Home General Data Protection Policy

General Data Protection Policy

by thetechmarketer

This policy describes how this personal data must be collected, handled, and stored to meet the company’s data protection standards — and to comply with the law.

Why does this policy exist

This data protection policy ensures The Tech Marketer:

  1. Complies with data protection law and follows good practice
  2. Protects the rights of staff, customers, and partners
  3. Is open about how it stores and processes individuals’ data
  4. Protects itself from the risks of a data breach

Data protection law

The Data Protection Act 1998 describes how organizations — including The Tech Marketer — must collect, handle and store personal information. These rules apply regardless of whether data is stored electronically, on paper, or on other materials. To comply with the law, personal information must be collected and used fairly, stored safely, and not disclosed unlawfully.

The Data Protection Act is underpinned by eight important principles. These say that personal data Be processed fairly and lawfully must:

  1. Be obtained only for specific, lawful purposes
  2. Be adequate, relevant, and not excessive
  3. Be accurate and kept up to date
  4. Not be held for any longer than necessary
  5. Processed in accordance with the rights of data subjects
  6. Be protected in appropriate ways
  7. Not be transferred outside the European Economic Area (EEA), unless that country or territory also ensures an adequate level of protection


Policy scope

This policy applies to:

  1. The head office of The Tech Marketer
  2. All branches of The Tech Marketer
  3. All staff and volunteers of The Tech Marketer
  4. All contractors, suppliers, and other people working on behalf of The Tech Marketer It applies to all data that the company holds relating to identifiable individuals, even if that information technically falls outside of the Data Protection Act 1998. This can include:
    • Names of individuals
    • Postal addresses
    • Email addresses
    • Telephone numbers
    • Plus any other information relating to individuals

Data protection risks

This policy helps to protect THE TECH MARKETER from some very real data security risks, including

  1. Breaches of confidentiality. For instance, information is being given out inappropriately.
  2. Failing to offer choice. For instance, all individuals should be free to choose how the company uses data relating to them.
  3. Reputational damage. For instance, the company could suffer if hackers successfully gained access to sensitive data. Responsibilities Everyone who works for or with The Tech Marketer has some responsibility for ensuring data is collected, stored, and handled appropriately. Each team that handles personal data must ensure that it is handled and processed in line with this policy and data protection principles. However, these people have key areas of responsibility:
  4. The board of directors is ultimately responsible for ensuring that “The Tech Marketer” and its “Affiliates” meets its legal obligations.
  5. The data protection officer is responsible for:
    • Keeping the board updated about data protection responsibilities, risks, and issues.
    • Reviewing all data protection procedures and related policies, in line with an agreed schedule.
    • Arranging data protection training and advice for the people covered by this policy.
    • Handling data protection questions from staff and anyone else covered by this policy.
    • Dealing with requests from individuals to see the data The Tech Marketer holds about them (also called ‘subject access requests).
    • Checking and approving any contracts or agreements with third parties that
      may handle the company’s sensitive data.
  6. The IT manager is responsible for:
    • Ensuring all systems, services, and equipment used for storing data meet acceptable security standards.
    • Performing regular checks and scans to ensure security hardware and software are functioning properly.
    • Evaluating any third-party services, the company is considering using to store or process data. For instance, cloud computing services.
  7. The marketing manager is responsible for:
    • Approving any data protection statements attached to communications such as emails and letters.
    • Addressing any data protection queries from journalists or media outlets like newspapers.
    • Where necessary, work with other staff to ensure marketing initiatives abide by data protection principles.


      1. The only people able to access data covered by this policy should be those who need it for their work.
      2. Data should not be shared informally. When access to confidential information is required, employees can request it from their line managers.
      3. The Tech Marketer will provide training to all employees to help them understand their responsibilities when handling data.
      4. Employees should keep all data secure, by taking sensible precautions and following the guidelines below.
      5. In particular, strong passwords must be used and they should never be shared.
      6. Personal data should not be disclosed to unauthorized people, either within the company or externally.
      7. Data should be regularly reviewed and updated if it is found to be out of date. If no longer required, it should be deleted and disposed of.
      8. Employees should request help from their line manager or the data protection officer if they are unsure about any aspect of data protection.


These rules describe how and where data should be safely stored. Questions about storing data safely can be directed to the IT manager or data controller. When data is stored on paper, it should be kept in a secure place where unauthorized people cannot see it.

These guidelines also apply to data that is usually stored electronically but has been printed out for some reason:

  1. · When not required, the paper or files should be kept in a locked drawer or filing cabinet.
  2. Employees should make sure paper and printouts are not left where unauthorized people could see them, like on a printer.
  3. Data printouts should be shredded and disposed of securely when no longer required. When data is stored electronically, it must be protected from unauthorized access, accidental deletion, and malicious hacking attempts:
  4. Data should be protected by strong passwords that are changed regularly and never shared between employees.
  5. If data is stored on removable media (like a CD or DVD), these should be kept locked away securely when not being used.
  6. Data should only be stored on designated drives and servers and should only be uploaded to approved cloud computing services.
  7. Servers containing personal data should be sited in a secure location, away from general office space.
  8. Data should be backed up frequently. Those backups should be tested regularly, in line with the company’s standard backup procedures.
  9. Data should never be saved directly to laptops or other mobile devices like tablets or smartphones.
  10. All servers and computers containing data should be protected by approved security software and a firewall.


Personal data is of no value to The Tech Marketer unless the business can make use of it. However, it is when personal data is accessed and used that it can be at the greatest risk of loss, corruption, or theft:

  1. When working with personal data, employees should ensure the screens of their computers are always locked when left unattended.
  2. Personal data should not be shared informally. It should never be sent by email, as this form of communication is not secure.
  3. Data must be encrypted before being transferred electronically. The IT manager can explain how to send data to authorized external contacts.
  4. Personal data should never be transferred outside of the European Economic Area.
  5. Employees should not save copies of personal data to their own computers. Always access and update the central copy of any data.


The law requires The Tech Marketer to take reasonable steps to ensure data is kept accurate and up to date. The more important it is that the personal data is accurate, the greater the effort The Tech Marketer should put into ensuring its accuracy. It is the responsibility of all employees who work with data to take reasonable steps to ensure it is kept as accurate and up-to-date as possible.

  1. Data will be held in as few places as necessary. Staff should not create any unnecessary additional data sets.
  2. Staff should take every opportunity to ensure data is updated. For instance, by confirming a customer’s details when they call.
  3. The Tech Marketer will make it easy for data subjects to update the information The Tech Marketer holds about them. For instance, via the company website.
  4. Data should be updated as inaccuracies are discovered. For instance, if a customer can no longer be reached on their stored telephone number, it should be removed from the database.
  5. It is the marketing manager’s responsibility to ensure marketing databases are checked against industry suppression files every six months.


All individuals who are the subject of personal data held by The Tech Marketer are entitled to:

  1. Ask what information the company holds about them and why.
  2. Ask how to gain access to it.
  3. Be informed on how to keep it up to date.
  4. Be informed of how the company is meeting its data protection obligations.

If an individual contacts the company requesting this information, this is called a subject access request. Subject access requests from individuals should be made by email, addressed to the data controller at info@thetechmarketer.com, The data controller can supply a standard request form, although individuals do not have to use this.

The data controller will aim to provide the relevant data within 14 days. The data controller will always verify the identity of anyone making subject access requests before handing over any information.


In certain circumstances, the Data Protection Act allows personal data to be disclosed to law enforcement agencies without the consent of the data subject. Under these circumstances, The Tech Marketer will disclose the requested data. However, the data controller will ensure the request is legitimate, seeking assistance from the board and from the company’s legal advisers where necessary.


The Tech Marketer aims to ensure that individuals are aware that their data is being processed and that they understand:

  1. How the data is being used
  2. How to exercise their rights

To these ends, the company has a privacy statement, setting out how data relating to individuals is used by the company.

You can at any time change or withdraw your consent from the Cookie Declaration on our website.

Learn more about who we are, how you can contact us, and how we process personal data in our Privacy Policy.

Your consent applies to the following domains: thetechmarketer.com

Your current state: Consent Accepted. Manage your consent.

  • What are cookies

Cookies are small text files that are used to store small pieces of information. The cookies are stored on your device when the website is loaded on your browser. These cookies help us make the website function properly, make the website more secure, provide a better user experience, understand how the website performs, and analyze what works and where it needs improvement.

  • How do we use cookies?

As most of the online services, our website uses cookies first party and third-party cookies for several purposes.

The first-party cookies are mostly necessary for the website to function the right way, and they do not collect any of your personally identifiable data.

The third-party cookies used on our websites are used mainly for understanding how the website performs, how you interact with our website, keeping our services secure, providing advertisements that are relevant to you, and all in all providing you with a better and improved user experience and help speed up your future interactions with our website.

  • Types of cookies do we use


Some cookies are essential for you to be able to experience the full functionality of our site. They allow us to maintain user sessions and prevent any security threats. They do not collect or store any personal information. For example, these cookies allow you to log-in to your account and add products to your basket and checkout securely.


These cookies store information like the number of visitors to the website, the number of unique visitors, which pages of the website have been visited, the source of the visit etc. These data help us understand and analyze how well the website performs and where it needs improvement.


Our website displays advertisements. These cookies are used to personalize the advertisements that we show to you so that they are meaningful to you. These cookies also help us keep track of the efficiency of these ad campaigns.

The information stored in these cookies may also be used by the third-party ad providers to show you ads on other websites on the browser as well.


These are the cookies that help certain non-essential functionalities on our website. These functionalities include embedding content like videos or sharing contents on the website on social media platforms.


These cookies help us store your settings and browsing preferences like language preferences so that you have a better and efficient experience on future visits to the website.

How can I control the cookie preferences?

Should you decide to change your preferences later through your browsing session, you can click on the “Privacy & Cookie Policy” tab on your screen. This will display the consent notice again enabling you to change your preferences or withdraw your consent entirely.

In addition to this, different browsers provide different methods to block and delete cookies used by websites. You can change the settings of your browser to block/delete the cookies.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More