Proactive Services (Computing) Logo

Data Protection Policies and Privacy Statement

Proactive Services takes the privacy of its customers' information very seriously. A lot businesses say this but I like to deliver and try to make it clear what I do to keep your privacy yours.

Anything related to my business that is stored on my computer systems is stored under what I call "standard encryption". This means that it is extremely difficult for any unauthorised parties to read my computer files. Even if my equipment was stolen it is unlikely that it could be accessed as the information is scrambled and requires use of a unique, complex and long password before it can be read. This includes any information held on laptop computers or backup equipment. I keep up-to-date anti-virus on my systems at all times, make sure my programs are up-to-date and use the Web Filtering Service as a third layer of security. Where I state that information is "securely deleted", it is overwritten several times to ensure it cannot be un-deleted. I occasionally upgrade or replace equipment which may contain customer data; in such circumstances I use a special data destruction program to be completely certain that none of your data will ever be left lying around on obsolete equipment.

It goes without saying that I do not share any confidential, personal or private details about my customers to any third parties whatsoever, except where required by law. Proactive Services is registered as a Data Controller under the Data Protection Act (1997), registration number Z8668981.

Automatic alerting

When I first perform services on any computer, or provide particular programs, I may install a free alerting system that will automatically email me if:

This automatic alerting is to help provide you with a proactive service which means I can better look after your computer and data. It is not designed to spy on you. If you would prefer any of these alerts are not generated please get in touch.

Storage and removal policies

I have three different storage and removal policies depending on the type of information being stored or processed.

Contact details, correspondence and personal information

Covers information such as:

This is recorded:

Information is subject to the standard storage and removal policy with six year retention on contact details and correspondence (for accounting and tax reasons) and one year retention on other information.

Goods and services, equipment and program information

Covers information such as:

This is recorded:

For products supplied by Proactive Services this information is subject to the standard storage and removal policy with six year retention (to help with queries under UK consumer law which apply up to six years after purchase).
All other information is subject to the standard storage and removal policy with one year retention.

Confidential information

Covers any information which I consider (or you state is) confidential, a trade secret or of a sensitive nature.

This is normally recorded only by your request, after explicit permission or if it is received from you (if sent in an email, for example). If I create passwords for you for any reason I will keep a record of them as standard.

This information is subject to the enhanced storage and removal policy.

Passwords

Covers information such as:

This is recorded:

This information is subject to the enhanced storage and removal policy.

Backups

Covers information such as backup copies of computer files or a copy of entire computer contents (an "image" backup).

This is recorded to mitigate risk to files or information:

Excepting the latter use these backups are for the sole use of Proactive Services and will not be relied on by you to protect against data loss. A fee will be charged if you require any backup restoration under these circumstances. This information is subject to the backup storage and removal policy.

19th October 2007.
Adam Piggott, Proprietor.

Valid HTML 4.01! Valid CSS! Level Triple-A conformance icon, 
          W3C-WAI Web Content Accessibility Guidelines 1.0