Who we are
Our website address is: https://www.bc-technologies.co.uk. and is owned by BC technologies LLP, a company registered in England & Wales number OC307747.
Registered Office: London Court, London Road, Bracknell RG12 2UT
This policy applies to the information we collect when you use one or more of our services, or when you otherwise engage with us, including, but not limited to:
- when you visit our website
- when you contact us for assistance
- when we connect with you as a prospective client or as a client
- when we connect with you in order to provide our services.
Effective date: 1st January 2020
Where we store your personal information
All information you provide to us is stored on our secure servers within the UK. We take all appropriate measures to ensure data is treated securely and in accordance with this policy. We have adopted physical, technological, and administrative procedures to safeguard and secure the data we process. We enforce least privilege access policies for our employees on all data.
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. This information will only be used to contact you.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Who we share your data with
We will not sell or rent your personal information. However, we may share or disclose your personal information as follows:
- We may provide your information to our business partners, vendors or service providers who perform functions on our behalf in line with our service agreements.
- As required by law, government officials, or other third parties in line with any legal process or requirement applicable to our company.
- When we believe, in our sole discretion, that the disclosure of personal information is necessary to prevent physical harm or financial loss.
- To report suspected illegal activity or to investigate violations of our agreements.
How long we retain your data
We retain your personal information needed to provide our services only so long as we have a valid business purpose, in accordance with applicable law and our client agreements. We may retain aggregated and anonymised information indefinitely.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
How to contact us
To contact us about anything to do with your personal data and data protection, including to make a subject access request, please use the following details:
Email address email@example.com
How we protect your data
Personal data shall be subject to additional safeguards to ensure this data is processed securely. For example, we work hard to ensure data is encrypted when in transit and storage, and access to this data will be strictly limited to a minimum number of individuals and subject to confidentiality commitments.
We will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Policy. Unfortunately, the transmission of information via the internet is not completely secure. Although we will do our best to protect your personal data, we cannot guarantee the security of your data transmitted to any of our websites; any transmission is at your own risk. Once we have received your information, we will use strict procedures and security features to try to prevent unauthorised access. When possible, encryption is used, both in transit and storage. Access controls within the organisation limit who may access information.