At Threat Protect, we are committed to protecting and respecting your privacy.
Any questions regarding this Policy and our internal Data Protection Procedures should be directed to the IMS Team by emailing firstname.lastname@example.org or by writing to us at Threat Protect, Alpha House, 100 Borough High Street, London, SE1 1LB.
How do we collect information from you?
We collect information about you from a number of sources:
- When you visit and use our website or enquire about our products or services
- When you complete and submit a form on our website
- From an email that has been sent from your company to us
- Collected from the public domain on the Internet
- Provided to us by a 3rd party data provider
- Event Registrations
- Support Desk
If you are a Threat Protect customer, we collect information about you as part of the product or service we provide you with or under a signed Agreement.
What type of information is collected from you?
The personal information we collect may include, among other information, business contact information, email address, employment details including job title and function, unique IDs and IP addresses. Some of this data is collected directly, such as when you receive products and services from us and some data is collected indirectly via technologies such as cookies, error reports and usage data.
How is your information used?
We may use your information to:
- Process an order you have submitted;
- Carry out our obligations arising from any contracts entered into by you and us;
- Seek your views or comments about the product or service we provide you with;
- Notify you of changes to our products or services;
- Send you communications which you have requested or that may be of interest;
We review our data retention periods regularly and are required to keep certain data to fulfil our statutory and legal obligations. We will hold your personal information on our systems for as long as is necessary for the relevant activity, or as long as is set out in any relevant contract you hold with us.
Who has access to your information?
We share your personal data with your consent or as necessary to complete any transaction or provide any product you have requested or authorised. We also share data with Threat Protect-controlled affiliates; with vendors and suppliers working on our behalf; when required to by law or to respond to legal process; to protect our customers; to protect lives; to maintain the security of Threat Protect and its products; and to protect the rights or property of Threat Protect.
Threat Protect will not share your information for marketing purposes with third parties other than those working on behalf of Threat Protect. A list of third parties that have access to your information is available on request.
We like to send our customers information about products and services of ours which may be of interest to you. You have a right at any time to stop us from contacting you for marketing purposes. If you no longer wish to be contacted for marketing purposes, please email email@example.com.
You have a right to request a copy of the information we hold about you. If you would like a copy of some or all your personal information, please contact the IMS Team by emailing firstname.lastname@example.org.
We want to make sure that your personal information is accurate and up to date. You may ask us to correct or remove information you think is inaccurate. To amend your information please contact your Account Manager directly or email email@example.com.
Download an up to date list of sub-processors.
Should any further questions be left unanswered regarding this privacy statement in relation to any of your personal information being processed through our website, you may immediately submit your questions to the IMS Team at firstname.lastname@example.org.
Review of this Policy