{"id":531,"date":"2018-08-01T15:16:35","date_gmt":"2018-08-01T15:16:35","guid":{"rendered":"https:\/\/expert-security.info\/?page_id=531"},"modified":"2018-08-01T15:19:09","modified_gmt":"2018-08-01T15:19:09","slug":"privacy","status":"publish","type":"page","link":"https:\/\/expert-security.info\/?page_id=531","title":{"rendered":"Privacy"},"content":{"rendered":"<div class=\"content\">\n<h2>GDPR \u2013 Data Protection Policy Statement<\/h2>\n<p>*This is the Data Protection Policy of Expert Security written to\u00a0\u00a0 comply with the General Data Protection Requirements (GDPR) and the Data Protection Act 1998 (DPA).<\/p>\n<p>Expert Security is committed to the following eight principles of the Data Protection Act:<\/p>\n<p>&nbsp;<\/p>\n<p>1)\u00a0\u00a0\u00a0\u00a0 Personal data is only processed for lawful purposes<\/p>\n<p>2)\u00a0\u00a0\u00a0\u00a0 Personal data is only obtained for lawful purposes<\/p>\n<p>3)\u00a0\u00a0\u00a0\u00a0 Personal data is adequate, relevant and not excessive in relation to the purposes for which they are processed<\/p>\n<p>4)\u00a0\u00a0\u00a0\u00a0 Personal data is accurate and, where necessary, kept up to date<\/p>\n<p>5)\u00a0\u00a0\u00a0\u00a0 Personal data is not kept longer than is necessary<\/p>\n<p>6)\u00a0\u00a0\u00a0\u00a0 Personal data is processed in accordance with the rights of data subjects in accordance with the DPA<\/p>\n<p>7)\u00a0\u00a0\u00a0\u00a0 Appropriate measures are taken to prevent against unauthorised or unlawful processing and against accidental loss of, destruction of, or damage to, personal data<\/p>\n<p>8)\u00a0\u00a0\u00a0\u00a0 Personal data is not transferred outside the European Economic Area<\/p>\n<p>&nbsp;<\/p>\n<p>Additionally, to comply with GDPR. Expert Security:<\/p>\n<p>&nbsp;<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Assesses the operational risks relating to compliance with GDPR and the DPA<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Maintains registration with the ICO<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Publishes a Privacy Notice on its website and on office notice boards.<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Personal data is kept secure in locked files<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The office is secure and adequately protected with intruder alarms<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Does not keep special category or sensitive data<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Does not pass personal data to 3rd parties without their express consent<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Has arrangements in place whereby an individual can request access to their personal data, request correction and deletion<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ensuring that queries about data protection are dealt with effectively and promptly<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Laptops, computers, mobile devices and business systems holding personal data are password protected<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ensures updates to applications and business systems are installed as soon as possible<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Protects against viruses, cyber-attacks, phishing, malware, DDOS attacks by installing and maintaining appropriate software on devices<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Has defined the retention period for personal data and disposes personal data in a secure manner<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Maintains a log and assesses the root cause of data breaches or attempted breaches and take appropriate action to correct the situation and prevent recurrence<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Controls access to files and systems to ensure that only authorised personnel can access or modify personal data<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Only transfers personal data by secure means<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Trains staff on this policy and their individual responsibilities<\/p>\n<p>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Reviews data protection arrangements at least annually to ensure continued effectiveness.<\/p>\n<p>&nbsp;\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>GDPR \u2013 Data Protection Policy Statement *This is the Data Protection Policy of Expert Security written to\u00a0\u00a0 comply with the General Data Protection Requirements (GDPR) and the Data Protection Act 1998 (DPA). Expert Security is committed to the following eight principles of the Data Protection Act: &nbsp; 1)\u00a0\u00a0\u00a0\u00a0 Personal data is only processed for lawful [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-531","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Privacy - Expert Alarms<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/expert-security.info\/?page_id=531\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy - Expert Alarms\" \/>\n<meta property=\"og:description\" content=\"GDPR \u2013 Data Protection Policy Statement *This is the Data Protection Policy of Expert Security written to\u00a0\u00a0 comply with the General Data Protection Requirements (GDPR) and the Data Protection Act 1998 (DPA). Expert Security is committed to the following eight principles of the Data Protection Act: &nbsp; 1)\u00a0\u00a0\u00a0\u00a0 Personal data is only processed for lawful [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/expert-security.info\/?page_id=531\" \/>\n<meta property=\"og:site_name\" content=\"Expert Alarms\" \/>\n<meta property=\"article:modified_time\" content=\"2018-08-01T15:19:09+00:00\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/expert-security.info\/?page_id=531\",\"url\":\"https:\/\/expert-security.info\/?page_id=531\",\"name\":\"Privacy - Expert Alarms\",\"isPartOf\":{\"@id\":\"https:\/\/expert-security.info\/#website\"},\"datePublished\":\"2018-08-01T15:16:35+00:00\",\"dateModified\":\"2018-08-01T15:19:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/expert-security.info\/?page_id=531#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/expert-security.info\/?page_id=531\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/expert-security.info\/?page_id=531#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/expert-security.info\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/expert-security.info\/#website\",\"url\":\"https:\/\/expert-security.info\/\",\"name\":\"Expert Alarms\",\"description\":\"Commercial Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/expert-security.info\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy - Expert Alarms","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/expert-security.info\/?page_id=531","og_locale":"en_US","og_type":"article","og_title":"Privacy - Expert Alarms","og_description":"GDPR \u2013 Data Protection Policy Statement *This is the Data Protection Policy of Expert Security written to\u00a0\u00a0 comply with the General Data Protection Requirements (GDPR) and the Data Protection Act 1998 (DPA). Expert Security is committed to the following eight principles of the Data Protection Act: &nbsp; 1)\u00a0\u00a0\u00a0\u00a0 Personal data is only processed for lawful [&hellip;]","og_url":"https:\/\/expert-security.info\/?page_id=531","og_site_name":"Expert Alarms","article_modified_time":"2018-08-01T15:19:09+00:00","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/expert-security.info\/?page_id=531","url":"https:\/\/expert-security.info\/?page_id=531","name":"Privacy - Expert Alarms","isPartOf":{"@id":"https:\/\/expert-security.info\/#website"},"datePublished":"2018-08-01T15:16:35+00:00","dateModified":"2018-08-01T15:19:09+00:00","breadcrumb":{"@id":"https:\/\/expert-security.info\/?page_id=531#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/expert-security.info\/?page_id=531"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/expert-security.info\/?page_id=531#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/expert-security.info\/"},{"@type":"ListItem","position":2,"name":"Privacy"}]},{"@type":"WebSite","@id":"https:\/\/expert-security.info\/#website","url":"https:\/\/expert-security.info\/","name":"Expert Alarms","description":"Commercial Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/expert-security.info\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/expert-security.info\/index.php?rest_route=\/wp\/v2\/pages\/531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/expert-security.info\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/expert-security.info\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/expert-security.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/expert-security.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=531"}],"version-history":[{"count":3,"href":"https:\/\/expert-security.info\/index.php?rest_route=\/wp\/v2\/pages\/531\/revisions"}],"predecessor-version":[{"id":535,"href":"https:\/\/expert-security.info\/index.php?rest_route=\/wp\/v2\/pages\/531\/revisions\/535"}],"wp:attachment":[{"href":"https:\/\/expert-security.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}