GDPR Essentials
We aim to be transparent. We care so much about our business, and you are key to it. That is why we do not hide behind complex wording and fine print.
Read our Privacy Policy below to understand what we use your data for.
Who we are
Company Information
| Detail | Information |
|---|---|
| Company legal name | Ironhack Spain SLU |
| Company address | Paseo de la Chopera 14, Madrid, 28045, Spain |
| Privacy queries email | [email protected] |
| Name of DPO | Alberto Marcos |
Our Role
When we provide our services to our Customers, we are acting on their behalf as their service provider and processor. If you are a user that is using our service on behalf of one of our customers, your personal data is processed in accordance to:
data protection legislation
instructions given to us from the Customer
the section in our Privacy Policy that talks about our Leads, Website Users, Customers, Staff, Temporary Staff, Students, Subscribers and
the Privacy Policy of the Customer, which is made available by them (normally on their website)
Information we collect about you
These are the categories of data we may process:
| Category | Examples |
|---|---|
| Contact Details | real name, email address, address, telephone number, social media username, title, physical address. |
| Financial Data | credit card number, credit card verification number (CCV), credit card expiry date, bank account number, billing address, transaction code (TAN), income information, VAT number, credit score. |
| Household and Relationships | emergency contact, marital status, parent/guardian status, property ownership, family status, information about individual's children, next of kin, emergency contact details. |
| Identifiers and Legal Documents | public health number, passport, proof of residence, right to work status, visa status, social security number / national insurance number, driver's license data, national identification document, signature. |
| Personal Characteristics | sex, nationality, date of birth, gender, academic qualifications, height, age. |
| Location Data | tracking data, approximate location. |
| Communications Data | instant messaging data, social media posts, postal content. |
| Images and Recordings | CCTV footage, photos, videos, voice recordings, profile picture. |
| Views and Opinions | survey responses, testimonials/references, opinions (non-political/religious/philosophical). |
| Work-related Data | name of employer, occupation, completed tasks, details of grievance, disciplinary proceedings, curriculum vitae / resume. |
| Technical Identifiers | IP address, MAC address, usernames, passwords, browser data, other device identifiers, unique identifier. |
| Activity and Behavioural | (No specific examples listed) |
| Special Category Data | personal data revealing racial or ethnic origin. |
| Aggregated Data | statistical or demographic data for any purpose. Aggregated Data could be derived from your personal data but is not considered personal data in law as this data will not directly or indirectly reveal your identity. For example, we may aggregate your Usage Data to calculate the percentage of users accessing a specific website feature. However, if we combine or connect Aggregated Data with your personal data so that it can directly or indirectly identify you, we treat the combined data as personal data which will be used in accordance with this Privacy Policy. |
This is just an overview, please see the following sections for more detail.
Legal justifications we rely on to process personal data
We process personal data for the purposes described in this policy, based on the following legal bases:
Consent: the individual has given clear consent for us to process their personal data for a specific purpose.
Legitimate interests: we have a business or commercial reason to use process your personal data, so long as this is not overridden by the individuals' own rights and interests.
Contractual Obligations: the processing is necessary for a contract we have with the individual, or because they have asked us to take specific steps before entering into a contract.
Legal Obligations: the processing is necessary for us to comply with the law.
How we process personal data of our Customers
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| Accounts Receivable | Contact Details, Financial Data | Contractual Obligations |
| Authenticating Users | Contact Details, Technical Identifiers | Contractual Obligations |
| B2B Email/Text Digital Marketing (existing customers) | Contact Details, Household and Relationships, Personal Characteristics, Views and Opinions | Consent |
| B2B Email/Text Digital Marketing (prospective customers) | Contact Details, Personal Characteristics, Views and Opinions | Consent |
| B2C Email/Text Digital Marketing (existing customers) | Contact Details, Household and Relationships, Personal Characteristics, Views and Opinions | Legitimate Interest |
| Call center for Sales | Contact Details, Images and Recordings | Consent |
| Content Management System | Views and Opinions | Legitimate Interest |
| Customer Relationship Management (CRM) | Activity and Behavioural, Contact Details, Personal Characteristics | Legitimate Interest |
| Customer Support | Contact Details, Personal Characteristics, Views and Opinions | Legitimate Interest |
| Digitally Signing Documents | Contact Details, Household and Relationships, Personal Characteristics, Technical Identifiers | Contractual Obligations |
| Error & Log Management | Contact Details, Technical Identifiers | Legitimate Interest |
| Fraud Prevention | Contact Details, Financial Data, Location Data, Technical Identifiers | Legal Obligations |
| Infrastructure/Integrations or File Storage | Activity and Behavioural, Contact Details, Household and Relationships, Images and Recordings, Location Data, Personal Characteristics, Work-related Data | Legitimate Interest |
| Invoicing | Contact Details, Financial Data | Legitimate Interest |
| Onboarding & Product Demos | Activity and Behavioural, Contact Details, Views and Opinions | Legitimate Interest |
| Organising Events & Webinars | Activity and Behavioural, Contact Details, Personal Characteristics | Consent |
| Processing Transactions (Payments) | Contact Details, Financial Data, Technical Identifiers | Contractual Obligations |
| Product Development and Gathering Insights | Activity and Behavioural, Contact Details, Personal Characteristics, Technical Identifiers, Views and Opinions | Legitimate Interest |
| Product Surveys and Questionnaires | Activity and Behavioural, Contact Details, Personal Characteristics, Technical Identifiers, Views and Opinions | Legitimate Interest |
| Targeted Advertising | Activity and Behavioural, Contact Details, Household and Relationships, Location Data, Personal Characteristics | Consent |
| Tax Reporting | Contact Details, Financial Data | Legal Obligations |
| Transactional Emails | Contact Details | Legitimate Interest |
| Website Tracking/Webapp tracking | Activity and Behavioural, Technical Identifiers | Consent |
SENSITIVE DATA
| Purpose | Sensitive Data Category | Legal Justification |
|---|---|---|
| Customer Relationship Management (CRM) | Racial or Ethnic Origin | Legal Obligation (Employment/social security & protection) |
WHEN ACTING AS A PROCESSOR
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's Privacy Policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
How we process personal data of our Students
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| Certificate platform | Contact Details | Contractual Obligations |
| Digitally Signing Documents | Contact Details, Household and Relationships | Contractual Obligations |
WHEN ACTING AS A PROCESSOR
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's Privacy Policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
How we process personal data of our Teachers
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| Infrastructure/Integrations or File Storage | Contact Details, Work-related Data | Legitimate Interest |
How we process personal data of our Users
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| Error & Log Management | Contact Details, Technical Identifiers | Legitimate Interest |
| Infrastructure/Integrations or File Storage | Contact Details, Financial Data, Identifiers and Legal Documents, Technical Identifiers | Legitimate Interest |
| Processing Transactions (Payments) | Contact Details, Financial Data, Technical Identifiers | Contractual Obligations |
How we process personal data of our Leads
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| B2B Email/Text Digital Marketing (prospective customers) | Contact Details, Household and Relationships, Personal Characteristics, Views and Opinions | Consent |
| B2B Telephone Marketing (prospective customers) | Contact Details, Household and Relationships, Personal Characteristics, Views and Opinions | Consent |
| B2C Email/Text Digital Marketing (prospective customers) | Contact Details, Household and Relationships, Personal Characteristics, Views and Opinions | Consent |
| Business SMS Texting | Contact Details | Consent |
| Customer Relationship Management (CRM) | Activity and Behavioural, Contact Details, Personal Characteristics | Legitimate Interest |
| Data Enrichment | Contact Details | Legal Obligations |
| Infrastructure/Integrations or File Storage | Activity and Behavioural, Contact Details, Location Data | Legitimate Interest |
| Lead Generation | Contact Details | Consent |
| Onboarding & Product Demos | Activity and Behavioural, Contact Details, Views and Opinions | Legitimate Interest |
| Organising Events & Webinars | Activity and Behavioural, Contact Details, Personal Characteristics | Consent |
| Product Development and Gathering Insights | Activity and Behavioural, Contact Details, Personal Characteristics, Technical Identifiers, Views and Opinions | Legitimate Interest |
| Product Surveys and Questionnaires | Activity and Behavioural, Contact Details, Personal Characteristics, Technical Identifiers, Views and Opinions | Legitimate Interest |
| Targeted Advertising | Activity and Behavioural, Contact Details, Household and Relationships, Location Data, Personal Characteristics | Consent |
| Website Tracking/Webapp tracking | Activity and Behavioural, Technical Identifiers | Consent |
SENSITIVE DATA
| Purpose | Sensitive Data Category | Legal Justification |
|---|---|---|
| Customer Relationship Management (CRM) | Racial or Ethnic Origin | Legal Obligation (Employment/social security & protection) |
WHEN ACTING AS A PROCESSOR
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's Privacy Policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
How we process personal data of our Subscribers
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| Product Development and Gathering Insights | Activity and Behavioural, Contact Details, Personal Characteristics, Technical Identifiers, Views and Opinions | Legitimate Interest |
| Product Surveys and Questionnaires | Activity and Behavioural, Contact Details, Personal Characteristics, Technical Identifiers, Views and Opinions | Legitimate Interest |
WHEN ACTING AS A PROCESSOR
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's Privacy Policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
How we process personal data of our Survey and Competition Entrants
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| Content Management System | Views and Opinions | Legitimate Interest |
| Product Development and Gathering Insights | Activity and Behavioural, Contact Details, Personal Characteristics, Technical Identifiers, Views and Opinions | Legitimate Interest |
| Product Surveys and Questionnaires | Activity and Behavioural, Contact Details, Personal Characteristics, Technical Identifiers, Views and Opinions | Legitimate Interest |
How we process personal data of our Website Users
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| Consent Management | Activity and Behavioural, Technical Identifiers | Legal Obligations |
| Product Development and Gathering Insights | Activity and Behavioural, Contact Details, Personal Characteristics, Technical Identifiers, Views and Opinions | Legitimate Interest |
| Product Surveys and Questionnaires | Activity and Behavioural, Contact Details, Personal Characteristics, Technical Identifiers, Views and Opinions | Legitimate Interest |
| Targeted Advertising | Activity and Behavioural, Contact Details, Household and Relationships, Location Data, Personal Characteristics | Consent |
| Website Hosting | Contact Details, Technical Identifiers | Legitimate Interest |
| Website Tracking/Webapp tracking | Activity and Behavioural, Technical Identifiers | Consent |
WHEN ACTING AS A PROCESSOR
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's Privacy Policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
How we process personal data of our Website Visitors
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| Content Management System | Location Data | Legitimate Interest |
| Tag Management | Activity and Behavioural, Technical Identifiers | Legitimate Interest |
| Targeted Advertising | Activity and Behavioural, Contact Details, Location Data, Personal Characteristics | Consent |
| Website Tracking/Webapp tracking | Activity and Behavioural, Technical Identifiers | Consent |
How we process personal data of our Contractors
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| Accounts Payable | Contact Details, Financial Data | Contractual Obligations |
| Ad-hoc Internal Generative AI Queries | Contact Details, Technical Identifiers, Views and Opinions | Legitimate Interest |
| Digitally Signing Documents | Contact Details, Personal Characteristics, Technical Identifiers | Contractual Obligations |
| Infrastructure/Integrations or File Storage | Financial Data, Identifiers and Legal Documents | Legitimate Interest |
| Performance Evaluation | Contact Details, Work-related Data | Legitimate Interest |
How we process personal data of our Job Applicants
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| Applicant tracking system (ATS) | Contact Details, Household and Relationships, Work-related Data | Legitimate Interest |
| Call center for Sales | Contact Details, Images and Recordings | Consent |
| Performance Evaluation | Contact Details, Work-related Data | Legitimate Interest |
| Sales communication tool | Contact Details, Views and Opinions | Consent |
How we process personal data of our Staff
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| SaaS Management | Financial Data | Legitimate Interest |
| Ad-hoc Internal Generative AI Queries | Contact Details, Technical Identifiers, Views and Opinions | Legitimate Interest |
| Content Management System | Views and Opinions | Legitimate Interest |
| Customer Relationship Management (CRM) | Activity and Behavioural, Contact Details, Personal Characteristics | Legitimate Interest |
| Digitally Signing Documents | Contact Details, Personal Characteristics, Technical Identifiers | Contractual Obligations |
| Infrastructure/Integrations or File Storage | Contact Details, Images and Recordings, Personal Characteristics, Views and Opinions, Work-related Data | Legitimate Interest |
| Internal Communication | Communications Data, Contact Details, Images and Recordings | Legitimate Interest |
| Organising Events & Webinars | Activity and Behavioural, Contact Details, Personal Characteristics | Consent |
| Payroll | Contact Details, Financial Data, Identifiers and Legal Documents, Personal Characteristics | Contractual Obligations |
| Performance Evaluation | Contact Details, Work-related Data | Legitimate Interest |
| Product Development and Gathering Insights | Work-related Data | Legitimate Interest |
| Project Management | Contact Details, Work-related Data | Legitimate Interest |
| Virtual Phone System | Contact Details | Consent |
WHEN ACTING AS A PROCESSOR
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's Privacy Policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
How we process personal data of our Temporary Staff
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| Accounts Payable | Contact Details, Financial Data | Contractual Obligations |
| Digitally Signing Documents | Contact Details, Personal Characteristics, Technical Identifiers | Contractual Obligations |
| Infrastructure/Integrations or File Storage | Contact Details, Work-related Data | Legitimate Interest |
| Internal Communication | Communications Data, Images and Recordings | Legitimate Interest |
| Organising Events & Webinars | Activity and Behavioural, Contact Details, Personal Characteristics | Consent |
| Performance Evaluation | Contact Details, Work-related Data | Legitimate Interest |
| Project Management | Contact Details, Work-related Data | Legitimate Interest |
WHEN ACTING AS A PROCESSOR
When functioning as a processor, we undertake information processing based on explicit directives provided by our Customers, who serve as the Data Controllers in this context. For additional insights regarding our data usage as a processor, you can request access to our Data Processing Agreement, or alternatively, refer to our Customer's Privacy Policy.
In the capacity of a processor, there might be instances where we handle Special Category Data pertaining to our Customer's Users. While it is infrequent for us to regularly process such specialized data, it's important to note that any such processing would strictly adhere to the permissions and exemptions established by the respective Customer acting as the Data Controller.
How we process personal data of our Applicant Students
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| Digitally Signing Documents | Household and Relationships | Contractual Obligations |
| Infrastructure/Integrations or File Storage | Contact Details | Legitimate Interest |
How we process personal data of our Visitors to premises
PERSONAL DATA
| Purpose | Personal Data Category | Legal Justification |
|---|---|---|
| Organising Events & Webinars | Activity and Behavioural, Contact Details, Personal Characteristics | Consent |
How your personal data is collected
We use different methods to collect personal data from and about you including through:
Direct interactions - you may give us information on your Contact Details, Identifiers, Financial Data... (all the categories that come through direct interactions) by filling in forms or by corresponding with us by post, phone, email, via our website or otherwise. This includes personal data you provide when you:
apply for our products or services;
create an account with us;
subscribe to publications;
request marketing to be sent to you; or
give us feedback or contact us.
Automated technologies or interactions. - As you interact with our website and services, we will automatically collect Technical, Profile and Usage Data about your equipment, browsing actions, and patterns.
Third parties or publicly available sources. - We might receive personal data about you from various third parties or publicly available sources like the ones set below.
Work-related data from online recruitment platforms or professional networks.
Identity and Contact Data from publicly available sources.
Third Parties & Sub-Processors
We might store or send personal data about you to various third parties set out below.
| Third Party | Encryption | Data Residency |
|---|---|---|
| TikTok Advertising | Encryption in Transit, Encryption at Rest | United States |
| Google Ads | Encryption in Transit, Encryption at Rest | European Economic Area |
| Drift Live Chat | Encryption in Transit, Encryption at Rest | United States |
| LinkedIn Ads | Encryption in Transit, Encryption at Rest | European Economic Area |
| Cloudflare | Encryption in Transit, Encryption at Rest | United States |
| Pardot | Encryption in Transit, Encryption at Rest | Global |
| DatoCMS | Encryption in Transit | Global |
| Salesforce | Encryption in Transit, Encryption at Rest | United States |
| DoubleClick Ad | Encryption in Transit, Encryption at Rest | European Economic Area |
| Facebook Pixel | Encryption in Transit, Encryption at Rest | United States |
| Hotjar | Encryption in Transit, Encryption at Rest | Ireland |
| Cookiebot | Encryption in Transit, Encryption at Rest | Ireland |
| Microsoft Advertising | Encryption in Transit, Encryption at Rest | European Economic Area |
| Google Analytics | Encryption in Transit, Encryption at Rest | United States |
| Vercel | Encryption in Transit, Encryption at Rest | United States |
| Loom | Encryption in Transit, Encryption at Rest | United States |
| 1Password | Encryption in Transit, Encryption at Rest | European Economic Area |
| Accredible | Encryption at Rest | Global |
| Apollo.io | Encryption in Transit, Encryption at Rest | United States |
| TravelPerk | Encryption in Transit, Encryption at Rest | European Economic Area |
| Bill.com | Encryption in Transit | Global |
| Bugsnag | Encryption in Transit, Encryption at Rest | United States |
| Calendly | Encryption in Transit, Encryption at Rest | United States |
| Slack | Encryption in Transit, Encryption at Rest | United States |
| GoCardless | Encryption in Transit, Encryption at Rest | Global |
| Cledara | Encryption in Transit, Encryption at Rest | Global |
| ClickUp | Encryption in Transit, Encryption at Rest | Global |
| Crowdcast | Encryption in Transit | Global |
| Amazon Web Services | Encryption in Transit, Encryption at Rest | United States |
| DocuSign | Encryption in Transit, Encryption at Rest | Global |
| Netsuite | Encryption in Transit, Encryption at Rest | Global |
| Expensify | Encryption in Transit | Global |
| Iconosquare | Encryption in Transit | European Economic Area |
| Notion | Encryption in Transit, Encryption at Rest | United States |
| Google Drive | Encryption in Transit, Encryption at Rest | United States |
| Onepilot | Encryption in Transit | European Economic Area |
| Fivetran | Encryption in Transit, Encryption at Rest | Global |
| Spendesk | Encryption in Transit, Encryption at Rest | Global |
| Github | Encryption in Transit, Encryption at Rest | United States |
| GitKraken | Encryption in Transit | United States |
| Teamtailor | Encryption in Transit, Encryption at Rest | Global |
| Signaturit | Encryption in Transit, Encryption at Rest | Ireland |
| Dropbox | Encryption in Transit, Encryption at Rest | United States |
| Grammarly | Encryption in Transit, Encryption at Rest | United States |
| Grasshopper | Encryption in Transit | United States |
| Heroku | Encryption in Transit, Encryption at Rest | United States |
| Hibob | Encryption in Transit, Encryption at Rest | European Economic Area |
| Typeform | Encryption in Transit, Encryption at Rest | United States |
| Supermetrics | Encryption in Transit, Encryption at Rest | Global |
| Huntr | - | United States |
| Invoice Ninja | Encryption in Transit, Encryption at Rest | Global |
| Meetup | - | Global |
| Metabase | Encryption in Transit, Encryption at Rest | Global |
| Pandadoc | Encryption in Transit, Encryption at Rest | Global |
| Edusign | Encryption in Transit | European Economic Area |
| Posthook | - | United States |
| GoDaddy | Encryption in Transit, Encryption at Rest | United States |
| SimpleTexting | Encryption in Transit | United States |
| Trello | Encryption in Transit, Encryption at Rest | United States |
| Twilio | Encryption in Transit, Encryption at Rest | United States |
| SurveySparrow | Encryption in Transit, Encryption at Rest | United States |
| Zapier | Encryption in Transit, Encryption at Rest | United States |
| Eventbrite | Encryption in Transit, Encryption at Rest | United States |
| Flywire | Encryption in Transit | Global |
| On24 | Encryption in Transit | Global |
| Stape.io | Encryption in Transit | Global |
| Snowflake | Encryption in Transit, Encryption at Rest | Global |
| Google Gmail | Encryption in Transit, Encryption at Rest | United States |
| Semrush | Encryption in Transit, Encryption at Rest | Global |
| Audaxi | Encryption in Transit, Encryption at Rest | European Economic Area |
| Eloomi | Encryption in Transit | Global |
| Five9 | Encryption in Transit | United States |
| Miro | Encryption in Transit, Encryption at Rest | United States |
| Oneflow | Encryption in Transit, Encryption at Rest | Global |
| Facebook Connect | Encryption in Transit, Encryption at Rest | European Economic Area |
| Reddit Advertising | Encryption in Transit, Encryption at Rest | United States |
| Adobe Analytics | Encryption in Transit, Encryption at Rest | European Economic Area |
| Microsoft Clarity | Encryption in Transit, Encryption at Rest | United States |
| Bing Ads | Encryption in Transit, Encryption at Rest | European Economic Area |
| Google Meets | Encryption in Transit, Encryption at Rest | United States |
| Olark | Encryption in Transit, Encryption at Rest | United States |
| Google Maps Places | Encryption in Transit, Encryption at Rest | European Economic Area |
| Salesforce Marketing Cloud | Encryption in Transit, Encryption at Rest | United States |
| LinkedIn Sign-in | Encryption in Transit, Encryption at Rest | United States |
| Mailgun | Encryption in Transit, Encryption at Rest | United States |
| Google Sign-in | Encryption in Transit, Encryption at Rest | United States |
| Piwik | Encryption in Transit, Encryption at Rest | European Economic Area |
| LinkedIn Insight Tag | Encryption in Transit, Encryption at Rest | United States |
| Salesforce Sales Cloud | Encryption in Transit, Encryption at Rest | United States |
| Google Tag Manager | Encryption in Transit, Encryption at Rest | United States |
| Twitter Analytics | Encryption in Transit, Encryption at Rest | European Economic Area |
| Twitter Advertising | Encryption in Transit, Encryption at Rest | European Economic Area |
| Open AI | Encryption in Transit, Encryption at Rest | United States |
| Noltic | Encryption in Transit, Encryption at Rest | United States |
| Whistleblower | Encryption in Transit, Encryption at Rest | Germany |
| Anymailfinder | Encryption in Transit, Encryption at Rest | United States |
| Twitter Ads | Encryption in Transit, Encryption at Rest | United States |
| Lattice | Encryption in Transit, Encryption at Rest | United States |
| Google Maps | Encryption in Transit, Encryption at Rest | European Economic Area |
International Transfers
Some of our external third parties are based outside the UK and EEA so their processing of your personal data will involve a transfer of data outside the UK and EEA. Whenever we transfer your personal data out of the UK and EEA, we ensure a similar degree of protection is afforded to it by ensuring at least one of the following safeguards is implemented:
the country to which personal data is being transferred has been deemed to provide an adequate level of protection for personal data by the European Commission; or
we use specific contracts approved by the European Commission which give personal data the same protection it has in the UK and Europe.
Data Security
We have put in place appropriate security measures to prevent your personal data from being accidentally lost, used, or accessed in an unauthorized way, altered, or disclosed. In addition, we limit access to your personal data to those employees, agents, contractors, and other third parties who have a business need to know. They will only process your personal data on our instructions and they are subject to a duty of confidentiality.
We have put in place procedures to deal with any suspected personal data breach and will notify you and any applicable regulator of a breach where we are legally required to do so.
Where you have chosen a password that enables you to access certain parts of our applications, you are responsible for keeping this password confidential. We ask you not to share the password with anyone.
Data Retention
We will only retain your personal data for as long as reasonably necessary to fulfill the purposes we collected it for, including for the purposes of satisfying any legal, regulatory, tax, accounting, or reporting requirements. We may retain your personal data for a longer period in the event of a complaint or if we reasonably believe there is a prospect of litigation with respect to our relationship with you.
To determine the appropriate retention period for personal data, we consider the amount, nature, and sensitivity of the personal data, the potential risk of harm from unauthorized use or disclosure of your personal data, the purposes for which we process your personal data and whether we can achieve those purposes through other means, and the applicable legal, regulatory, tax, accounting, or other requirements.
In specific scenarios where our role is designated as a data processor, the duration for which data is retained is not determined by us. Instead, this time period is set and mandated by the data controller, in accordance with their policies and regulatory requirements. This ensures a clear understanding and compliance with the data controller's guidelines and legal obligations.
Automated decision-making and profiling
Your personal data is not used in any automated decision making (a decision made solely by automated means without any human involvement) or profiling (automated processing of personal data to evaluate certain conditions about an individual).
Your Legal Rights
You have the right to:
Request access to your personal data (commonly known as a "data subject access request"). This enables you to receive a copy of the personal data we hold about you and to check that we are lawfully processing it.
Request correction of the personal data that we hold about you. This enables you to have any incomplete or inaccurate data we hold about you corrected, though we may need to verify the accuracy of the new data you provide to us.
Request erasure of your personal data. This enables you to ask us to delete or remove personal data where there is no good reason for us to continue to process it. You also have the right to ask us to delete or remove your personal data where you have successfully exercised your right to object to processing (see below), where we may have processed your personal data unlawfully or where we are required to erase your personal data to comply with local law. Note, however, that we may not always be able to comply with your request of erasure for specific legal reasons which will be notified to you, if applicable, at the time of your request.
Object to processing of your personal data where we are relying on a legitimate interest (or those of a third party) and there is something about your particular situation which makes you want to object to processing on this ground as you feel it impacts on your fundamental rights and freedoms. You also have the right to object where we are processing your personal data for direct marketing purposes. In some cases, we may demonstrate that we have compelling legitimate grounds to process your personal data which override your rights and freedoms.
Request restriction of processing of your personal data. This enables you to ask us to suspend the processing of your personal data in the following scenarios:
If you want us to establish the data's accuracy.
Where our use of the data is unlawful, but you do not want us to erase it.
Where you need us to hold the data even if we no longer require it as you need it to establish, exercise, or defend legal claims.
You have objected to our use of your data, but we need to verify whether we have overriding legitimate grounds to use it.
Request the transfer of your personal data to you or to a third party. We will provide to you, or a third party you have chosen, your personal data in a structured, commonly used, machine-readable format. Note that this right only applies to automated information which you initially provided consent for us to use or where we used the information to perform a contract with you.
Withdraw consent at any time where we are relying on consent to process your personal data. However, this will not affect the lawfulness of any processing carried out before you withdraw your consent. If you withdraw your consent, we may not be able to provide certain products or services to you. We will advise you if this is the case at the time you withdraw your consent.
Make a complaint. You have the right to make a complaint at any time to the relevant regulator.
You will not have to pay a fee to access your personal data (or to exercise any of the other rights). However, we may charge a reasonable fee if your request is clearly unfounded, repetitive, or excessive. Alternatively, we could refuse to comply with your request in these circumstances.
We may need to request specific information from you to help us confirm your identity and ensure your right to access your personal data (or to exercise any of your other rights). This is a security measure to ensure that personal data is not disclosed to any person who has no right to receive it. We may also contact you to ask you for further information concerning your request to speed up our response.
We try to respond to all legitimate requests within one month. Occasionally it could take us longer than a month if your request is particularly complex or you have made several requests. In this case, we will notify you and keep you updated.
If you want to make a request click the button below, go to the link provided or get in touch with us at [email protected].
Third-Party Links
This website may include links to third-party websites, plug-ins and applications. Clicking on those links or enabling those connections may allow third parties to collect or share data about you. We do not control these third-party websites and are not responsible for their privacy statements. When you leave our website, we encourage you to read the Privacy Policy of every website you visit.