TEL: 00 44 (0)1327 264687
Tested to Reduce Crime Sold Secure


You must read this policy because it gives important information about:
• the data protection principles with which Sold Secure must comply;
• what is meant by personal information (or data) and sensitive personal information (or data);
• how we gather, use and (ultimately) delete personal information and sensitive personal information in accordance with the data protection principles;
• where more detailed privacy information can be found, eg about the personal information we gather and use about you, how it is used, stored and transferred, for what purposes, the steps taken to keep that information secure and for how long it is kept;
• your rights and obligations in relation to data protection;

1 Introduction
1.1 The Company obtains, keeps and uses personal information (also referred to as data) about job applicants and about current and former employees, temporary and agency workers, contractors, interns, volunteers, apprentices and customers for a number specific lawful purposes (for more information please see Sold Secure private policy).
1.2 This policy sets out how we comply with our data protection obligations and seek to protect personal information relating to our workforce and customers. Its purpose is also to ensure that staff understand and comply with the rules governing the collection, use and deletion of personal information to which they may have access in the course of their work.
1.3 We are committed to complying with our data protection obligations, and to being concise, clear and transparent about how we obtain and use personal information relating to our company, and how (and when) we delete that information once it is no longer required.
1.4 The Company’s data protection officer, Maria Covlea, is responsible for informing and advising the Company and its staff on its data protection obligations, and for monitoring compliance with those obligations and with the Company’s policies. If you have any questions or comments about the content of this policy or if you need further information, you should contact the data protection officer on
1.5 This policy applies to potential, existing or past customers/employees of Sold Secure.

2 Definitions
data breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal information;
data subject means the individual to whom the personal information relates;
personal information (sometimes known as personal data) means information relating to an individual who can be identified (directly or indirectly) from that information;
processing information means obtaining, recording, organising, storing, amending, retrieving, disclosing and/or destroying information, or using or doing anything with it;
pseudonymised means the process by which personal information is processed in such a way that it cannot be used to identify an individual without the use of additional information, which is kept separately and subject to technical and organisational measures to ensure that the personal information cannot be attributed to an identifiable individual;
sensitive personal information (sometimes known as ‘special categories of personal data’ or ‘sensitive personal data’) means personal information about an individual’s race, ethnic origin, political opinions, religious or philosophical beliefs, trade union membership (or non-membership), genetics information, biometric information (where used to identify an individual) and information concerning an individual’s health, sex life or sexual orientation.

3 Data protection principles
3.1 Sold Secure will comply with the following data protection principles when processing personal information:
3.1.1 we will process personal information lawfully, fairly and in a transparent manner;
3.1.2 we will collect personal information for specified, explicit and legitimate purposes only, and will not process it in a way that is incompatible with those legitimate purposes;
3.1.3 we will only process the personal information that is adequate, relevant and necessary for the relevant purposes;
3.1.4 we will keep accurate and up to date personal information, and take reasonable steps to ensure that inaccurate personal information are deleted or corrected without delay;
3.1.5 we will keep personal information[ in a form which permits identification of data subjects] for no longer than is necessary for the purposes for which the information is processed; and
3.1.6 we will take appropriate technical and organisational measures to ensure that personal information are kept secure and protected against unauthorised or unlawful processing, and against accidental loss, destruction or damage.

4 Basis for processing personal information
4.1 In relation to any processing activity we will, before the processing starts for the first time, and then regularly while it continues:
4.1.1 review the purposes of the particular processing activity, and select the most appropriate lawful basis (or bases) for that processing, ie:
(a) that the data subject has consented to the processing;
(b) that the processing is necessary for the performance of a contract to which the data subject is party or in order to take steps at the request of the data subject prior to entering into a contract;
(c) that the processing is necessary for compliance with a legal obligation to which the Company is subject;
(d) that the processing is necessary for the protection of the vital interests of the data subject or another natural person;
(e) that the processing is necessary for the purposes of legitimate interests of the Company or a third party, except where those interests are overridden by the interests of fundamental rights and freedoms of the data subject—see clause 4.2 below.
4.1.2 except where the processing is based on consent, satisfy ourselves that the processing is necessary for the purpose of the relevant lawful basis (ie that there is no other reasonable way to achieve that purpose);
4.1.3 document our decision as to which lawful basis applies, to help demonstrate our compliance with the data protection principles;
4.1.4 include information about both the purposes of the processing and the lawful basis for it in our relevant privacy notice(s);
4.1.5 where sensitive personal information is processed, also identify a lawful special condition for processing that information
4.1.6 where criminal offence information is processed, also identify a lawful condition for processing that information, and document it.
4.2 When determining whether the Company’s legitimate interests are the most appropriate basis for lawful processing, we will:
4.2.1 conduct a legitimate interests assessment (LIA) and keep a record of it, to ensure that we can justify our decision;
4.2.2 if the LIA identifies a significant privacy impact, consider whether we also need to conduct a data protection impact assessment (DPIA);
4.2.3 keep the LIA under review, and repeat it if circumstances change; and
4.2.4 include information about our legitimate interests in our relevant privacy notice(s).

5 Data protection impact assessments (DPIAs)
5.1 Where processing is likely to result in a high risk to an individual’s data protection rights (eg where the Company is planning to use a new form of technology), we will, before commencing the processing, carry out a DPIA to assess:
5.1.1 whether the processing is necessary and proportionate in relation to its purpose;
5.1.2 the risks to individuals; and
5.1.3 what measures can be put in place to address those risks and protect personal information.
5.2 Before any new form of technology is introduced, the manager responsible should therefore contact the data protection officer in order that a DPIA can be carried out.
5.3 During the course of any DPIA, the employer will seek the advice of the data protection officer and any other relevant stakeholders.

6 Privacy notice
6.1 The Company will issue privacy notices from time to time, informing you about the personal information that we collect and hold relating to you, how you can expect your personal information to be used and for what purposes.
6.2 We will take appropriate measures to provide information in privacy notices in a concise, transparent, intelligible and easily accessible form, using clear and plain language.

7 Individual rights
7.1 You (in common with other data subjects) have the following rights in relation to your personal information:
7.1.1 to be informed about how, why and on what basis that information is processed
7.1.2 to obtain confirmation that your information is being processed and to obtain access to it and certain other information, by making a subject access request;
7.1.3 to have data corrected if it is inaccurate or incomplete;
7.1.4 to have data erased if it is no longer necessary for the purpose for which it was originally collected/processed, or if there are no overriding legitimate grounds for the processing (this is sometimes known as ‘the right to be forgotten’);
7.1.5 to restrict the processing of personal information where the accuracy of the information is contested, or the processing is unlawful (but you do not want the data to be erased), or where the employer no longer needs the personal information but you require the data to establish, exercise or defend a legal claim;
7.1.6 to restrict the processing of personal information temporarily where you do not think it is accurate (and the employer is verifying whether it is accurate), or where you have objected to the processing (and the employer is considering whether the organisation’s legitimate grounds override your interests).
7.2 If you wish to exercise any of the rights in paragraphs 7.1.3 to 7.1.6, please contact the data protection officer on

7.2.1 removal of personal information, or devices containing personal information (or which can be used to access it), from the Company’s premises without appropriate security measures being in place;
7.2.2 any other breach of this Policy or of any of the data protection principles set out in paragraph 3.1 above.

8 Information security
8.1 The Company will use appropriate technical and organisational measures in accordance with the Company’s policies to keep personal information secure, and in particular to protect against unauthorised or unlawful processing and against accidental loss, destruction or damage. These may include:
8.1.1 making sure that, where possible, personal information is pseudonymised or encrypted;
8.1.2 ensuring the ongoing confidentiality, integrity, availability and resilience of processing systems and services;
8.1.3 ensuring that, in the event of a physical or technical incident, availability and access to personal information can be restored in a timely manner;
8.1.4 a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.
8.2 Where the Company uses external organisations to process personal information on its behalf, additional security arrangements need to be implemented in contracts with those organisations to safeguard the security of personal information. In particular, contracts with external organisations must provide that:
8.2.1 the organisation may act only on the written instructions of the Company;
8.2.2 those processing the data are subject to a duty of confidence;
8.2.3 appropriate measures are taken to ensure the security of processing;
8.2.4 sub-contractors are only engaged with the prior consent of the Company and under a written contract;
8.2.5 the organisation will assist the Company in providing subject access and allowing individuals to exercise their rights under the GDPR;
8.2.6 the organisation will assist the Company in meeting its GDPR obligations in relation to the security of processing, the notification of data breaches and data protection impact assessments;
8.2.7 the organisation will delete or return all personal information to the Company as requested at the end of the contract;
8.2.8 the organisation will submit to audits and inspections, provide the Company with whatever information it needs to ensure that they are both meeting their data protection obligations, and tell the Company immediately if it is asked to do something infringing data protection law.
9 Storage and retention of personal information
9.1 Personal information (and sensitive personal information) will be kept securely in accordance with the Sold Secure’s private data policy.
9.2 Personal information (and sensitive personal information) should not be retained for any longer than necessary. The length of time over which data should be retained will depend upon the circumstances, including the reasons why the personal information was obtained
9.3 Personal information (and sensitive personal information) that is no longer required will be deleted permanently from our information systems and any hard copies will be destroyed securely.

10 Data breaches
10.1 A data breach may take many different forms, for example:
10.1.1 loss or theft of data or equipment on which personal information is stored;
10.1.2 unauthorised access to or use of personal information either by a member of staff or third party;
10.1.3 loss of data resulting from an equipment or systems (including hardware and software) failure;
10.1.4 human error, such as accidental deletion or alteration of data;
10.1.5 unforeseen circumstances, such as a fire or flood;
10.1.6 deliberate attacks on IT systems, such as hacking, viruses or phishing scams;
10.1.7 ‘blagging’ offences, where information is obtained by deceiving the organisation which holds it.
10.2 Sold Secure will:
10.2.1 make the required report of a data breach to the Information Commissioner’s Office without undue delay and, where possible within 72 hours of becoming aware of it, if it is likely to result in a risk to the rights and freedoms of individuals;
10.2.2 notify the affected individuals, if a data breach is likely to result in a high risk to their rights and freedoms and notification is required by law.

11 Training
The Company will ensure that staff are adequately trained regarding their data protection responsibilities. Individuals whose roles require regular access to personal information, or who are responsible for implementing this policy or responding to subject access requests under this policy, will receive additional training to help them understand their duties and how to comply with them.

12 Consequences of failing to comply
12.1 The Company takes compliance with this policy very seriously. Failure to comply with the policy:
12.1.1 puts at risk the individuals whose personal information is being processed; and

Sold Secure 2000 Limited trading as Sold Secure - Registered in England No. GB 3714663

Registered Office: 1 Prospect Park, Valley Drive, Rugby, Warwickshire CV21 1TF

General Privacy Policy