This policy describes how this personal data must be collected, handled, and stored to meet the company’s data protection standards — and to comply with the law.

Why does this policy exist

This Data protection policy ensures The Tech Marketer:

  1. Complies with data protection law and follows good practice
  2. Protects the rights of staff, customers, and partners
  3. Is open about how it stores and processes individuals’ data
  4. Protects itself from the risks of a data breach

Data protection law

The Data Protection Act 1998 describes how organizations — including The Tech Marketer — must collect, handle and store personal information. These rules apply regardless of whether data is stored electronically, on paper, or on other materials. To comply with the law, personal information must be collected and used fairly, stored safely, and not disclosed unlawfully.

The Data Protection Act is underpinned by eight important principles. These say that personal data Be processed fairly and lawfully must:

  • Be obtained only for specific, lawful purpose
  • Be adequate, relevant, and not excessive
  • Be accurate and kept up to date
  • Not be held for any longer than necessary
  • Processed in accordance with the rights of data subjects
  • Be protected in appropriate ways

Not be transferred outside the European Economic Area (EEA), unless that country or territory also ensures an adequate level of protection

Policy scope

This policy applies to:

The head office of The Tech Marketer

  • All branches of The Tech Marketer
  • All staff and volunteers of The Tech Marketer
  • All contractors, suppliers, and other people working on behalf of The Tech Marketer It applies to all data that the company holds relating to identifiable individuals, even if that information technically falls outside of the Data Protection Act 1998. This can include:
  • Names of individuals
  • Postal addresses
  • Email addresses
  • Telephone numbers
  • Plus any other information relating to individuals Data protection risks

This policy helps to protect THE TECH MARKETER from some very real data security risks, including

Breaches of confidentiality. For instance, information is being given out inappropriately.
Failing to offer choice. For instance, all individuals should be free to choose how the company uses data relating to them.
Reputational damage. For instance, the company could suffer if hackers successfully gained access to sensitive data. Responsibilities Everyone who works for or with The Tech Marketer has some responsibility for ensuring data is collected, stored, and handled appropriately. Each team that handles personal data must ensure that it is handled and processed in line with this policy and data protection principles. However, these people have key areas of responsibility:
The board of directors is ultimately responsible for ensuring that “The Tech Marketer” and its “Affiliates” meets its legal obligations.
The data protection officer is responsible for:
Keeping the board updated about data protection responsibilities, risks, and issues.
Reviewing all data protection procedures and related policies, in line with an agreed schedule.
Arranging data protection training and advice for the people covered by this policy.
Handling data protection questions from staff and anyone else covered by this policy.
Dealing with requests from individuals to see the data The Tech Marketer holds about them (also called ‘subject access requests).
Checking and approving any contracts or agreements with third parties that
may handle the company’s sensitive data.
The IT manager is responsible for:
Ensuring all systems, services, and equipment used for storing data meet acceptable security standards.
Performing regular checks and scans to ensure security hardware and software are functioning properly.
Evaluating any third-party services, the company is considering using to store or process data. For instance, cloud computing services.
The marketing manager is responsible for:
Approving any data protection statements attached to communications such as emails and letters.
Addressing any data protection queries from journalists or media outlets like newspapers.
Where necessary, work with other staff to ensure marketing initiatives abide by data protection principles.


The only people able to access data covered by this policy should be those who need it for their work.
Data should not be shared informally. When access to confidential information is required, employees can request it from their line managers.
The Tech Marketer will provide training to all employees to help them understand their responsibilities when handling data.
Employees should keep all data secure, by taking sensible precautions and following the guidelines below.
In particular, strong passwords must be used and they should never be shared.
Personal data should not be disclosed to unauthorized people, either within the company or externally.
Data should be regularly reviewed and updated if it is found to be out of date. If no longer required, it should be deleted and disposed of.
Employees should request help from their line manager or the data protection officer if they are unsure about any aspect of data protection.


These rules describe how and where data should be safely stored. Questions about storing data safely can be directed to the IT manager or data controller. When data is stored on paper, it should be kept in a secure place where unauthorized people cannot see it.

These guidelines also apply to data that is usually stored electronically but has been printed out for some reason:

· When not required, the paper or files should be kept in a locked drawer or filing cabinet.
Employees should make sure paper and printouts are not left where unauthorized people could see them, like on a printer.
Data printouts should be shredded and disposed of securely when no longer required. When data is stored electronically, it must be protected from unauthorized access, accidental deletion, and malicious hacking attempts:
Data should be protected by strong passwords that are changed regularly and never shared between employees.
If data is stored on removable media (like a CD or DVD), these should be kept locked away securely when not being used.
Data should only be stored on designated drives and servers and should only be uploaded to approved cloud computing services.
Servers containing personal data should be sited in a secure location, away from general office space.
Data should be backed up frequently. Those backups should be tested regularly, in line with the company’s standard backup procedures.
Data should never be saved directly to laptops or other mobile devices like tablets or smartphones.
All servers and computers containing data should be protected by approved security software and a firewall.


Personal data is of no value to The Tech Marketer unless the business can make use of it. However, it is when personal data is accessed and used that it can be at the greatest risk of loss, corruption, or theft:

When working with personal data, employees should ensure the screens of their computers are always locked when left unattended.
Personal data should not be shared informally. It should never be sent by email, as this form of communication is not secure.
Data must be encrypted before being transferred electronically. The IT manager can explain how to send data to authorized external contacts.
Personal data should never be transferred outside of the European Economic Area.
Employees should not save copies of personal data to their own computers. Always access and update the central copy of any data.


The law requires The Tech Marketer to take reasonable steps to ensure data is kept accurate and up to date. The more important it is that the personal data is accurate, the greater the effort The Tech Marketer should put into ensuring its accuracy. It is the responsibility of all employees who work with data to take reasonable steps to ensure it is kept as accurate and up-to-date as possible.

Data will be held in as few places as necessary. Staff should not create any unnecessary additional data sets.
Staff should take every opportunity to ensure data is updated. For instance, by confirming a customer’s details when they call.
The Tech Marketer will make it easy for data subjects to update the information The Tech Marketer holds about them. For instance, via the company website.
Data should be updated as inaccuracies are discovered. For instance, if a customer can no longer be reached on their stored telephone number, it should be removed from the database.
It is the marketing manager’s responsibility to ensure marketing databases are checked against industry suppression files every six months.


All individuals who are the subject of personal data held by The Tech Marketer are entitled to:

Ask what information the company holds about them and why.
Ask how to gain access to it.
Be informed on how to keep it up to date.
Be informed of how the company is meeting its data protection obligations.
If an individual contacts the company requesting this information, this is called a subject access request. Subject access requests from individuals should be made by email, addressed to the data controller at, The data controller can supply a standard request form, although individuals do not have to use this.

The data controller will aim to provide the relevant data within 14 days. The data controller will always verify the identity of anyone making subject access requests before handing over any information.


In certain circumstances, the Data Protection Act allows personal data to be disclosed to law enforcement agencies without the consent of the data subject. Under these circumstances, The Tech Marketer will disclose the requested data. However, the data controller will ensure the request is legitimate, seeking assistance from the board and from the company’s legal advisers where necessary.


The Tech Marketer aims to ensure that individuals are aware that their data is being processed and that they understand:

How the data is being used
How to exercise their rights
To these ends, the company has a privacy statement, setting out how data relating to individuals is used by the company.

You can at any time change or withdraw your consent from the Cookie Declaration on our website.

Learn more about who we are, how you can contact us, and how we process personal data in our Privacy Policy.

Your consent applies to the following domains:

Your current state: Consent Accepted. Manage your consent.

What are cookies

Cookies are small text files that are used to store small pieces of information. The cookies are stored on your device when the website is loaded on your browser. These cookies help us make the website function properly, make the website more secure, provide a better user experience, understand how the website performs, and analyze what works and where it needs improvement.

How do we use cookies?

As most of the online services, our website uses cookies first party and third-party cookies for several purposes.

The first-party cookies are mostly necessary for the website to function the right way, and they do not collect any of your personally identifiable data.

The third-party cookies used on our websites are used mainly for understanding how the website performs, how you interact with our website, keeping our services secure, providing advertisements that are relevant to you, and all in all providing you with a better and improved user experience and help speed up your future interactions with our website.

Types of cookies do we use

Some cookies are essential for you to be able to experience the full functionality of our site. They allow us to maintain user sessions and prevent any security threats. They do not collect or store any personal information. For example, these cookies allow you to log-in to your account and add products to your basket and checkout securely.


These cookies store information like the number of visitors to the website, the number of unique visitors, which pages of the website have been visited, the source of the visit etc. These data help us understand and analyze how well the website performs and where it needs improvement.


Our website displays advertisements. These cookies are used to personalize the advertisements that we show to you so that they are meaningful to you. These cookies also help us keep track of the efficiency of these ad campaigns.

The information stored in these cookies may also be used by the third-party ad providers to show you ads on other websites on the browser as well.


These are the cookies that help certain non-essential functionalities on our website. These functionalities include embedding content like videos or sharing contents on the website on social media platforms.


These cookies help us store your settings and browsing preferences like language preferences so that you have a better and efficient experience on future visits to the website.

How can I control the cookie preferences?

Should you decide to change your preferences later through your browsing session, you can click on the “Privacy & Cookie Policy” tab on your screen. This will display the consent notice again enabling you to change your preferences or withdraw your consent entirely.

In addition to this, different browsers provide different methods to block and delete cookies used by websites. You can change the settings of your browser to block/delete the cookies.

Copyright Policy

Statement of Corporate Values

We at The Tech Marketer Pvt. Ltd. (“The Tech Marketer”) acknowledge and respect intellectual property rights and are dedicated to fulfilling our moral and legal obligations regarding the use of copyright-protected works. The Tech Marketer upholds the intellectual property rights of others and aims to maintain a platform that is free from content infringing upon those rights. Our guidelines and policies mandate that information posted by The Tech Marketer be accurate, lawful, and not infringe upon the rights of third parties. To advance these goals, The Tech Marketer provides a process for submitting complaints regarding content posted by The Tech Marketer. Our policy and procedures are outlined and/or referenced in the sections that follow.

The Tech Marketer will address notices of alleged copyright infringement that adhere to applicable law. If you believe any materials accessible on or from The Tech Marketer’s website infringe upon your copyright, you may request removal of those materials (or access to them) by submitting a written notification to our designated copyright agent provided below.

Please be aware that any notice or counter-notice you submit must be truthful and must be submitted under penalty of perjury. Providing false information may result in personal liability.

Claims Regarding Copyright Infringement

Under the Digital Millennium Copyright Act (17 U.S.C. 512), The Tech Marketer has established procedures for receiving written notification of alleged infringement. The Tech Marketer has also appointed an agent to receive notices of claimed copyright infringement. If you have a good faith belief that your copyright has been infringed, you may provide a written communication which includes:

  • your physical or electronic signature;
  • identification of the copyrighted work you believe has been infringed or, if the claim involves multiple works, a representative list of such works;
  • identification of the material you believe infringes upon the copyrighted work with enough detail for The Tech Marketer to locate it;
  • sufficient information for The Tech Marketer to contact you (including your name, postal address, telephone number, and email address);
  • a statement that you have a good faith belief that the use of the copyrighted material is not authorized by the copyright owner, its agent, or the law;
  • a statement that the information in the written notice is accurate; and
  • a statement, under penalty of perjury, that you are authorized to act on behalf of the copyright owner.

Please forward your notice to our designated copyright agent at

Failure to comply with all requirements of the Digital Millennium Copyright Act may render your notice ineffective. Be advised that knowingly misrepresenting that material or activity on The Tech Marketer’s website infringes upon your copyright may result in liability for damages (including costs and attorneys’ fees) under the Digital Millennium Copyright Act.


f you believe that a notice of copyright infringement has been erroneously filed against you, you may submit a Counter-Notice, in accordance with the provisions of the Digital Millennium Copyright Act, which must include:

your physical or electronic signature;
identification of the material that was removed or to which access was disabled, as well as its previous location;
adequate contact information for The Tech Marketer to reach you (including your name, postal address, telephone number, and email address);
A statement, under penalty of perjury, affirming that you have a good faith belief that the material identified above was removed or disabled as a result of mistake or misidentification;
A statement consenting to the jurisdiction of the Federal District Court in the judicial district where your address is located if in the United States, or if located outside the United States, consenting to jurisdiction and accepting service of process from the individual who provided the notice or their agent.

Please submit your Counter-Notice to The Tech Marketer’s copyright agent at or via email at

Repeat Infringers

In appropriate circumstances, it is our policy to deactivate and/or terminate the accounts of users who repeatedly infringe upon copyright. The Tech Marketer may also suspend or terminate user accounts if ordered to do so by a court of competent jurisdiction or in other appropriate circumstances, as determined by The Tech Marketer, in our sole discretion.

Content Policy

At The Tech Marketer, we are dedicated to fostering an inclusive platform where professionals, writers, and thought leaders from around the world can share diverse insights and narratives. Our mission is to cultivate an environment that promotes respectful and constructive dialogue while nurturing the exchange of ideas.

To maintain a safe and inclusive space, we have established guidelines that prohibit certain behaviors and content. When assessing potential breaches of our guidelines, we consider factors such as the significance and context of the content, the potential for harm, and legal requirements. Non-compliance with our guidelines may result in consequences, including limitations on account access or content suspension. The Tech Marketer reserves the right to exercise discretion and make final judgments on policy violations.


The Tech Marketer prohibits content that promotes violence or hate. We do not tolerate content or behavior that incites or endorses violence, harassment, or hatred based on characteristics such as race, ethnicity, religion, gender, sexual orientation, or disability. Additionally, we prohibit the glorification or trivialization of violence, abuse, or suffering, as well as the dissemination of intolerant or exclusionary ideologies.

Harassment, including bullying, mocking, or shaming, is strictly prohibited on our platform. We do not permit targeted harassment campaigns or the use of derogatory language or slurs to disparage individuals or groups.

Respect for privacy and reputation is paramount at The Tech Marketer. We prohibit the publication of private communications without consent and the sharing of sensitive or confidential information that may compromise personal safety or privacy.

Our platform does not condone certain restricted activities, including the promotion of controversial or extreme content, facilitation of illegal activities, or dissemination of harmful misinformation.

Graphic or explicit content, including pornographic material, is not allowed on The Tech Marketer. We advise users to exercise discretion when posting images and to avoid gratuitously graphic or disturbing content.

Duplicate content and spamming are prohibited on our platform. We do not permit the posting of identical content across multiple accounts or the use of automated interactions to manipulate engagement metrics.

Copyright and trademark infringement are taken seriously at The Tech Marketer. Users must have permission to post copyrighted material, and we do not tolerate plagiarism or unauthorized use of intellectual property.

Cryptocurrency-related content must comply with our guidelines, and users are advised to exercise caution when sharing financial advice or announcements.

Consequences of Policy Violation

Violation of our policies may result in account suspension, content removal, or other actions deemed necessary to maintain a safe and respectful community on The Tech Marketer.

Appeals Process

Users have the right to appeal decisions related to account suspension or content removal. Appeals should be submitted in good faith to, and we are committed to reviewing them thoroughly.

Reporting Violations

We encourage users to report any content or behavior that violates our policies. Reports can be submitted through the report button on our platform or by contacting .

Government Takedown Requests

In compliance with legal obligations, The Tech Marketer may restrict access to content in response to government takedown requests. We strive to provide notice to affected users whenever possible and submit requests to the appropriate authorities.

AI Content Disclaimer

The Tech Marketer employs AI technology to enhance content creation and streamline operations. While we endeavor to provide accurate information, users should exercise caution when relying solely on AI-generated content. We disclaim liability for errors or omissions in AI-generated content and reserve the right to modify or remove such content as needed.

User Agreement

By using The Tech Marketer platform, users agree to abide by our policies and guidelines. We are committed to transparency and open expression while maintaining a safe and inclusive environment for all users.

Do Not Sell My Information

Do Not Sell My Information

Do Not Sell My Information

Exercise your consumer right to opt out by completing the form below.

Translate »