This Privacy Notice explains in detail the types of personal data we may collect about you when you interact with us. It also explains how we’ll store and handle that data and keep it safe.
For the purpose of the General Data Protection Regulation 2018 (GDPR), ISAAC is both a data controller and a data processor:
- Data Controller; when managing data that we ourselves collect and store within our systems. For example, business customer and supplier information held within our CRM and employee information held within our HR system.
- Data Processor; when analysing data that our customers provide to us during the normal course of business. For example, when trouble-shooting or analysing customer systems data.
For example, we may use your browsing history to send you or make available specific offers, based upon your interests
We also combine the browsing and purchase history of many businesses to identify trends and ensure we can continue to develop new solutions and services.
We will also use your email address details to send you direct marketing information by email, telling you about solutions and services that we think might interest you.
- When you visit any of our websites, for example www.isaacintelligence.com.
- When you register to use any of our sites, or subscribe to our services, our blog, newsletter, 14-day free trials or webinars for example.
- When you post material or request further services or information from our sites.
- When you contact us by any means with queries, complaints or support requests.
- When you engage with us on social media.
- When you purchase a solution or service from us.
- When you arrange a demo, or book an appointment with us.
- When you choose to complete any surveys we send you.
- When you have given a third-party permission to share with us the information they hold about you.
- When we collect information from publicly-available sources where you have provided your consent to share information or where the information is made public as a matter of law.
- When using the services provided by ISAAC.
- Your name, business email address, company address (trading and registered), your business telephone numbers (landline and mobile), orders, payment receipts.
- Details of your interactions with us, through our sales team, contact centres and support and technical teams. For example, we collect notes from our conversations with you, details of any faults, complaints or requirements.
- Details of your visits to our websites or apps, and which site you came from to ours.
- Your social media username if you interact with us through those channels, to help us to respond to your comments, questions or feedback.
We then use this information to offer you insights, research, promotions, solutions and services that are most likely to interest you. The data privacy law allows this as part of our legitimate interest in understanding our customers and providing the highest levels of service and innovation.
If at any time you wish to change how we use your data, you can contact us to either unsubscribe from any future marketing communications or request us to remove your data entirely, which we are obliged to do as part of the new data privacy law in-line with our legal and regulatory responsibilities.
- To process any orders that you make by using our websites, or in person via direct contact with our sales, technical or support teams, or via email request. If we don’t collect your data and comply with our legal obligations, we won’t be able to process your orders.
- To keep you informed by email, web, telephone and occasionally text and through our contact centres about relevant solutions and services including tailored offers, promotions, events and so on.
- To develop, test and improve the solutions, systems and solutions we provide you. We’ll do this on the basis of our legitimate business interests.
- To comply with our contractual or legal obligations to share data with law enforcement.
- To build a rich picture of who you and your business are, your interests and requirements. To inform our business decisions we will combine data from throughout our business (Sales and Support for example) and from third-parties and data from publicly available lists as we have previously described. We will do this on the basis of our legitimate business interest.
- To notify you about changes to our service.
- We provide only the information they need to perform their specific services.
- They may only use your data for the exact purposes we specify in our contract with them.
- We work closely with them to ensure that your privacy is respected and protected at all times.
- If we stop using their services, any of your data held by them will either be deleted or rendered anonymous.
- Technology partners who support our business systems and solutions. For example, Microsoft, Amazon Web Services.
- Operational companies such as delivery couriers.
- Direct marketing companies who help us manage our electronic communications with you.
- Social Media companies, such as Twitter, Google, LinkedIn to show you solutions and services that may interest you while browsing the internet.
- Data insight companies to ensure your details are up to date and accurate.
- We never do this.
- Access to the data we hold about you, free of charge in most cases.
- The correction of your data when incorrect, out of date or incomplete. For example, when you object to our use of your data on the basis of legitimate interest, or once the purpose for which we hold the data has come to an end.
- That we stop using your data for direct marketing.
Or visit them online at www.ico.org.uk
If you have any questions that have not been covered, please contact our Data Protection Officer who will be pleased to help you.
- Email – email@example.com.
- Or write to us at Data Protection Officer, ISAAC Intelligence Limited, Suite 111 Parkshot House, 5 Kew Road, Richmond, UK, TW9 2PR.
This Acceptable Use Policy (“AUP”) governs your use of any services provided by ISAAC (“ISAAC Services”) and any use of ISAAC’s website.
- in any way that breaches any applicable local, national or international law or regulation;
- in any way that is unlawful or fraudulent, or has any unlawful or fraudulent purpose or effect;
- for the purpose of harming or attempting to harm anyone, including minors, or in any manner which will, or is likely to, infringe the personal rights of others;
- in any manner that will, or is likely to, infringe the copyright, trademark, trade secret or other intellectual property rights of others;
- to transmit, or procure the sending of, any unsolicited or unauthorised advertising or promotional material or any other form of similar solicitation or spam;
- in connection with any defamatory, indecent, obscene, offensive, threatening, racist, homophobic, terrorist or abusive conduct or activity;
- to knowingly transmit any data, send or upload any material that contains viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware, adware or any other harmful programs or similar computer code designed to adversely affect the operation of any computer software or hardware; or
- in any way that is inconsistent with the terms of your agreement with ISAAC.
- Posting, transmission, re-transmission, or storing material on or through any of ISAAC’s Services, if ISAAC reasonably believes that such posting, transmission, re-transmission or storage is:
- in violation of any local, national or international law or regulation (including rights protected by copyright, trade secret, patent or other intellectual property or similar laws or regulations);
- threatening or abusive;
- racist, homophobic;
- promoting violence or terrorist acts;
- indecent; or
- Installation or distribution of pirated or other software products that are not appropriately licensed for use.
- Resale of ISAAC Services without the express prior written consent of ISAAC (unless you are an authorised Reseller).
- Deceptive or fraudulent marketing practices.
- Actions that restrict or inhibit anyone – whether a customer of ISAAC or otherwise – in his or her use or enjoyment of ISAAC Services, or that generate excessive network traffic through the use of automated or manual routines that are not related to ordinary personal or business use of internet services.
- Introduction of malicious programs into the ISAAC network or servers or software (e.g., viruses, Trojan horses and worms).
- Executing any form of network monitoring that will intercept data not intended for you.
- Circumventing user authentication or security of any host, network or account.
- Interfering with or denying service to any user other than the customer’s host (e.g., denial of service attack-DDOS).
- Using any program/script/command, or sending messages of any kind, designed to interfere with, or to disable a user’s terminal session.
- Failing to comply with ISAAC’s procedures relating to the activities of customers on ISAAC-owned facilities.
- Furnishing false or incorrect data on the order form contract (electronic or paper) including fraudulent use of credit card numbers or attempting to circumvent or alter the processes or procedures to measure time, bandwidth utilisation or other methods to document use of the ISAAC Services.
- Sending unsolicited mail messages, including the sending of junk mail or other advertising material to individuals who did not specifically request such material, who were not previous customers of the customer or with whom the customer does not have an existing business relationship (e.g., e-mail spam).
- Harassment (e.g., through language, frequency, or size of e-mail messages).
- Unauthorised use or forging of mail header information.
- Solicitations of mail or any other e-mail address other than that of the poster’s account or service, with the intent to harass or to collect replies.
- Creating or forwarding chain letters or other pyramid schemes of any kind.
- Use of unsolicited e-mail originating from within the ISAAC network or networks of other internet service providers on behalf of or to advertise any service hosted by ISAAC or connected via the ISAAC network.
- Exporting, re-exporting, or permitting downloads of any content in violation of the export or import laws of the England and Wales or Scotland or without all required approvals, licenses and exemptions.
- Use of IRC servers or bots connected to public IRC networks or servers.
- Use or hosting of TOR or similar services aiming to provide anonymous internet access.
Causing or attempting to cause security breaches or disruptions of internet communications. Examples of security breaches include but are not limited to accessing data of which the customer is not an intended recipient, or logging into a server or account that the customer is not expressly authorised to access (e.g., port scans, flood pings, packet spoofing and forged routing information).
Failure to comply with this AUP constitutes a material breach of your agreement with ISAAC under which you are permitted to use the ISAAC Services, and may result in our taking all or any of the following actions:
- Immediate, temporary or permanent withdrawal of your right to use the ISAAC Services.
- Immediate, temporary or permanent removal of any posting or material uploaded by you.
- Issue of a written warning to you.
- Legal proceedings against you for reimbursement of all costs on an indemnity basis (including, but not limited to, reasonable administrative and legal costs) resulting from the breach.
- Further legal action against you as recommended by our lawyers.
- Disclosure of such information to law enforcement authorities as we reasonably feel is necessary.