ZAKS IT GDPR Compliance Statement
ZAKS IT is fully committed to upholding the principles of the GDPR and ensuring that any data held by ZAKS IT is acquired , held and maintained in a process that protects the prIvacy rights of data subjects , whether they are individuals and organisations. WE are committed to the principles of privacy by design, the right to be forgotten, consent and a risk baed approach.We aim to ensure:
• Transparency with regard to the use of data
• That any processing is lawful ,fair , transparent and necessary for a specific purpose
• That data is accurate, kept up to date and removed when no longer necessary
• That data is kept securely and safely
We are committed to ensuring the safety and protection of personal information that we process. WE take our responsibilites very seriously to comnply with the principles of GDPR and to protect data subject rights. We have appointed a Data Controller,who is also responsible for the processing of prospect and client data. Our controller is responsible for the control of client and supplier contact information ,required to manage and deliver services under contract. We also process data for marketing purposes which we have acquired from third parties and online platforms. Where we acquire and use data for marketing purposes , we only use data where we belive have a legitimate market interest in promoting ZAKS IT services to organisations , both public and private
If you have any questions about our GDPR compliance activities and statement ,please contact jeremy.jackson@zaksit.com We intend to comply fully with the terms of the GDPR .We prepared for the GDPR by carrying out an information audit. We overhauled our procedures for data protection and updated our data retention and erasure procedures in 2018 to ensure that we comply with the ‘right to erasure principle’ obligation.
Safeguarding and Security Measures
The privacy and security of personal information is of the utmost importance to ZAKS IT. Therefore, we have implemented security measures designed to protect data.
Hardware and software firewalls
Anti virus
File encryption
Password protection
Denial of password protection
Firewall
Data encrption
Intrusion prevention systems
We recognise the right to erasure.