01732 45095007967 149222
Shopping Cart 0 items - £0.00 0

Privacy Policy

Privacy policy of Locum Locks

  1. Introduction

1.1 In this policy, “we”, “us”, “our” refer to Locum Locks and “you” and “your” refer to our
customers.
1.2 We are committed to protect the private data we receive and store from you and respect
your rights under the General Data Protection Regulation.
1.3 This policy applies when we receive your data and we are acting as “data controller” and
when we process it and we are acting as “data processor”.
1.4 For more information about us and how you can contact us, please see Section 10.
1.5 Credit: This document was created using a template from the Master Locksmiths
Association that is made available to members only.

  1. Origin of our data
    2.1 We only collect information directly from our customers (you) for schedule and financial
    purposes, before a job (when the customer gets in contact with us), or at the end of a job, when
    details such as name and address are requested to create a VAT invoice.
  2. Processing your data
    3.1 In this section we explain how we use your personal data.
    3.2 Your data will be used as correspondence data (Locum Locks may contact you by e-mailing
    or calling to give you updates on the service required or to send you a written quote). The legal
    basis of processing the correspondence data is the legitimate interest to perform a service,
    requested by you from us.
    3.3 Your data will be used as transaction data and it may be used for financial records such as
    VAT invoices and it will be kept for 6 years. The legal basis of this processing is the “legal
    obligations” to which Locum Locks is subject.
  3. Sharing your details
    4.1 Locum Locks does not share your private data with any other third party.
  4. Storing your data
    5.1 This section explains how we store your private data and for how long.
    5.2 Your private data may be printed and secured in our Locked filing cabinets.
    We store our correspondence/schedule data for one year for the legitimate purpose of keeping a
    record of the job our company attends.
    5.3 Your private data may be stored electronically on our servers that are based in the UK. Our
    computers are protected by password and anti-virus program, and they can only be accessed by our staff members.
  5. Deleting your data
    6.1 This section explains how we delete/destroy your data once is no longer needed. For more
    details about the length of time we store your data please see Section 3 (3.3) and 5 (5.2).
    6.2 Once your private data is no longer relevant/needed, Locum Locks will permanently delete the
    electronic files.
    6.3 Once your private data is no longer relevant/needed Locum Locks will shred any documents.
  6. Data breaches
    7.1 Locum Locks has standard procedures to protect your details against data breaches such as
    passwords for electronic files, that are periodically changed, every 3 months and secure filing
    cabinets for physical documents. For more details on how we securely store your documents please
    see section 5.
    7.2 We back-up your data by creating an electronic copy of each document that is securely stored on
    our server based in the UK, that is protected by password and anti-virus program.
    7.3 Locum Locks understands the legal requirement to report a data breach to ICO (Information
    Commissioner’s Office) in maximum 72h hours from the event. We also commit to inform every
    person that has been affected by the data breach.
  7. Amendments
    8.1 We may update this policy in order to improve our data management.
    8.2 We will notify you of any significant changes to this policy.
  8. Your rights (GDPR rights of the natural person)
    9.1 This section explains the rights, you have, as a data subject, in relation to your personal
    information.
    9.2 To be informed about how, why and on what basis that information is processed.
    9.3 To obtain confirmation that your information is being processed and to obtain access to it and
    certain other information, by making a subject access request— your request will be answered in
    maximum 7 days.
    9.4 To have data corrected if it is inaccurate or incomplete.
    9.5 To have data erased if it is no longer necessary for the purpose for which it was originally
    collected/processed, or if there are no overriding legitimate grounds for the processing (the right to
    be forgotten).
    9.6 To restrict the processing of personal information where the accuracy of the information is
    contested, or the processing is unlawful (but you do not want the data to be erased), or where the
    employer no longer needs the personal information, but you require the data to establish, exercise
    or defend a legal claim.
    9.7 To restrict the processing of personal information temporarily where you do not think it is
    accurate (and the employer is verifying whether it is accurate), or where you have objected to the
    processing (and the employer is considering whether the organisation’s legitimate grounds override
    your interests).
    9.8 If you wish to exercise any of the rights in paragraphs, please contact the data protection officer on locumlocks@outlook.com
  9. Locum Locks details
    10.1 Our registered office is at
    6 May Street, Cuxton, Rochester, Kent, ME2 1LR
    10.2 You can contact us:
    a) by post to the address of our registered office
    b) by e-mail to locumlocks@outlook.com
    c) by telephone 01732 450950
  10. COOKIES

This site uses cookies – small text files that are placed on your machine to help the site provide a better user experience. In general, cookies are used to retain user preferences, store information for things like shopping carts, and provide anonymized tracking data to third party applications like Google Analytics. Cookies generally exist to make your browsing experience better. However, you may prefer to disable cookies on this site and on others. The most effective way to do this is to disable cookies in your browser. We suggest consulting the help section of your browser.

5. WHO HAS ACCESS TO YOUR DATA

If you are not a registered client for our site, there is no personal information we can retain or view regarding yourself.

If you are a client with a registered account, your personal information can be accessed by:

  • Our system administrators.
  • Our supporters when they (in order to provide support) need to get the information about the client accounts and access.
6. THIRD PARTY ACCESS TO YOUR DATA

We don’t share your data with third-parties in a way as to reveal any of your personal information like email, name, etc. The only exceptions to that rule are for partners we have to share limited data with in order to provide the services you expect from us. Please see below:

ENVATO PTY LTD

For the purpose of validating and getting your purchase information regarding licenses for our theme, we send your provided tokens and purchase keys to Envato Pty Ltd and use the response from their API to register your validated support data. See the Envato privacy policy here: Envato Privacy Policy.

TICKSY

Ticksy provides the support ticketing platform we use to handle support requests. The data they receive is limited to the data you explicitly provide and consent to being set when you create a support ticket. Ticksy adheres to the EU/US “Privacy Shield” and you can see their privacy policy here: Ticksy Privacy Policy.

7. HOW LONG WE RETAIN YOUR DATA

When you submit a support ticket or a comment, its metadata is retained until (if) you tell us to remove it. We use this data so that we can recognize you and approve your comments automatically instead of holding them for moderation.

If you register on our website, we also store the personal information you provide in your user profile. You can see, edit, or delete your personal information at any time (except changing your username). Website administrators can also see and edit that information.

8. SECURITY MEASURES

We use the SSL/HTTPS protocol throughout our site. This encrypts our user communications with the servers so that personal identifiable information is not captured/hijacked by third parties without authorization.

In case of a data breach, system administrators will immediately take all needed steps to ensure system integrity, will contact affected users and will attempt to reset passwords if needed.