At John Wright ADR we are committed to protecting and respecting your privacy. This Policy explains when and why we collect personal information about people who visit our website, how we use it, the conditions under which we may disclose it to others and how we keep it secure.
We may change this Policy from time to time so please check this page occasionally to ensure that you’re happy with any changes.
Any questions regarding this Policy and our privacy practices should be sent by email to firstname.lastname@example.org.
WHO WE ARE
We are John Wright ADR registered at 206 Upper Richmond Road West, East Sheen, London SW14 8AH
HOW DO WE COLLECT INFORMATION FROM YOU?
• We collect details of your IP address when you view our website: we do this via cookies *
• Through day to day business contact
WHAT TYPE OF INFORMATION IS COLLECTED FROM YOU?
The personal information we collect from you might include your name, email address, IP address (collected via cookies), business address and postcode, and information about which pages on our website you have accessed and when.
HOW IS YOUR INFORMATION USED?
We may use your information:
• to carry out our obligations arising from any contracts entered into by you and us;
• to seek your views or comments on the services we provide;
• to notify you of changes to our services;
• to send you communications which you have requested and that may be of interest to you.
• to meet accountancy and other legal obligations
• to undertake conflict of interest and check other legal interests
We will hold your personal information on our systems for as long as is necessary for the relevant activity.
WHO HAS ACCESS TO YOUR INFORMATION?
We will not sell or rent your information to third parties.
We will not share your information with third parties for marketing purposes.
Service providers acting on our behalf
Any third party services or contractors we employ (to design and maintain websites for example) that need access to data (IP addresses, email addresses) are bound by a contract that requires them to keep the information secure and not to use it for their own direct marketing purposes.
We use Google analytics to see how many people have accessed our website and what pages they have spent time reading. It also tells us whether people are visiting our site as a result of search engine traffic or through links from other websites or marketing emails. Google analytics relies only on IP addresses to collect this information. You can read the Google data protection policy here.
We use a third party plugin Wordfence which scans IP addresses such that we can block access to our site from known spammers and hackers.
Our site is built in WordPress which requires the collection of IP information for any with access to update the site.
It is possible to disable cookies via your browser but it may affect the functionality of our site.
Any data from information provided by cookies is only shared with the third parties listed above.
We will not contact you for marketing purposes by email, phone or text message unless you have given your prior consent. We will not contact you for marketing purposes by post if you have indicated that you do not wish to be contacted. You can change your marketing preferences at any time by contacting us by email: email@example.com.
HOW CAN YOU ACCESS OR UPDATE YOUR INFORMATION?
The accuracy of your information is important to us. If you wish to know what if any data we hold on you please email us at: firstname.lastname@example.org.
If you wish us to delete your information from our records we will do so.
We may analyse your personal information to create a profile of your interests and preferences so that we can contact you with information relevant to you.
LINKS TO OTHER WEBSITES
In addition, if you linked to our website from a third party site, we cannot be responsible for the privacy policies and practices of the owners and operators of that third party site and recommend that you check the policy of that third party site.
We have policies in place to help prevent data breaches. Data that we collect is done so via an encrypted connection. Any data we hold on our own computers in spreadsheet or database form is password protected.
Our policies ensure that the following actions are strenuously avoided:
• Loss of computing devices (portable or otherwise), data storage devices, or paper records containing personal data
• Disclosing data to a wrong recipient
• Handling data in an unauthorised way (eg: downloading a local copy of personal data)
• Unauthorised access or disclosure of personal data by employees (eg: sharing a login)
• Improper disposal of personal data (eg: hard disk, storage media, or paper documents containing personal data sold or discarded before data is properly deleted).
We take measures to avoid loss of data as a result of malicious activities, which include
Hacking incidents / Illegal access to databases containing personal data
Theft of computing devices (portable or otherwise), data storage devices, or paper records containing personal data
Scams that trick our staff into releasing personal data of individuals
Failure of cloud computing cloud storage security / authentication / authorisation systems .
All members of staff have an obligation to report actual or potential data protection compliance failures. This allows us to:
Investigate the failure and take remedial steps if necessary
Maintain a register of compliance failures
Notify the Supervisory Authority of any compliance failures that are material either in their own right or as part of a pattern of failures
Under the GDPR, the DPO is legally obliged to notify the Supervisory Authority within 72 hours of the data breach (Article 33). Individuals have to be notified if adverse impact is determined (Article 34). In addition, we must notify any affected clients without undue delay after becoming aware of a personal data breach (Article 33).
We do not have to notify the data subjects if anonymised data is breached. Specifically, the notice to data subjects is not required if the data controller has implemented pseudonymisation techniques like encryption along with adequate technical and organizational protection measures to the personal data affected by the data breach (Article 34).
When someone is using a computer to browse a website, a personalised cookie file can be sent from the website’s server to the person’s computer. The cookie is stored in the web browser on the person’s computer. At some time in the future, the person may browse that website again. The website can send a message to the person’s browser, asking if a cookie from the website is already stored in the browser. If a cookie is found, then the data that was stored in the cookie before can be used by the website to tell the website about the person’s previous activity. Some examples where cookies are used include shopping carts, automatic login and remembering which advertisements have already been shown.
Cookies have been a problem for Internet privacy. This is because they can be used to track browsing behavior. Cookies have often been mistaken for computer programs. But cookies cannot do much on their own. They are simply a piece of data. They are occasionally called spyware or viruses, but they are not either of these.
Most web browsers allow users to choose whether to accept cookies. If the user does not allow cookies, some websites will become unusable.