Data Protection Policy

At Intricate IT we know how important data is and how important it is to keep ours and our client’s data safe and secure. Which is why we have set out an easy to read document of how we use your data and how we keep it safe and secure

Where do we store our data

All data we collect is securely stored redundantly at ISO 27001 compliant datacentres in the UK and EU.

We use a range of service providers to ensure all our systems are secure, redundant, and reliable.

Our list of service providers are as follows:

What do we do with the information we collect?

All data we collect is securely stored redundantly at ISO 27001 compliant datacentres in the UK and EU.

All data we collect is covered by our NDA by default

New Enquiries

The data we collect is solely used to assess the Potential Client’s current network and infrastructure and to help us understand the services and features they will require from us.

After the enquiry is closed, all data will be either:
a) Moved into the client’s documentation
b) Deleted from our system

Clients

The data we collect and store is solely related to the services we offer the client, every client has their own documentation section which has been secured to ensure only essential employees have access to the data they require.

If the client no longer uses/requires our services, the client will be given a copy of their documentation, after which it will be removed from our systems.

We still hold information related to the client as required by law, this is usually just related to the services which were offered and does not contain any sensitive information related to the network and infrastructure.

But what happens if there is a data breach?

Intricate IT puts multiple systems in place to ensure the highest level of security and compliance is met. However we also know that there is always a chance that data could get breached which is why we have put below our procedure if this happens.

Our Procedures

 1) We will identify how the breach occurred, and in turn, ensure that it cannot be repeated.

 2) We will then investigate the breach and determine what data if any was compromised.

 3) We will alert our clients of the breach, along with all the details and if any of their data was compromised.

 4) We will work alongside the ICO, and follow their guidance regarding the breach.

 5) We will conclude the investigation and will again alert our clients of the investigation and our findings.