Personal-Details

Please provide your personal details to access developer guidelines.

SUBMIT & DOWNLOAD

Legitimate Interest

What is a Legitimate Interest?

Legitimate Interests are those uses of personal data that are deemed necessary or reasonably to be expected by a data subject (individual).

How we use Legitimate Interest

We treat our relationships with agents and developers as a legitimate interest and will occasionally contact them by email with a marketing email with our current requirements. We carried out a Legitimate Interest Assessment (LIA) and concluded that it is reasonable to contact them about business services and would not cause any impact on them personally. If you would like to see a copy of the LIA please contact our GDPR Officer, Joe Wright, [email protected]. You can unsubscribe to our mailing list at any time by clicking the unsubscribe link at the bottom of our emails or by contacting our data protection officer Joe Wright directly.

Third Parties

As a rule we do not share your personal information with anyone. However if we do receive a request to share information, for example with an independent financial advisor, we will always seek your permission first before sharing any information.

Access to your personal information

You are entitled to view, amend, or delete the personal information that we hold. Email your request to our data protection officer Joe Wright at [email protected]

How we keep your data secure

SSL Encryption

HTTPS is a protocol used to provide security over the Internet. HTTPS guarantees that users are talking to the server they expect, and that nobody else can intercept or change the content they’re seeing in transit.

Secure Data Storage

One of the most effectives methods of data protection for both personal and financial data is to simply not store it in the first place. We only store information that is relevant to us. All data stored is then subject to a retention policy to ensure we only have the information that is relevant to us.

Security Best Practices

We employ a variety of security tools and technologies such as malware detection, vulnerability scanning, web application firewalls to identify suspicious or malicious activity, with all data held on our servers sitting behind a firewall.

Changes to this Privacy Notice

This privacy notice is reviewed every 12 months and any changes made if needed.

Last updated May 2019