Head Office: +44 (0) 20 3922 1222 / Australia Support: +61 (0) 2 9053 9703
Select Page
Content on this website is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this website remains at the sole discretion of ISAAC Intelligence. This website is not warranted to be error-free, nor is it subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. Contents of this website in any form, software or printed matter, contains proprietary information that is the exclusive property of ISAAC Intelligence. This website and information contained herein may not be copied, reproduced or distributed without the prior written consent of ISAAC Intelligence. This website and its contents are not part of any license agreement nor can it be incorporated into any contractual agreement with ISAAC Intelligence. ISAAC Intelligence cannot be made responsible for the content delivered through the solutions described on this website.
Who we are
We, ISAAC Intelligence Limited, company registration No. 08556325 (ISAAC), are committed to protecting and respecting your privacy.

This Privacy Notice explains in detail the types of personal data we may collect about you when you interact with us. It also explains how we’ll store and handle that data and keep it safe.

For the purpose of the General Data Protection Regulation 2018 (GDPR), ISAAC is both a data controller and a data processor:

  • Data Controller; when managing data that we ourselves collect and store within our systems. For example, business customer and supplier information held within our CRM and employee information held within our HR system.
  • Data Processor; when analysing data that our customers provide to us during the normal course of business. For example, when trouble-shooting or analysing customer systems data.
Our Data Protection Officer (DPO) is the ISAAC Managing Director.
The legal basis we rely on
Legitimate interest
In specific situations, we require your data to pursue our legitimate interests in a way which might reasonably be expected as part of running our business and which does not materially impact your rights, freedom or interests.

For example, we may use your browsing history to send you or make available specific offers, based upon your interests

We also combine the browsing and purchase history of many businesses to identify trends and ensure we can continue to develop new solutions and services. 

We will also use your email address details to send you direct marketing information by email, telling you about solutions and services that we think might interest you.

When do we collect your data?
  • When you visit any of our websites, for example www.isaacintelligence.com.
  • When you register to use any of our sites, or subscribe to our services, our blog, newsletter, 14-day free trials or webinars for example.
  • When you post material or request further services or information from our sites.
  • When you contact us by any means with queries, complaints or support requests.
  • When you engage with us on social media.
  • When you purchase a solution or service from us.
  • When you arrange a demo, or book an appointment with us.
  • When you choose to complete any surveys we send you.
  • When you have given a third-party permission to share with us the information they hold about you.
  • When we collect information from publicly-available sources where you have provided your consent to share information or where the information is made public as a matter of law.
  • When using the services provided by ISAAC.
What sort of personal data do we collect?
  • Your name, business email address, company address (trading and registered), your business telephone numbers (landline and mobile), orders, payment receipts.
  • Details of your interactions with us, through our sales team, contact centres and support and technical teams. For example, we collect notes from our conversations with you, details of any faults, complaints or requirements.
  • Details of your visits to our websites or apps, and which site you came from to ours.
  • Information gathered by the use of cookies in your web browser. Click here for our Cookie Policy.
  • Your social media username if you interact with us through those channels, to help us to respond to your comments, questions or feedback.
How and why we use your data
We want to provide you with the best possible customer experience. One way to achieve that is to get the richest picture of your business and the way you work and your requirements.

We then use this information to offer you insights, research, promotions, solutions and services that are most likely to interest you. The data privacy law allows this as part of our legitimate interest in understanding our customers and providing the highest levels of service and innovation.

If at any time you wish to change how we use your data, you can contact us to either unsubscribe from any future marketing communications or request us to remove your data entirely, which we are obliged to do as part of the new data privacy law in-line with our legal and regulatory responsibilities.

Here’s how we will use your data and why
  • To process any orders that you make by using our websites, or in person via direct contact with our sales, technical or support teams, or via email request. If we don’t collect your data and comply with our legal obligations, we won’t be able to process your orders.
For example, your details may need to be passed to a third-party partner of ours to supply or deliver the solution, service or product that you have ordered. These may include but are not limited to Microsoft, Amazon Web Services, harmon.ie and AvePoint.
  • To keep you informed by email, web, telephone and occasionally text and through our contact centres about relevant solutions and services including tailored offers, promotions, events and so on.
Of course, you are free to opt out of hearing from us by any of these channels at any time.
  • To develop, test and improve the solutions, systems and solutions we provide you. We’ll do this on the basis of our legitimate business interests.
  • To comply with our contractual or legal obligations to share data with law enforcement.
  • To build a rich picture of who you and your business are, your interests and requirements. To inform our business decisions we will combine data from throughout our business (Sales and Support for example) and from third-parties and data from publicly available lists as we have previously described. We will do this on the basis of our legitimate business interest.
  • To notify you about changes to our service.
How we protect your data
We know how much data security matters to all our customers. We will treat your data with the utmost care and take all appropriate steps to protect it. We secure access to all transactional areas of our websites and apps using ‘https’ technology. Access to your personal data is password-protected, and sensitive data (such as payment card information) is secured by SSL encryption. We regularly monitor our system for possible vulnerabilities and attacks, and we carry out penetration testing to identify ways to further strengthen security. Where we have given you (or where you have chosen) a password which enables you to access our services or certain parts of our sites, you are responsible for keeping this password confidential. You are not permitted to share your password with anyone.
How long will we keep your data?
Whenever we collect or process your personal data, we’ll only keep it for as long as is necessary for the purpose for which it was collected. At the end of that retention period, your data will either be deleted completely or anonymised, for example by aggregation with other data so that it can be used in a non-identifiable way for statistical analysis and business planning.
Who do we share your personal data with?
We sometimes share your personal data with trusted third-parties.
Who do we share your personal data with?
  • We provide only the information they need to perform their specific services.
  • They may only use your data for the exact purposes we specify in our contract with them.
  • We work closely with them to ensure that your privacy is respected and protected at all times.
  • If we stop using their services, any of your data held by them will either be deleted or rendered anonymous.
Examples of the kind of third-parties we work with;
  • Technology partners who support our business systems and solutions. For example, Microsoft, Amazon Web Services.
  • Operational companies such as delivery couriers.
  • Direct marketing companies who help us manage our electronic communications with you.
  • Social Media companies, such as Twitter, Google, LinkedIn to show you solutions and services that may interest you while browsing the internet.
  • Data insight companies to ensure your details are up to date and accurate.
Sharing data with third-parties for their own purposes;
  • We never do this.
Where your data may be processsed
Sometimes we will need to share your data with third-parties and suppliers outside the European Economic Area (EEA), such as Australia or the USA.
International orders
If you are based outside the UK and place an order with us, we will transfer the personal data that we collect from you to ISAAC in the UK.
Protecting your data outside the EEA
The EEA includes all EU Member countries as well as Iceland, Liechtenstein and Norway. We may transfer personal data that we collect from you to third-party data processors in countries that are outside the EEA. For example, this might be required in order to fulfill your order, process your payment or provide support services.
If we do this, we have procedures in place to ensure your data receives the same protection as if it were being processed inside the EEA, for example our contracts with third-parties stipulate the standards they must follow at all times.
What are your rights with regards to your data?
You have the right to request;
  • Access to the data we hold about you, free of charge in most cases.
  • The correction of your data when incorrect, out of date or incomplete. For example, when you object to our use of your data on the basis of legitimate interest, or once the purpose for which we hold the data has come to an end.
  • That we stop using your data for direct marketing.
You have a right to request a copy of any information about you that we hold at any time. To ask for your information, please contact Data Protection Officer, ISAAC Intelligence Limited, 5 Crane Mews, Gould Road, Twickenham, TW2 6RS or email ask@isaacintel.com.
Where we rely on our legitimate interest
In cases where we are processing your data on the basis of legitimate interest, you can ask us to stop for reasons connected to your individual situation. We must then do so unless we believe we have a legitimate overriding reason to continue processing your personal data. For example, regulatory requirement.
Direct marketing
You have the right to stop the use of your personal data for direct marketing activity through all channels, or selected channels. We must always comply with your request.
Checking your identity
To protect the confidentiality of your information, we will ask you to verify your identity before proceeding with any request you make under this Privacy Notice. If you have authorised a third party to submit a request on your behalf, we will ask them to prove they have your permission to act.
How can you stop the use of your data for direct marketing?
Simply click the ‘unsubscribe’ link in any email communication that we send you.
Contacting the Regulator
If you feel that your data has not been handled correctly or you are unhappy with our response to any requests you have made to us regarding the use of your data, you have the right to lodge a complaint with the Information Commissioners Office (ICO).
You can call them on 0303 123 1113

Or visit them online at www.ico.org.uk

If you are based outside the UK, you have the right to lodge your complaint with the relevant data protection regulator in your country of residence.
Any Questions?
We hope this Privacy Notice has been helpful in setting out the way we handle your data and your rights to control it.

If you have any questions that have not been covered, please contact our Data Protection Officer who will be pleased to help you.

  • Email – ask@isaacintel.com.
  • Or write to us at Data Protection Officer, ISAAC Intelligence Limited, 5 Crane Mews, Gould Road, Twickenham, TW2 6RS.
This notice was last updated on 25/04/2018
Changes to our privacy policy
Any changes we may make to our privacy policy in the future will be posted on our website(s) and, where appropriate, notified to you by e-mail.

This Acceptable Use Policy (“AUP”) governs your use of any services provided by ISAAC (“ISAAC Services”) and any use of ISAAC’s website.

By subscribing for or receiving any ISAAC Services, or by using our website, you agree to abide by the terms of this AUP, which will be incorporated into any agreement between you and ISAAC and shall apply to any use you make of our website.
Prohibited Uses – Overview
You may use the ISAAC Services only for lawful purposes. You may not use the ISAAC Services:
  • in any way that breaches any applicable local, national or international law or regulation;
  • in any way that is unlawful or fraudulent, or has any unlawful or fraudulent purpose or effect;
  • for the purpose of harming or attempting to harm anyone, including minors, or in any manner which will, or is likely to, infringe the personal rights of others;
  • in any manner that will, or is likely to, infringe the copyright, trademark, trade secret or other intellectual property rights of others;
  • to transmit, or procure the sending of, any unsolicited or unauthorised advertising or promotional material or any other form of similar solicitation or spam;
  • in connection with any defamatory, indecent, obscene, offensive, threatening, racist, homophobic, terrorist or abusive conduct or activity;
  • to knowingly transmit any data, send or upload any material that contains viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware, adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware; or
  • in any way that is inconsistent with the terms of your agreement with ISAAC.
Specific Prohibitions
Without prejudice to the generality of the overview principles set out above, unacceptable use includes, but is not limited to, the following:
  • Posting, transmission, re-transmission, or storing material on or through any of ISAAC’s Services, if ISAAC reasonably believes that such posting, transmission, re-transmission or storage is:
  • in violation of any local, national or international law or regulation (including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations);
  • threatening or abusive;
  • racist, homophobic;
  • promoting violence or terrorist acts;
  • obscene;
  • indecent; or
  • defamatory.
  • Installation or distribution of pirated or other software products that are not appropriately licensed for use.
  • Resale of ISAAC Services without the express prior written consent of ISAAC (unless you are an authorised Reseller).
  • Deceptive or fraudulent marketing practices.
  • Actions that restrict or inhibit anyone – whether a customer of ISAAC or otherwise – in his or her use or enjoyment of ISAAC Services, or that generate excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of internet services.
  • Introduction of malicious programs into the ISAAC network or servers or software (e.g., viruses, Trojan horses and worms).
  • Causing or attempting to cause security breaches or disruptions of internet communications. Examples of security breaches include but are not limited to accessing data of which the customer is not an intended recipient, or logging into a server or account that the customer is not expressly authorised to access (e.g., port scans, flood pings, packet spoofing and forged routing information).

  • Executing any form of network monitoring that will intercept data not intended for you.
  • Circumventing user authentication or security of any host, network or account.
  • Interfering with or denying service to any user other than the customer’s host (e.g., denial of service attack-DDOS).
  • Using any program/script/command, or sending messages of any kind, designed to interfere with, or to disable a user’s terminal session.
  • Failing to comply with ISAAC’s procedures relating to the activities of customers on ISAAC-owned facilities.
  • Furnishing false or incorrect data on the order form contract (electronic or paper) including fraudulent use of credit card numbers or attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilisation or other methods to document use of the ISAAC Services.
  • Sending unsolicited mail messages, including the sending of junk mail or other advertising material to individuals who did not specifically request such material, who were not previous customers of the customer or with whom the customer does not have an existing business relationship (e.g., e-mail spam).
  • Harassment (e.g., through language, frequency, or size of e-mail messages).
  • Unauthorised use or forging of mail header information.
  • Solicitations of mail or any other e-mail address other than that of the poster’s account or service, with the intent to harass or to collect replies.
  • Creating or forwarding chain letters or other pyramid schemes of any kind.
  • Use of unsolicited e-mail originating from within the ISAAC network or networks of other internet service providers on behalf of or to advertise any service hosted by ISAAC or connected via the ISAAC network.
  • Exporting, re-exporting, or permitting downloads of any content in violation of the export or import laws of the England and Wales or Scotland or without all required approvals, licenses and exemptions.
  • Use of IRC servers or bots connected to public IRC networks or servers.
  • Use or hosting of TOR or similar services aiming to provide anonymous internet access.
Security and Penetration Testing of ISAAC Managed Services
Any form of security testing (also known as penetration testing) on any system managed by ISAAC is subject to ISAAC’s prior written authorisation. The request for authorisation is to be submitted to ISAAC representative giving at least five (5) working days’ notice. Authorisation request should include the scope of the testing activity as well as planned start and end times. ISAAC technical teams will then review the request and identify the set of addresses / systems that can be included in the testing activity and issue an authorisation e-mail to the customer.
Enforcement
ISAAC will determine, in its discretion, whether there has been a breach of this AUP by you. When a breach of this policy has occurred, we may take such action as we deem appropriate.

Failure to comply with this AUP constitutes a material breach of your agreement with ISAAC under which you are permitted to use the ISAAC Services, and may result in our taking all or any of the following actions:

  • Immediate, temporary or permanent withdrawal of your right to use the ISAAC Services.
  • Immediate, temporary or permanent removal of any posting or material uploaded by you.
  • Issue of a written warning to you.
  • Legal proceedings against you for reimbursement of all costs on an indemnity basis (including, but not limited to, reasonable administrative and legal costs) resulting from the breach.
  • Further legal action against you as recommended by our lawyers.
  • Disclosure of such information to law enforcement authorities as we reasonably feel is necessary.
We exclude liability for actions taken in response to breaches of this AUP. The responses described in this policy are not limited, and we may take any other action we reasonably deem appropriate.
Changes to this Policy
We may revise this AUP at any time by publishing it on our webpage and will provide you with full details and a copy of the revised AUP. Amendments shall automatically come into effect 30 days from the date on which we provide you notice of the proposed revision. Some of the provisions contained in this AUP may also be superseded by provisions or notices published elsewhere on our website.
Waver and Severance
Any failure or delay in exercising or enforcing this policy shall not constitute a waiver of this policy or of any other right or remedy.

+44 (0) 20 3922 1222

ISAAC Intelligence Limited
5 Crane Mews
Gould Road
Twickenham
TW2 6RS

+61 (0) 2 9053 9703

ISAAC Intelligence PTY Ltd
310 Edward Street
Brisbane City
QLD 4000
Australia