1. Personal information that this website collects, and why it is collected:
This website collects and uses personal information for the following reasons:
Cookies can be either ‘first party’, which means they are used by an organisation on its own website, or ‘third party’ which is when they are used by an organisation on another organisation’s website. Some cookies are ‘session’ cookies that are deleted from your computer as soon as you close your web browser. ‘Persistent’ cookies do not self-delete until a specific period of time has elapsed. Further below we provide information on the cookies we use and highlight which are first and third party.
For more general information about cookies visit: All About Cookies.org. There is also a useful video about cookies on Google’s website.
By using and browsing this website, you consent to using the first and third party cookies that we use. If you do not consent, you must disable cookies (please see guidance below) or please refrain from using the site.
First party cookies
The table below lists the first party cookies we use and their purpose:
|Cookie Name or Service||Purpose||More information|
|wordpress_test_cookie||Our website sets this cookie when you navigate to the login page. The cookie is used to check whether your web browser is set to allow, or reject cookies.|
|Google Analytics||These cookies are used by the Google Analytics service to collect information about how visitors use our site. We use the information to compile reports and to help us improve the site. The cookies collect information in an anonymous form, including the number of visitors to the site, where visitors have come to the site from and the pages they visited.||Overview of Google Analytics cookie usage|
How can I control cookies?
Most web browsers accept cookies automatically, but you can change the settings of your browser to reject all cookies, to only allow ‘trusted’ websites to use them, or to only accept cookies from those websites which you are currently on.
Please note: rejecting cookies is not recommended as this is likely to result in some features on this website not functioning correctly or as intended.
There is guidance available on the website All About Cookies.org which tells you how to control and remove cookies using the options available in your web browser.
1.2 Contact form submissions / email links
2. Website hosting
All traffic (transferral of files) between this website and your browser is encrypted and delivered over HTTPS.
The server that this website is hosted upon is within a data centre staffed to support on site engineering, installation, operations and maintenance activities. Fully managed 24/7/365 by skilled engineers and monitored around the clock by Network Operations Centre staff and security personnel.
All centres used by the hosting company are specially designed, equipped and secured to the highest standards, with redundancy at all levels. All boast state of the art systems including:
- ISO 9001, 27001, 14001 accreditations
- Air conditioning with n+1 redundancy, average 22C temperature
- Fire protection inc. laser smoke detection. Alarm installation and VESDA (very early smoke detection alarm) sensors
- Automatic argon gas based fire suppression system
- Water detection systems
- 365/24/7 Security patrols and surveillance
- 230V AC UPS Power Capacity, 2n redundant with 10 minutes autonomy
- Raised anti static flooring
- Electrically grounded infrastructure
- Lighting 400 Lux at ground Level
- 24/7 Facility access
- Indefinite power supplied by backup diesel generator
- Overhead cabling
In addition the server itself combines ModSecurity and Fail2Ban, delivering server-to-site security out of the box.
This site also runs a Web Application Firewall (WAF) to provide an additional layer of security.
3. Third Party Data Processors
4. Data Breaches
I will report any unlawful data breach of this website’s database or the database(s) of any third party data processors to any and all relevant persons and authorities within 72 hours of the breach if it is apparent that personal data stored in an identifiable manner has been stolen.