing and Events section of this policy. To enable us to deliver this service we use an externally hosted system that supports the delivery of marketing emails and also provides us with the ability to understand the effectiveness of those emails, such as how many were opened, deleted and read. This provider operates as our processor and does not check or monitor your data. This system is hosted within the United Kingdom and Cyber Security Specialists have contractual requirements in place that govern the processing of personal data.
Internal IT Support Service – We use an externally hosted system to help us manage, record and resolve our internal IT functions and support support requests from customers. This system is hosted within UK Data Centres, the provider also has offices outside of Europe and has implemented safeguards in place to provide adequate protection over any personal data processed. The provider has implemented additional safeguards as required by European law such as Binding Corporate Rules and is registered under the Privacy Shield Framework. We process a requesters email address to facilitate this service, so we can ensure the individual is kept updated on their issues and if the requestor needs to be updated verbally, we require a telephone number. The requester also has the opportunity to provide detail on their support issue but we will only ask for personal detail if it is relevant to the support request. Personal data processed in this context is done under the performance of a contract or under Cyber Security Specialists Legitimate Interests, dependant on the requestor and circumstance.
Security of Personal Data
At Cyber Security Specialists we take the security of personal data extremely seriously. We have implemented a mixture of cyber security controls, encryption and an Information Security Management System (ISMS) which underpins our Business.
We are Cyber Essentials certified and assess security for Confidentiality, Integrity and Availability to ensure that data remains protected, accurate and available for its intended purposes. Some of the core controls we have implemented as part of these certifications are:
- Multi-Factor Authentication (MFA) on all internet-based systems.
- Encryption of data at rest and in transit.
- Technical assessments of our systems for vulnerabilities and configuration weaknesses.
- Controlled access to only approved individuals.
- Screening of all employees to a minimum of the Baseline Personnel Security Standard (BPSS), however most of our Consulting team are SC or DV Cleared.
- Data handling training and for all employees.
- Policies and procedures on secure operations and configuration of systems.
International Data Transfers
Primarily our systems and services are all located within the United Kingdom. Your Personal Data will be processed outside of Europe and in countries that are deemed not to have adequate safeguards in place. This is because some of the locations of where some of the industry leading systems we use are hosted in the UK but process data outside of Europe in countries such as but not limited to the United States of America.
There may also be rare occasions where our employees work outside of Europe and access systems from outside the EEA.
Cyber Security Specialists have implemented appropriate measures to ensure an adequate level of protection of your Personal Data at all times, when processed to countries outside of Europe and countries deemed to have inadequate safeguards. These measures consist of our processors registering under Privacy Shield framework, Model Clause Contracts or by way of derogations for specific circumstances. If you have any questions or would like to obtain copies of safeguards in for a specific set of processing then please contact us with the specific request.
Your rights in relation to your data
Under Data Protection Law you have a number of Rights that are focussed on placing you in control of how your data is processed.
You can exercise these Rights by emailing us at firstname.lastname@example.org or by writing to Cyber Security Specialists Limited, Grove House, 774-780 Wilmslow Rd, Manchester, M20 2DR
We may ask you for identification prior to disclosing any data, as we need to ensure we only disclose information to the person entitled to it.
You have the following Rights in relation to the processing of your personal data:
- Right to be Informed – You have the right to be provided information on how your personal data is processed.
- Right to Access – You have the right to have access to the personal information we hold about you.
- Right to Rectification – This relates to the right to rectify any inaccurate personal information we hold about you.
- Right to Erasure – The right to request that we delete your data, or stop processing it or collecting it, in some circumstances
- The Right to Object – You have the right to object to the processing of your data, such as requesting us to stop sending you marketing communications.
- Right to Data Portability – You can request your personal data to be sent to another service provider.
- Right to Lodge a Complaint – You can lodge a complaint with Data Protection Regulator, which for us is the UK Information Commissioner’s Office, using the below details:
Postal Address: Information Commissioner’s Office, Wycliffe House, Water Lane, Wilmslow, Cheshire SK9 5AF
- Email: email@example.com
- Live Chat: https://ico.org.uk/global/contact-us/live-chat
- Online Form https://ico.org.uk/global/contact-us/email/
- Telephone: 0303 123 1113
Ultimately, we want you to be in control of your personal detail so feel free to get in touch and ask any questions.
Changes to your privacy with us
When any significant changes in the way we protect your privacy are made, we will make this clear on our website or by other means of communication such as email, so that you are able to review the changes and make an informed decision as to whether you want to exercise any of your rights in relation to the processing of your personal data.