This page underlines the security, storage and usage of the DATA of the customer of E-Computing Limited. This page will serve as a detailed explanation on client DATA security and its purpose.

Definitions

GDPR General Data Protection Regulation.
Responsible Party E-Computing
Client Device DATA DATA stored on client’s devices or undergoing DATA recovery
Client DATA contact DATA stored relating to the client, including name, email, contact number, address details and subscriptions details

1. Data protection principles

E-Computing Limited is committed to processing data in accordance with its responsibilities under the GDPR.
Article 5 of the GDPR requires that personal data shall be:

  1. processed lawfully, fairly and in a transparent manner in relation to individuals.
  2. collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes; further processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes shall not be considered to be incompatible with the initial purposes.
  3. adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed.
  4. accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that personal data that are inaccurate, having regard to the purposes for which they are processed, are erased or rectified without delay.
  5. kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed.
  6. personal data may be stored for longer periods insofar as the personal data will be processed solely for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes subject to implementation of the appropriate technical and organisational measures required by the GDPR in order to safeguard the rights and freedoms of individuals; and
  7. processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures.”

2. Client Data

  1. E-Computing shall not access, store or transfer any DATA from client devices without client consent on the job description sheet.
  2. E-Computing shall clearly indicate the reasons for the required DATA access on the point of job being booked. A signature from the client on the copy of the job description sheet will indicate their authorisation for E-computing to access their DATA as underlined on the document.
  3. E-Computing will not be responsible for any DATA loss during the job due to failed components, software issues, inability of the device to be powered on during booking, liquid damage on the device, or client interference between job completions. Clients will be required to backup DATA prior to leaving the device with E-Computing or inform E-Computing on the time of booking if DATA is of high importance if not backed up.
  4. E-Computing will hold the DATA of a Client’s device no longer than 72 hours, unless requested by the end client to either increase or decrease this duration. This time frame is decided to allow the client to ensure all DATA is intact and not lost due to a DATA recovery/transfer.
  5. Clients have the right to ask E-Computing to remove DATA at any time post collection of the device before the 72-hour DATA storage period. DATA at this point will be permanently deleted and cannot be retrieved again.
  6. E-Computing does not intend to, or hold any rights to, use any client DATA for use of marketing or other purposes, or transfer to any third party.
  7. E-Computing will not be sharing any DATA of clients with any third-party companies for any reason.
  8. E-Computing holds the right to stop the DATA recovery process at any point during a DATA recovery process if client behavior is rude, pressurizing or non-understanding. At this point, any repair or recovery processes on the device will be halted, and the device will be returned to the client.
  9. E-Computing reserves the right to remove any device from its premises and recycle for parts if the client has not collected the device within 90 days of the notification of job completion. At this point the DATA will be wiped off the device, and parts will be recycled for use by E-Computing. No DATA of the client will be used or accessed by E-Computing once the decision to recycle has been made. The client will be informed by email of the process.

3. Marketing

  1. E-Computing will not be using any of the Client DATA or Client Device DATA for marketing use.
  2. E-Computing will not be sharing information with any other company for any client.

4. General provisions

  1. This policy applies to all client DATA stored by E-Computing.
  2. This policy shall be reviewed at least annually.

5. Lawful, fair and transparent processing

  1. The policies shall be reviewed at least annually to maintain strict policy guidelines.
  2. Individuals have the right to request access to their personal DATA during a job-in-progress. These requests will be processed in a timely manner depending on the complexity of the repair process of the device with E-Computing.

6. Data minimisation

  1. E-Computing shall ensure that personal data are adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed.

7. Accuracy

  1. E-Computing shall take reasonable steps to ensure personal data is stored securely for clients.
  2. Where necessary for the lawful basis on which data is processed, steps shall be put in place to ensure that personal data is kept up to date.

8. Archiving / removal

  1. To ensure that personal data is kept for no longer than necessary, E-Computing shall remove any client device DATA for no longer than 72 hours after device collection, unless advised by the client otherwise.

9. Security

  1. E-Computing shall ensure that personal data is stored securely using modern software that is kept-up to date.
  2. Access to personal data shall be limited to personnel who need access and appropriate security should be in place to avoid unauthorised sharing of information.
  3. When personal data is deleted this should be done safely such that the data is irrecoverable.
  4. Appropriate back-up and disaster recovery solutions shall be in place.

Breach

In the event of a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data, E-Computing shall promptly assess the risk to people’s rights and freedoms and if appropriate report this breach to the ICO (more information on the ICO website).


-End Of Policy