GDPR
Below we have listed some generic and simple ideas we have used or requirements needed to meet the GDPR, but also our procedures and security we have put in place or will be aiming to reach in the near future. Made from collecting information from many different sources online but also common sense practices found and seen on a day to day basis when serving thousands of small to large business.
As well as some of our own Ideas, if you have any ideas you would like to see added to this list or any improvement, feel free to contact us, we are always looking at ways to improve. You'll likely find some points skim the surface, you'll need to investigate them in deeper detail as every business' scenario will be different from our own.
***Please Note: The information contained in this document is only our opinions and practices we follow. They are not intended to constitute legal or other professional advice, and should not be relied on or treated as a substitute for specific advice relevant to particular circumstances.***
Ahead4 Hosting Information
UK Datacenter(s): Yes
iomart, ISO 27001 and 9001 certified and secured to UK government IL4 standards. With multi-factor access control, 24/7 onsite roaming security and CCTV
Internal Data Storage: Yes
Ahead4 Limited Premises' are located in the UK. Data is stored in a secure building with restricted user access, full CCTV cover, fire and intruder alarms with 24/7 security. Data only transmitted over secured VPN and IP's.
External Data Storage: Yes
Data only transmitted securely to select third parties with full data security practices: Google, MailChimp, Digital Ocean, Stripe, GoCardless, Namecheap, Nominet, DomainBox, GitHub, OpenSRS / Tucows, Signable.
Data Ahead4 Limited Host or Hold
We hold the following personal information internally on our intranet systems:
- Title, First Name, Last Name
- Address, Billing Address, and Postal Code
- Landline, Mobile Phone
- Payment Method
- Transactional payment information, such as card details will be held with either WorldPay, Stripe, Paypal, GoCardless or Barclays
Staff Agreements
Ahead4 Limited use a compulsory signed a document for existing and new staff, acknowledging all staff of the organisation understand data security and privacy and treat all data very seriously
Out of Hours
During this period Ahead4 Limited use stepped up security procedures to ensure peace of mind for both our customers and our internal systems. Areas of our internal system are locked out and in some cases, IP’s are blocked altogether preventing remote access.
Data Transport
On rare occasions, we must transfer data drives whether contained within hardware or via a personal passport drive, backup drive or USB stick. We take your personal data very seriously, only authorised staff members are to access the data contained.
Workshop Backups
Sometimes when we carry out repairs of a device or upgrade internal storage hardware (e.g. from a Disk Drive to a Solid State Drive) an engineer upon request can back up your data; of which we hold up to an absolute maximum of 3 months / 90 days. If a customer doesn’t retrieve data from the drive(s) using their own backup solution or the data is no longer needed an engineer will format the drive(s) and the will be data destroyed.
Data Breach
So you’ve had a data breach, something you probably prepared for and you have proper lockdown procedures? If you’re like the vast majority of companies, it’s likely something that may have crossed your mind and never thought about again. Well here’s a reminder, you have 72 hours before you MUST report an incident to ICO, what you do in those 72 hours will be the deciding outcome on whether you are legally allowed to resume trading or reinforce security procedures around your business to adequate levels before you can commence again.
To prompt thinking, consider the following when designing your unique procedure:
- Who are the key personnel to ensure this happens with speed and efficiency?
- Do your staff know what to do with a data breach?
- Do you have the key personnel to investigate what happened and ensure full lockdown of the company is achieved?
- Are all staff aware who in the company will be carrying out detailed investigations?
- Are staff aware in the event of a breach they will be locked out of the system until the investigation is over?
- What data networks need to be turned off and secure?
- Force logout / lockouts of internal and external systems?
- What exactly was stolen?
- How did they get in?
- Were your passwords weak in the affected area; Password123 vs 3xhmCbURb5A2AFPX?
These are good questions to begin with to ensure if the worst does happen you are able to shut down efficiently, you have to think outside the box and view each scenario from different angles; an attacker will be looking for an exploit. A relatively basic scenario; how do you know your mailbox for resetting passwords isn’t breached; assume it is and use a fallback to reset passwords so they do not see the generated link. Most of the 72 hours will be a mix of figuring out what was taken and securing your network using new passwords and reinforcing the weak points.
So make it strong in the first place. Answering most of those questions will inherently allow you to put procedures in before a breach can happen
Please Note: the contents of this page does not GUARANTEE GDPR compliance, it is to help get people thinking of the challenges presented and promote ideas on how to tackle them.