Data Protection Policy
Firstly we are registered with the ICO, our registration number is and can be verified here.
Any enquiries about data protection can be sent directly to our data protection officer using dataprotection@intricateit.co.uk
This information is in addition to our privacy policy.
Where do we store our data
All data we collect is securely stored redundantly at ISO 27001 compliant datacentres in the UK and EU.
We use a range of service providers to ensure all our systems are secure, redundant, and reliable.
Our list of service providers are as follows:
- Amazon Web Services
- Google Cloud
- Digital Ocean
- Backblaze B2 Storage
- Wasabi Cloud Storage
- Krystal Hosting
- SyncroMSP
- Bitdefender
- SentinelOne
- Microsoft365
What do we do with the information we collect?
All data we collect is securely stored redundantly at ISO 27001 compliant datacentres in the UK and EU.
All data we collect is covered by our NDA by default
New Enquiries
The data we collect is solely used to assess the Potential Client’s current network and infrastructure and to help us understand the services and features they will require from us.
After the enquiry is closed, all data will be either:
a) Moved into the client’s documentation
b) Deleted from our system
Clients
The data we collect and store is solely related to the services we offer the client, every client has their own documentation section which has been secured to ensure only essential employees have access to the data they require.
If the client no longer uses/requires our services, the client will be given a copy of their documentation, after which it will be removed from our systems.
We still hold information related to the client as required by law, this is usually just related to the services which were offered and does not contain any sensitive information related to the network and infrastructure.
But what happens if there is a data breach?
Our Procedures
1) We will identify how the breach occurred, and in turn, ensure that it cannot be repeated.
2) We will then investigate the breach and determine what data if any was compromised.
3) We will alert our clients of the breach, along with all the details and if any of their data was compromised.
4) We will work alongside the ICO, and follow their guidance regarding the breach.
5) We will conclude the investigation and will again alert our clients of the investigation and our findings.