Data Handling and Information Security
By Jo and 1 other2 authors8 articles
Data Sub-processorsInformation about our sub-processors and how we protect your data with our sub-processors.
Data Subject Rights Requests and Incident ResponseOur policy for responding to Data Subject Right Request and breaches to personal data.
Data Collection and StorageInformation on the data we collect, how we store it safely and how to archive and delete this data.
Staff training and Access PermissionsHow we train our staff to ensure your data is fully protected
Information SecurityThe tool, policies and processes we have in place to secure your data.
Cancellation policyOur policy for cancelling your subscription based on your subscription type