General Data Protection Regulation (GDPR)
The General Data Protection Regulation (GDPR) seeks to protect and enhance the rights of data subjects. These rights cover the safeguarding of personal data, protection against the unlawful processing of personal data and the unrestricted movement of personal data within the EU.
For the purpose of the Data Protection Act 1998 (the Act), the data controller is Darren Antony Dykes (referred to as ‘we’, ‘us’ or ‘our’) in this privacy notice.
Full name of legal entity: Darren Dykes trading as Freelance Computers
Email Address: [email protected]puters.co.uk
Postal Address: Heathley, Warfield Park, Warfield, Berkshire, RG42 3RS
It is very important that the informatin we hold about you is accurate and up to date. Please let us know if at any time your personal information changes by emailing us at [email protected]
- We enforce the highest security measures to ensure your personal information is kept secure.
- We only collect information we need to provide you with the requested services.
- We will never sell, rent or give away your personal details to anyone.
Personal data means any information capable of identifying an individual. It does not include anonymised data.
The data we collect is provided to us by you, or an agent/representative acting on your behalf. It is collected when you or the agent:
- completes an enquiry on our website
- provides information to us in an email or a letter
- provides information to us by telephone
- tells us in person
Data Storage on this Website
- No personal data collected from either of our contact forms are stored on this website.
- We do not allow ‘comments’ on this website blocking this feature sitewide, therefore no personal data is stored on this website.
- We do not allow visitors to ‘register’ as a ‘user’ on this website, therefore no personal data is stored on this website.
Site Visitation Tracking
Like most websites, this site uses Google Analytics (GA) to track user interaction. We use this data to determine the number of people using our site, to better understand how they find and use our web pages and to see their journey through the website.
Although GA records data such as your geographical location, device, internet browser and operating system, none of this information personally identifies you to us. GA also records your computer’s IP address which could be used to personally identify you but Google does not grant us access to this. We consider Google to be a third party data processor.
- Your IP address is a numeric address assigned to your computer, assigned by your Internet service provider. We automatically collect your IP address as traffic data so that we can send information back to you when requested. This is not used to identify your personal information.
- Referrers are references to the web address you linked from and is automatically passed along by your web browser. We collect referrers your browser sends as part of traffic data. This is not attached to personally identifiable information.
- System information such as your operating system/platform, and the type of web browser you use. This is not attached to personally identifiable information.
Links to 3rd Party Data Processors / Websites
Freelance Computers includes links to other websites whose privacy practices may differ from those of Freelance Computers. If you submit personal information to any of those sites, your information is governed by their privacy statements. It is our suggestion that you carefully read the privacy statement of any website you visit.
- The personal information provided to us will only be used in connection with the services we are providing to you and in a way that you have provided permission.
- Freelance Computers do not share personal information collected with any other third-party company for any purpose, under any circumstance.
- Freelance Computers makes every effort to preserve your privacy, personal information may be disclosed when required by law where we have a good-faith belief that such action is necessary to comply with a judicial proceeding, court order or legal process.
Services we supply are intended for general audiences and not for children under the age of 13. We do not knowingly process data of EU residents under the age of 16 without parental consent. If we become aware that we have collected data from an EU resident under the age of 16 without parental consent, we will take reasonable steps to delete it as soon as possible.
All traffic (transferral of data) on this website and your browser is encrypted and delivered over HTTPS using Secure Sockets Layer (SSL). This website has security measures in place to protect against loss, misuse, and alteration of the information under our control, including without limitation protecting information behind a firewall and encrypting information you send via our contact form, we use a minimum of 128 bit encryption so that data cannot be read by a 3rd party during transmission. When visitors submit personal information via this website, their information is protected both online and off-line.
Our website uses specialist security software (Cerber Security) to ensure data breaches do not occur. Cerber Security protects and monitors web traffic and web server logs, Cerber Security blocks potential hacks and notifies Freelance Computers instantly should there be any hack or breach.
Should there be a breach with our website, no personal data can be compromised, no personal data is stored on our website, either by contact forms, user registration or comments.
We do everything in our power to protect user-information off-line. All of our client information, not just the personal information, is restricted in our office, our computers are protected by ‘finger-print login’ and accessed only by authorised personnel at Freelance Computers (The Proprietors). The servers that store personally identifiable information online are in a secure data centre environment, protected by Secure Sockets Layer (SSL), and login requires two-factor authentication.
Freelance Computers use Mailprotector Bracket – Email Encryption to send any emails containing personal information, passwords and account usernames as and when clients request those details, this ensures client data is fully encrypted and protected from being read by other entities than the intended recipient.
Our Invoice System & Data Collection
Freelance Computers use Zoho Invoice (www.zoho.com) to generate invoices, estimates and statements for each of our clients. Personal data such as contact name, company name, postal address, email address and telephone numbers are manually created within this system at the point of creating the first invoice/estimate for each client. This data is stored on www.zoho.com secure servers which are fully GDPR compliant, please see this document outlining Zoho’s GDPR readiness: https://www.zoho.eu/gdpr.html
We have two-factor authentication setup when logging into Zoho invoice’s secure website, giving an extra layer of security.
As part of Zoho Invoice, emails are sent directly to clients via their system, which includes Invoices, Estimates, Statements and overdue invoice email reminders.
Freelance Computers is a reseller partner for Mailprotector Ltd.
Mailprotector does not collect or store any information that the user could not access or delete on their own. Mailprotector systems are transactional and fluid based on the volume of email that a user receives. Emails that are quarantined are kept for 14 days and then deleted. Email log information is held for 14 days and also removed.
Right to Access
Freelance Computers use Zoho Invoice, and any client who has a quotation or invoice with Freelance Computers has full access to their personal data. Upon opening an account with Freelance Computers clients are invited to access Zoho’s Secure Invoice Portal.
Zoho’s Secure Invoice Portal allows clients to view and amend contact information, view invoices, quotations, credit notes and statements. All of this personal data can be downloaded directly by the client. If you have any questions regarding Data Portability please email us directly: [email protected]
Right to Be Forgotten
If a client only has quotations with Freelance Computers and no Invoice has been created for services/products, we are able to completely delete that clients details from Zoho Invoice, including all associated quotations. If however a client requests to be forgotten but has invoices for services/products provided, we are, by UK Tax laws, required to keep these records for 7 years. In the event of this happening, we mark the client as ‘inactive’ within Zoho’s Invoice system.
Mailprotector users that have CloudMail or Exchange+ mailboxes can delete email at their discretion and the reseller partner providing the Mailprotector service (Freelance Computers) can assist a user or organisation with completely removing an account or entire domain.
To request a ‘Right To Be Forgotten’ please email us directly: [email protected]
Retention of your Information
We keep your information for no longer than necessary for the purposes for which it is processed. The length of time for which we retain information depends on the purposes for which we collect and use it and/or as required to comply with applicable UK laws.
Mailprotector Products & Services
How do we safeguard message content processed by our service?
We realise you are sensitive about safeguarding the content of your email messages processed or temporarily stored on our Service. We do not manually review the content of your email messages unless specifically requested by you in an effort to identify spam, or unless expressly required by legal process (as described below).
The “Scan and Forward Service” is operated as a “black box” that processes and filters email traffic channelled through the Service in an automated manner without manual review or human intervention. Email messages that are filtered out by the Service as spam are temporarily stored on our systems for your review and are then automatically deleted. If you subscribe to our “Scan and Store Service,” we will also store your inbound email messages on our servers until retrieved by you or deleted according to our retention policy.
If we receive a specific request to review the content of a particular message, such as when legitimate messages are tagged or quarantined as spam, we may review that message to determine whether it should have been filtered out. We may aggregate and review information about message characteristics filtered by the Service for the continued technical tuning of our Service.
With whom do we share user registration information?
We do not share your email address or contact information with third-party marketers or sponsors.
We aggregate overall site statistics, such as the number of page impressions or users, and discuss these aggregate numbers with potential sponsors.
Certain legal disclosures
What data security is used?
We offer secure pages protected by Secure Socket Layers (SSL) to collect and encrypt information on our subscription order form. We also use administrative, physical and technical precautions to help protect the confidentiality, security and integrity of personal account information and messages stored or processed through our system. No computer system is completely secure, but we believe the measures implemented by our Service reduce the likelihood of security problems to a level appropriate to the type of data involved.
How long do we retain user data?
We retains user data, such as email address and password to operate and administer the system. We retain this data for approximately three (3) years. We may alter this practice according to legal and business requirements. For example, we may shorten the retention period for some types of data if needed to free up storage space. We may lengthen the retention period for some types of data if needed to comply with law or voluntary codes of conduct.
Management of user contact information
If you subscribe to the Service, you can later access your account information online. The system does not currently allow you to remove all records of your activity. We will make a good faith effort to implement your data management requests. Note: we have greater control over data currently stored on the system than for archived data. Once data is archived and removed from the system, it may not be feasible to modify or remove data for specific individuals. In those cases, our general data retention policy applies.
Your consent to this policy