This notice sets out how we use (and protect) your personal information for the purposes of marketing – including data which we gather from the use of our website and attendance at events organised by us or on our behalf.
We are the Data Controller for personal information relating to people who have:
We do not trade personal information for commercial purposes. We will only disclose personal information for marketing purposes if:
We do not intend to transfer any personal information used or stored for marketing processes outside of the EU, with the exception of a CRM system we use that operates from a US based data centre. This system is called Active Campaign and operates under a Privacy Shield Certification which you can find more details about here.
When you subscribe to emails from us, we will need your:
We will collect this information when you subscribe to our mailing lists. By subscribing to our mailing lists you will be automatically subscribed to receive email updates. Our use and storage of your personal information for email marketing is however based on your consent. This means that you will only receive emails and information that you have asked to receive. You can withdraw your consent or change your email marketing preferences at any time, by clicking ‘unsubscribe’ or ‘manage preferences’ on any of our emails.
If you unsubscribe from our emails or withdraw your consent for us to contact you we will store your information for a period of two years to ensure that you no longer receive emails from us. More information about how long we store information is available in our retention policy.
Our website places cookies (text files) on your computer. The cookies contain an ID number which is used to uniquely identify your browser and track each site you visit that has Google Analytics enabled.
We use the information provided by cookies to determine the number of people visiting our site. It also helps us to better understand how people find and use our website. With this information we can continually improve our website and service.
Our cookies store the following data:
If you already have Google Analytics cookies, they will be updated with the latest information about your visit to our website. We cannot access these cookies and are not the data controller for information held by Google Analytics.
Your consent is generally required for cookies to be placed on your computer and for the use and storage of personal information relating to you provided by the cookies. You may withdraw your consent at any time by updating your cookie settings. Where consent is not needed for cookies to be placed on your computer (for example, where a cookie is needed for the operation of our website or for the provision of a service to you), the use and storage of any personal information provided by the cookies will be based on legitimate interests. The legitimate interests we are pursuing are the operation of our website and promotion of our business.
When you attend one of our events, we will need your:
We will collect this information when you enrol to attend an event. Our use and storage of personal information is based on consent. We use personal information solely for the purposes of administering the event. We will only share personal information with organisations where it is necessary to administer the event (for example, hotels and transport facilities). We archive event attendance information and other personal information at the end of every business year (please see our retention schedules for more information about how long we store personal information).
If you are a speaker at one of our events we will promote your participation via platforms such as Twitter, LinkedIn and by marketing emails. External platforms may continue to store and use personal information after the event has ended.
If we process your personal data, you have a number of rights. You may request a copy of the personal data we hold about you (and request that that data be provided in a portable format) and you may object to our processing of it (including by way of direct marketing) or ask us to rectify it, restrict the way in which we process it or erase it from our records.
Where we use or store personal information relating to you, you have the following rights:
Please be aware that these rights are not always absolute and there may be some situations in which you cannot exercise them or they are not relevant. To help you understand how they work, we have provided link to the Information Commissioner’s Office’s guidance on each of the rights here.
If you have any cause for concern about our handling of personal information, please contact us using the details below.
If we are unable to resolve your concerns about our handling of personal information, you have the right to complain to the Information Commissioner’s Office.
Please read this notice carefully and contact us if you have any queries by emailing us at: [email protected]
Or by writing to:
The Information Security Manager
36 Goulden House
This privacy notice may change from time to time so we recommend that you review it periodically. This version of the privacy notice was last updated on 14 May 2018
We see the network as the platform for all your business functions and communications. It should provide a powerful point of differentiation through availability, flexibility, scalability, performance, and security.
Digital transformation and hybrid IT are pushing security perimeters off premises, into the cloud, and into the workplace. We help you create an agile and predictive security posture across your digital assets and the workplace.
Effective teamwork speeds up processes, reduces mistakes and is key to reaching your goals. To transmit and share vital information, your business need reliable tools available any time, from virtually anywhere.
Built for performance and reliability, truly Public or using an an hybrid IT environment will become an IT services broker, accelerating service delivery and transformation.
Gather information from the business, it includes the allocation of the resources (financial and physical) for the design and implementation phases, the development of a network security plan, and the development of a project schedule to match the business requirements.
It is important that during the Design phase the information gathered is used to ensure that the design meets all of the business and technical requirements that were previously developed.
Doing a Proof of Value that will be used to simulate the different parts (or additions) of the network design. Using this method gives the ability to find any potential problems before full scale implementation continues.
The current business needs and technical requirements will be compared to those used when the network was initially designed. If any changes are recommended, then the phases start again from the beginning to ensure consistency and an ongoing good design.