1. Introduction
Welcome to Cipher Pixel! This Privacy Policy ("Policy") is designed to inform you about how Cipher Pixel ("we," "us," or "our") collects, uses, protects, and discloses your personal information when you interact with our website, services, or engage with us in any capacity. This Policy applies to all visitors, clients, and users of our services, whether you are accessing our website, signing a contract, or using our digital solutions. By accessing or using our services, you acknowledge that you have read, understood, and agree to the terms outlined in this Privacy Policy. If you do not agree with any part of this Policy, you must immediately cease using our services.
At Cipher Pixel, we are committed to safeguarding your privacy and ensuring the security of your personal information. This Policy explains the types of information we collect, the purposes for which we use it, and the measures we take to protect it. It also outlines your rights regarding your personal information and how you can exercise those rights. Please take the time to read this Policy carefully, as it governs your relationship with Cipher Pixel and your use of our services.
This Privacy Policy is subject to change at any time without prior notice. Cipher Pixel reserves the right to update, modify, or amend this Policy to reflect changes in our practices, legal requirements, or industry standards. Any significant changes will be communicated to you through our website or other appropriate channels. Your continued use of our services after such changes constitutes your acceptance of the updated Policy. It is your responsibility to review this Policy periodically to stay informed about how we are protecting your information.
This Policy is intended to comply with applicable data protection laws, including the UK General Data Protection Regulation (UK GDPR) and the Data Protection Act 2018. However, it is not a contractual agreement and does not create any legal obligations beyond those required by law. If you have any questions or concerns about this Privacy Policy or our data practices, please contact us using the information provided at the end of this document.
By engaging with Cipher Pixel, you consent to the collection, use, and disclosure of your personal information as described in this Policy. If you are acting on behalf of a company or organization, you represent and warrant that you have the authority to bind that entity to this Policy. Cipher Pixel reserves the right to refuse service to anyone who does not comply with this Policy or any other terms and conditions governing the use of our services.
2. Information We Collect
At Cipher Pixel, we collect various types of information to provide, maintain, and improve our services, ensure compliance with legal obligations, and protect the interests of both our clients and our business. The information we collect depends on your interactions with us, the services you use, and the choices you make. Below is a detailed explanation of the types of information we may collect:
2.1 Personal Information
Personal information refers to any data that can be used to identify you directly or indirectly. We may collect the following personal information:
- Contact Details: Your name, email address, phone number, and mailing address, which are necessary for communication, account creation, and service delivery.
- Account Information: Usernames, passwords, and other credentials used to access your account or our services.
- Demographic Information: Information such as your job title, company name, and industry, which helps us tailor our services to your needs.
- Identification Information: Government-issued identification numbers (e.g., VAT numbers) or other identifiers required for legal or contractual purposes.
This information is typically provided by you during account registration, project inquiries, or the signing of service agreements. We may also collect personal information from third-party sources, such as business partners or publicly available databases, where permitted by law.
2.2 Payment Information
To process payments for our services, we may collect the following payment-related information:
- Billing Details: Credit card numbers, bank account information, billing addresses, and other payment-related data necessary for processing transactions.
- Transaction Records: Details of payments made, including dates, amounts, and payment methods, which are retained for accounting and legal purposes.
We use secure payment processors to handle payment information, and we do not store sensitive payment details such as credit card numbers on our servers unless explicitly required for recurring payments or other legitimate business purposes.
2.3 Technical Information
When you interact with our website or services, we automatically collect technical information to enhance functionality, improve user experience, and ensure security. This includes:
- Device Information: Information about the device you use to access our services, such as the device type, operating system, and browser version.
- Log Data: Details of your interactions with our website, including IP addresses, access times, pages viewed, and actions taken.
- Cookies and Tracking Technologies: We use cookies, web beacons, and similar technologies to collect information about your browsing behavior, preferences, and session data. For more details, please refer to our Cookies Policy.
This technical information is collected to analyze trends, monitor website performance, and detect and prevent fraudulent activities.
2.4 Project-Related Information
When you engage us for a project, we may collect information related to the scope, requirements, and execution of the project. This includes:
- Project Details: Information about the project scope, objectives, timelines, and deliverables, as outlined in the Service Agreement or Statement of Work (SOW).
- Content and Materials: Files, documents, images, and other materials provided by you for the purpose of project execution.
- Communication Records: Emails, messages, and other communications exchanged between you and our team during the project lifecycle.
This information is essential for delivering our services, meeting contractual obligations, and ensuring project success.
2.5 Other Information
In addition to the above, we may collect other information as necessary for specific purposes, such as:
- Marketing Preferences: Your preferences regarding receiving marketing communications from us, including newsletters, promotions, and updates.
- Survey Responses: Feedback, opinions, and responses provided through surveys, questionnaires, or reviews.
- Legal and Compliance Data: Information required to comply with legal obligations, such as tax records, audit logs, or regulatory filings.
2.6 Sensitive Information
We do not intentionally collect sensitive personal information (e.g., racial or ethnic origin, political opinions, religious beliefs, health data) unless it is necessary for the provision of our services and you have provided explicit consent. If such information is collected, we will handle it in accordance with applicable laws and ensure appropriate safeguards are in place.
2.7 Children’s Information
Our services are not intended for individuals under the age of 16, and we do not knowingly collect personal information from children. If we become aware that we have inadvertently collected such information, we will take steps to delete it promptly.
2.8 Legal Basis for Collection
Under the UK GDPR, we rely on the following legal bases for collecting and processing your information:
- Contractual Necessity: To fulfill our obligations under a contract with you, such as providing the services outlined in a Service Agreement.
- Legitimate Interests: To operate and improve our business, protect our rights, and ensure the security of our services.
- Legal Obligations: To comply with applicable laws, regulations, or court orders.
- Consent: Where required by law, we will obtain your explicit consent before collecting or processing your information.
By providing your information, you acknowledge that we may collect, use, and disclose it in accordance with this Privacy Policy and applicable laws. If you have any questions about the information we collect or how it is used, please contact us at support@cipherKnights.com.
3. How We Use Your Information
At Cipher Pixel, we use the information we collect for a variety of purposes to ensure the effective delivery of our services, maintain the security of our systems, and comply with legal obligations. Below is a detailed explanation of how we use your information:
3.1 To Provide, Maintain, and Improve Our Services
We use your information to deliver the services you have requested, ensure their ongoing functionality, and continuously improve their quality. This includes:
- Service Delivery: Using project-related information, such as project scope, requirements, and materials, to execute and deliver the services outlined in our agreements.
- Account Management: Creating and managing your account, providing access to our platforms, and ensuring seamless interaction with our services.
- Service Enhancements: Analyzing usage patterns, feedback, and performance data to identify areas for improvement and develop new features or offerings.
3.2 To Process Payments and Fulfill Contractual Obligations
We use your payment information to process transactions, issue invoices, and fulfill our contractual obligations. This includes:
- Payment Processing: Using credit card details, bank account information, or other payment data to complete transactions and manage billing.
- Contract Fulfillment: Ensuring that all terms and conditions outlined in our Service Agreements or Statements of Work (SOW) are met, including delivering project deliverables and meeting deadlines.
- Financial Records: Maintaining accurate records of payments, invoices, and transactions for accounting and auditing purposes.
3.3 To Communicate with You
We use your contact information to communicate with you regarding various aspects of our services. This includes:
- Project Updates: Providing updates on project progress, milestones, and deliverables.
- Invoices and Billing: Sending invoices, payment reminders, and receipts for services rendered.
- Customer Support: Responding to your inquiries, resolving issues, and providing technical assistance.
- Service Notifications: Informing you about changes to our services, terms, or policies that may affect you.
3.4 To Personalize Your Experience
We use your information to tailor our services to your preferences and needs. This includes:
- Customized Content: Delivering content, recommendations, and offers that align with your interests and usage patterns.
- User Preferences: Remembering your preferences, such as language settings or notification preferences, to enhance your experience.
- Targeted Marketing: Using demographic and behavioral data to provide relevant marketing communications, where permitted by law and with your consent.
3.5 To Comply with Legal and Regulatory Requirements
We use your information to meet our legal and regulatory obligations. This includes:
- Tax and Financial Reporting: Maintaining records of transactions and payments to comply with tax laws and financial regulations.
- Legal Disputes: Using information to defend or assert our rights in legal proceedings, investigations, or disputes.
- Regulatory Compliance: Providing information to regulatory authorities or law enforcement agencies when required by law.
3.6 To Protect the Security and Integrity of Our Services
We use your information to safeguard our systems, prevent fraud, and ensure the security of our services. This includes:
- Fraud Prevention: Monitoring transactions and activities to detect and prevent fraudulent or unauthorized use of our services.
- System Security: Using technical information, such as IP addresses and device data, to identify and mitigate security threats.
- Incident Response: Investigating and responding to security incidents, data breaches, or other unauthorized access to our systems.
3.7 For Marketing and Promotional Purposes
With your consent, we may use your information for marketing and promotional activities. This includes:
- Newsletters and Updates: Sending you newsletters, product updates, and promotional offers.
- Surveys and Feedback: Inviting you to participate in surveys or provide feedback to improve our services.
- Event Invitations: Notifying you about webinars, workshops, or other events that may be of interest to you.
You can opt out of receiving marketing communications at any time by following the unsubscribe instructions included in our emails or contacting us directly.
3.8 For Research and Analytics
We use your information for research and analytics to improve our services and understand user behavior. This includes:
- Usage Analysis: Analyzing how users interact with our website and services to identify trends and improve functionality.
- Performance Metrics: Measuring the performance of our services and identifying areas for optimization.
- Market Research: Conducting research to understand market trends, customer needs, and competitive landscapes.
3.9 For Other Legitimate Business Purposes
We may use your information for other legitimate business purposes, such as:
- Business Operations: Managing our day-to-day operations, including staffing, training, and resource allocation.
- Partnerships and Collaborations: Sharing anonymized or aggregated data with business partners for collaborative projects or joint offerings.
- Corporate Transactions: Using information in connection with mergers, acquisitions, or other corporate transactions.
3.10 Legal Basis for Processing
Under the UK GDPR, we rely on the following legal bases for processing your information:
- Contractual Necessity: To fulfill our obligations under a contract with you, such as providing the services outlined in a Service Agreement.
- Legitimate Interests: To operate and improve our business, protect our rights, and ensure the security of our services.
- Legal Obligations: To comply with applicable laws, regulations, or court orders.
- Consent: Where required by law, we will obtain your explicit consent before processing your information for specific purposes, such as marketing.
We will not use your personal information for purposes other than those outlined in this Privacy Policy without your explicit consent. If you have any questions about how we use your information, please contact us at support@cipherKnights.com.
4. Data Sharing and Disclosure
At Cipher Pixel, we are committed to protecting your personal information and ensuring it is used only for the purposes outlined in this Privacy Policy. However, there are certain circumstances under which we may share or disclose your information to third parties. Below is a detailed explanation of these circumstances:
4.1 Service Providers
We may share your information with trusted third-party service providers who assist us in delivering our services and operating our business. These providers are contractually obligated to handle your information securely and only for the purposes specified by us. Examples of such service providers include:
- Payment Processors: Companies that handle payment transactions on our behalf, such as credit card processors or banking institutions.
- Hosting Providers: Third-party hosting services that store and manage our website, applications, and data.
- IT Support: Providers of technical support, maintenance, and infrastructure services.
- Marketing Agencies: Third parties that assist with marketing campaigns, email communications, and promotional activities.
- Analytics Providers: Companies that help us analyze website traffic, user behavior, and service performance.
We ensure that all service providers comply with applicable data protection laws and adhere to strict confidentiality and security standards.
4.2 Legal Compliance
We may disclose your information if required to do so by law, court order, or government regulation. This includes situations where:
- Legal Requests: We receive a valid legal request, such as a subpoena, warrant, or court order, requiring us to disclose your information.
- Regulatory Requirements: We are obligated to provide information to regulatory authorities, tax agencies, or other government bodies to comply with legal or financial reporting requirements.
- Fraud Prevention: We disclose information to law enforcement or regulatory agencies to prevent, investigate, or prosecute fraudulent or illegal activities.
In such cases, we will disclose only the information necessary to comply with the legal obligation and will take steps to ensure that the request is valid and lawful.
4.3 Business Transfers
In the event of a merger, acquisition, sale of assets, or other corporate transaction, your information may be transferred to the new entity as part of the transaction. This includes situations where:
- Mergers and Acquisitions: If Cipher Pixel is acquired by or merges with another company, your information may be transferred to the new owner as part of the business assets.
- Asset Sales: If we sell or transfer a portion of our business or assets, your information may be included in the transfer to the new owner.
In such cases, we will notify you of the transfer and ensure that the new entity adheres to the terms of this Privacy Policy or provides you with a comparable level of protection for your information.
4.4 Protection of Rights
We may disclose your information to protect our rights, property, or safety, or that of our clients, employees, or the public. This includes situations where:
- Legal Disputes: We disclose information to defend or assert our rights in legal proceedings, investigations, or disputes.
- Security Threats: We share information to prevent or respond to security incidents, data breaches, or other unauthorized access to our systems.
- Harm Prevention: We disclose information to prevent physical harm, financial loss, or other damages to individuals or property.
4.5 With Your Consent
We may share your information with third parties if you provide explicit consent for such sharing. For example:
- Collaborative Projects: If you agree to participate in a collaborative project with a third party, we may share relevant information to facilitate the collaboration.
- Marketing Partnerships: If you consent to receive marketing communications from our partners, we may share your information with them for this purpose.
You can withdraw your consent at any time by contacting us at support@cipherKnights.com.
4.6 Anonymized or Aggregated Data
We may share anonymized or aggregated data with third parties for research, analytics, or other purposes. This data does not identify you personally and is used to analyze trends, improve services, or develop new offerings. Examples include:
- Market Research: Sharing aggregated data with research firms to analyze industry trends.
- Performance Metrics: Providing anonymized usage statistics to business partners or investors.
4.7 International Data Transfers
In some cases, your information may be transferred to and processed in countries outside the UK, including countries that may not have the same data protection laws as the UK. When this occurs, we take steps to ensure that your information is protected, including:
- Standard Contractual Clauses: Using contractual agreements that require third parties to provide an adequate level of protection for your information.
- Adequacy Decisions: Transferring data only to countries that have been deemed to provide adequate data protection by the UK government.
By using our services, you consent to such international data transfers.
4.8 Third-Party Links
Our website or services may contain links to third-party websites or services. We are not responsible for the privacy practices or content of these third parties. We encourage you to review their privacy policies before providing any personal information.
4.9 No Sale of Personal Information
We do not sell, rent, or trade your personal information to third parties for marketing purposes. Any sharing of your information is done in accordance with this Privacy Policy and applicable laws.
4.10 Legal Basis for Sharing
Under the UK GDPR, we rely on the following legal bases for sharing your information:
- Contractual Necessity: To fulfill our obligations under a contract with you, such as providing the services outlined in a Service Agreement.
- Legitimate Interests: To operate and improve our business, protect our rights, and ensure the security of our services.
- Legal Obligations: To comply with applicable laws, regulations, or court orders.
- Consent: Where required by law, we will obtain your explicit consent before sharing your information with third parties.
If you have any questions about how we share or disclose your information, please contact us at support@cipherKnights.com.
5. Data Security
At Cipher Pixel, we prioritize the security of your personal information and have implemented robust measures to protect it from unauthorized access, disclosure, alteration, or destruction. We are committed to maintaining the confidentiality, integrity, and availability of your data in compliance with applicable data protection laws, including the UK GDPR and the Data Protection Act 2018. Below is a detailed explanation of the security measures we have in place:
5.1 Encryption
We use industry-standard encryption technologies to protect your data both during transmission and while at rest. This includes:
- Data in Transit: All data transmitted between your device and our servers is encrypted using Secure Socket Layer (SSL) or Transport Layer Security (TLS) protocols. This ensures that sensitive information, such as login credentials and payment details, cannot be intercepted or accessed by unauthorized parties.
- Data at Rest: Sensitive data stored on our servers, such as personal information and payment records, is encrypted using advanced encryption algorithms to prevent unauthorized access.
5.2 Access Controls
We implement strict access controls to ensure that only authorized personnel can access your information. These measures include:
- Role-Based Access: Access to personal information is restricted based on job roles and responsibilities. Only employees who need the information to perform their duties are granted access.
- Multi-Factor Authentication (MFA): We require multi-factor authentication for accessing sensitive systems and data, adding an extra layer of security beyond passwords.
- Regular Access Reviews: We conduct periodic reviews of access permissions to ensure that only authorized individuals have access to your information.
5.3 Security Audits and Vulnerability Assessments
We regularly conduct security audits and vulnerability assessments to identify and address potential risks to your data. These activities include:
- Penetration Testing: Simulating cyberattacks to identify vulnerabilities in our systems and applications.
- Code Reviews: Reviewing our software code to ensure it adheres to security best practices and is free from vulnerabilities.
- Third-Party Audits: Engaging independent security firms to assess our systems and processes for compliance with industry standards and regulations.
5.4 Incident Response and Monitoring
We have established procedures to detect, respond to, and mitigate security incidents. These include:
- 24/7 Monitoring: Continuously monitoring our systems for suspicious activity or potential security breaches.
- Incident Response Plan: A well-defined plan to respond to security incidents, including data breaches, to minimize impact and restore normal operations as quickly as possible.
- Breach Notification: In the event of a data breach that poses a risk to your rights and freedoms, we will notify you and the relevant regulatory authorities within the timeframes required by law.
5.5 Employee Training and Awareness
We recognize that human error is a significant factor in data security incidents. To mitigate this risk, we provide regular training and awareness programs for our employees, including:
- Data Protection Training: Educating employees on their responsibilities under the UK GDPR and other applicable data protection laws.
- Phishing Awareness: Training employees to recognize and avoid phishing attacks and other social engineering tactics.
- Security Best Practices: Promoting best practices for data security, such as strong password management and secure handling of sensitive information.
5.6 Third-Party Security
When we engage third-party service providers, we ensure they adhere to strict security standards. This includes:
- Due Diligence: Conducting thorough assessments of third-party security practices before engaging their services.
- Contractual Obligations: Requiring third parties to sign data processing agreements that outline their security responsibilities and compliance with applicable laws.
- Ongoing Monitoring: Regularly reviewing third-party security practices to ensure continued compliance.
5.7 Physical Security
We also implement physical security measures to protect your data, including:
- Secure Facilities: Restricting access to our offices and data centers to authorized personnel only.
- Surveillance Systems: Using CCTV and other surveillance systems to monitor and secure our premises.
- Environmental Controls: Protecting our data centers with fire suppression systems, temperature controls, and backup power supplies.
5.8 Limitations of Security Measures
While we take extensive measures to protect your data, it is important to recognize that no method of transmission over the internet or electronic storage is 100% secure. Despite our best efforts, we cannot guarantee absolute security. Factors beyond our control, such as sophisticated cyberattacks or human error, may result in unauthorized access to your information. However, we are committed to continuously improving our security practices and responding promptly to any incidents that may arise.
5.9 Your Role in Data Security
You also play a critical role in protecting your information. We recommend the following best practices:
- Strong Passwords: Use strong, unique passwords for your accounts and change them regularly.
- Secure Devices: Ensure that the devices you use to access our services are protected with up-to-date antivirus software and security patches.
- Avoid Phishing: Be cautious of unsolicited emails or messages requesting personal information and verify the authenticity of the sender before responding.
5.10 Reporting Security Concerns
If you believe that your data has been compromised or if you have any concerns about the security of our services, please contact us immediately at support@cipherKnights.com. We take all security concerns seriously and will investigate promptly.
By using our services, you acknowledge that while we strive to protect your data, no system is entirely immune to risks. We are committed to maintaining the highest standards of data security and will continue to invest in measures to safeguard your information.
6. Data Retention
At Cipher Pixel, we are committed to retaining your personal information only for as long as necessary to fulfill the purposes outlined in this Privacy Policy, unless a longer retention period is required by law. Our data retention practices are designed to balance the need to provide high-quality services, comply with legal obligations, and protect your privacy. Below is a detailed explanation of our data retention policies:
6.1 General Retention Principles
We follow these principles when determining how long to retain your information:
- Purpose Limitation: We retain your information only for the specific purposes for which it was collected, such as providing services, processing payments, or complying with legal obligations.
- Minimization: We retain only the minimum amount of information necessary to achieve the intended purpose.
- Legal Compliance: We retain information for as long as required by applicable laws, regulations, or contractual obligations.
- Dispute Resolution: We retain information for a reasonable period after the completion of a project or service to resolve potential disputes or claims.
6.2 Retention Periods for Specific Types of Information
The retention period for your information depends on the type of data and the purpose for which it was collected. Below are examples of how long we retain different categories of information:
6.2.1 Project-Related Information
We retain project-related information, such as project scope, requirements, and deliverables, for the duration of the project and for a reasonable period thereafter. This includes:
- Active Projects: Information is retained for the duration of the project to ensure effective service delivery and communication.
- Post-Project Retention: After project completion, we retain information for a period of [X years/months] to address any follow-up requests, resolve disputes, or comply with legal obligations.
6.2.2 Payment Information
We retain payment information, such as invoices, transaction records, and billing details, as required by financial regulations and tax laws. This includes:
- Financial Records: Payment information is retained for [X years] to comply with tax and accounting regulations, such as those outlined in the UK’s Companies Act and HMRC requirements.
- Audit Purposes: Payment records may be retained for longer periods if required for audit or compliance purposes.
6.2.3 Account Information
We retain account information, such as usernames, passwords, and contact details, for as long as your account is active. If you deactivate your account, we may retain this information for a period of [X years/months] to comply with legal obligations or resolve disputes.
6.2.4 Communication Records
We retain records of communications, such as emails and messages, for a period of [X years/months] to ensure effective communication and address any follow-up requests or disputes.
6.2.5 Marketing Information
If you have consented to receive marketing communications, we retain your contact information for as long as you remain subscribed. You can unsubscribe at any time, and we will remove your information from our marketing databases within [X days] of your request.
6.2.6 Legal and Compliance Data
We retain information required for legal or compliance purposes for the duration specified by applicable laws or regulations. This includes:
- Tax Records: Retained for [X years] as required by HMRC.
- Contractual Records: Retained for [X years] after the termination of a contract to resolve disputes or claims.
- Regulatory Filings: Retained for the period specified by regulatory authorities.
6.3 Secure Deletion and Anonymization
Once the retention period expires, we securely delete or anonymize your information to ensure it can no longer be linked to you. This process includes:
- Secure Deletion: Using industry-standard methods to permanently erase data from our systems and backups.
- Anonymization: Removing personally identifiable information from datasets so that the remaining data cannot be used to identify you.
6.4 Exceptions to Retention Periods
In certain circumstances, we may retain your information for longer than the specified retention periods. These exceptions include:
- Legal Holds: If your information is subject to a legal hold, such as a court order or regulatory investigation, we will retain it until the hold is lifted.
- Dispute Resolution: If you are involved in a dispute or claim, we may retain relevant information until the matter is resolved.
- Fraud Prevention: If your information is relevant to an ongoing fraud investigation, we may retain it until the investigation is complete.
6.5 Your Rights Regarding Data Retention
Under the UK GDPR, you have the right to request the deletion of your personal information in certain circumstances, such as when the information is no longer necessary for the purposes for which it was collected. To exercise this right, please contact us at support@cipherKnights.com.
6.6 Review and Updates to Retention Policies
We regularly review our data retention policies to ensure they remain compliant with applicable laws and aligned with industry best practices. If we make changes to our retention periods, we will update this Privacy Policy and notify you of any significant changes.
By using our services, you acknowledge that we retain your information in accordance with this Privacy Policy and applicable laws. If you have any questions about our data retention practices, please contact us at support@cipherKnights.com.
7. Your Rights
Under applicable data protection laws, including the UK General Data Protection Regulation (UK GDPR) and the Data Protection Act 2018, you have specific rights regarding your personal information. These rights are designed to give you control over how your data is collected, used, and shared. Below is a detailed explanation of your rights and how you can exercise them:
7.1 Right to Access
You have the right to request a copy of the personal information we hold about you. This is often referred to as a "Subject Access Request" (SAR). Upon receiving a valid request, we will provide:
- Details of the Information: A description of the personal information we hold, the purposes for which it is being processed, and the categories of recipients to whom it has been disclosed.
- Copy of the Data: A copy of the personal information in a commonly used electronic format, unless providing it in another format would be more appropriate.
We will respond to your request within one month of receipt, unless the request is complex or numerous, in which case we may extend the response period by an additional two months. If we require an extension, we will notify you within one month of receiving your request.
7.2 Right to Correction
You have the right to request that we correct any inaccurate or incomplete personal information we hold about you. This includes:
- Updating Information: Correcting errors in your contact details, payment information, or other personal data.
- Completing Information: Adding missing information to ensure your records are accurate and up to date.
We will respond to your request within one month and notify any third parties with whom we have shared your information, unless this is impossible or involves disproportionate effort.
7.3 Right to Deletion
You have the right to request that we delete your personal information in certain circumstances, such as when:
- The Data is No Longer Necessary: The information is no longer needed for the purposes for which it was collected.
- Withdrawal of Consent: You withdraw your consent for processing, and there is no other legal basis for continuing to process the data.
- Objection to Processing: You object to the processing, and there are no overriding legitimate grounds for continuing.
- Unlawful Processing: The data has been processed unlawfully.
However, we may refuse your request if we are required to retain the information to comply with legal obligations, resolve disputes, or enforce agreements.
7.4 Right to Object
You have the right to object to the processing of your personal information for certain purposes, including:
- Direct Marketing: You can object to the use of your information for direct marketing purposes at any time. If you object, we will stop processing your information for this purpose immediately.
- Legitimate Interests: You can object to processing based on legitimate interests. If you do so, we will stop processing unless we can demonstrate compelling legitimate grounds that override your interests, rights, and freedoms.
7.5 Right to Restrict Processing
You have the right to request that we restrict the processing of your personal information in certain circumstances, such as when:
- Accuracy is Disputed: You contest the accuracy of the data, and we are verifying its accuracy.
- Processing is Unlawful: You oppose the deletion of unlawfully processed data and request restriction instead.
- Data is No Longer Needed: We no longer need the data, but you require it to establish, exercise, or defend legal claims.
If processing is restricted, we will store your information but not use it further unless you consent or it is necessary for legal claims.
7.6 Right to Data Portability
You have the right to receive your personal information in a structured, commonly used, and machine-readable format and to transfer it to another controller where:
- Processing is Based on Consent or Contract: The processing is based on your consent or a contract with you.
- Processing is Automated: The processing is carried out by automated means.
We will provide your data free of charge in a commonly used format, such as CSV or JSON, unless the request is manifestly unfounded or excessive.
7.7 Right to Withdraw Consent
If we process your personal information based on your consent, you have the right to withdraw your consent at any time. Withdrawing consent does not affect the lawfulness of processing based on consent before its withdrawal. To withdraw consent, please contact us at support@cipherKnights.com.
7.8 Right to Lodge a Complaint
If you believe that we have not complied with applicable data protection laws, you have the right to lodge a complaint with the Information Commissioner’s Office (ICO), the UK’s supervisory authority for data protection. You can contact the ICO at:
- Website: https://ico.org.uk
- Phone: 0303 123 1113
- Address: Information Commissioner’s Office, Wycliffe House, Water Lane, Wilmslow, Cheshire, SK9 5AF
7.9 Exercising Your Rights
To exercise any of your rights, please contact us at support@cipherKnights.com. We may require you to provide proof of identity, such as a copy of your passport or driver’s license, to verify your request. This is to ensure that your personal information is not disclosed to unauthorized individuals.
7.10 Fees and Timelines
We will respond to your requests free of charge and within one month of receipt. However, if your request is complex or numerous, we may extend the response period by an additional two months and notify you of the delay. If your request is manifestly unfounded or excessive, we may charge a reasonable fee or refuse to act on the request.
7.11 Limitations on Rights
Your rights are not absolute and may be limited in certain circumstances, such as when:
- Legal Obligations Apply: We are required to retain or process your information to comply with legal obligations.
- Public Interest Overrides: Processing is necessary for reasons of public interest, such as public health or scientific research.
- Legitimate Interests Prevail: Our legitimate interests override your rights and freedoms.
By using our services, you acknowledge that you have read and understood your rights under applicable data protection laws. If you have any questions or concerns about your rights, please contact us at support@cipherKnights.com.
8. Cookies and Tracking Technologies
At Cipher Pixel, we use cookies and similar tracking technologies to enhance your experience on our website, analyze user behavior, and improve the functionality of our services. This section provides detailed information about the types of cookies and tracking technologies we use, their purposes, and how you can manage or disable them.
8.1 What Are Cookies?
Cookies are small text files that are stored on your device (computer, smartphone, or tablet) when you visit a website. They are widely used to make websites work more efficiently, improve user experience, and provide insights into how the website is being used. Cookies can be either:
- Session Cookies: Temporary cookies that are deleted when you close your browser.
- Persistent Cookies: Cookies that remain on your device for a set period or until you delete them.
8.2 Types of Cookies We Use
We use the following categories of cookies on our website:
8.2.1 Strictly Necessary Cookies
These cookies are essential for the operation of our website and enable you to navigate and use its features. Without these cookies, certain services, such as logging into your account or making payments, may not function properly. Examples include:
- Cookies that remember your login session.
- Cookies that enable secure payment processing.
8.2.2 Performance Cookies
These cookies collect information about how visitors use our website, such as which pages are visited most often or if users encounter error messages. This helps us improve the performance and functionality of our website. Examples include:
- Cookies used by analytics tools like Google Analytics to track website traffic and user behavior.
- Cookies that monitor the performance of our website during high traffic periods.
8.2.3 Functionality Cookies
These cookies allow our website to remember choices you make (such as your language preference or region) and provide enhanced, personalized features. Examples include:
- Cookies that remember your preferred language or currency settings.
- Cookies that store your preferences for website layout or theme.
8.2.4 Targeting and Advertising Cookies
These cookies are used to deliver relevant advertisements to you based on your interests and browsing behavior. They also help us measure the effectiveness of our marketing campaigns. Examples include:
- Cookies used by third-party advertising networks to display targeted ads.
- Cookies that track whether you have clicked on an ad or completed a purchase after viewing an ad.
8.3 Third-Party Cookies
We may allow third-party service providers to place cookies on your device to provide specific services or features. These third parties are responsible for their own cookies and tracking technologies, and their use is governed by their respective privacy policies. Examples of third-party cookies include:
- Google Analytics: Used to analyze website traffic and user behavior.
- Social Media Platforms: Used to enable social sharing buttons and track interactions with social media content.
- Advertising Networks: Used to deliver targeted ads and measure ad performance.
8.4 How We Use Tracking Technologies
In addition to cookies, we may use other tracking technologies, such as:
- Web Beacons: Small graphic images embedded in emails or web pages to track user activity.
- Pixel Tags: Used to measure the effectiveness of marketing campaigns and understand user behavior.
- Local Storage: Used to store data on your device for faster loading and improved performance.
8.5 Legal Basis for Using Cookies
Under the UK GDPR and the Privacy and Electronic Communications Regulations (PECR), we rely on the following legal bases for using cookies and tracking technologies:
- Consent: For non-essential cookies, such as performance, functionality, and targeting cookies, we obtain your explicit consent before placing them on your device.
- Legitimate Interests: For strictly necessary cookies, we rely on our legitimate interests in providing a functional and secure website.
8.6 Managing and Disabling Cookies
You have the right to manage or disable cookies through your browser settings. Most web browsers allow you to:
- Block or delete cookies.
- Set preferences for specific websites.
- Receive notifications when cookies are being used.
However, disabling cookies may limit your ability to use certain features of our website, such as logging into your account or making payments. For more information on how to manage cookies, please refer to your browser’s help documentation.
8.7 Cookie Consent
When you first visit our website, we will display a cookie consent banner that allows you to:
- Accept all cookies.
- Reject non-essential cookies.
- Customize your cookie preferences.
You can change your cookie preferences at any time by accessing the cookie settings on our website.
8.8 Changes to Our Cookie Policy
We may update our use of cookies and tracking technologies from time to time to reflect changes in our practices, legal requirements, or industry standards. If we make significant changes, we will notify you through our website or other communication channels and obtain your consent where required.
8.9 Contact Us
If you have any questions or concerns about our use of cookies and tracking technologies, please contact us at support@cipherKnights.com.
9. Third-Party Links
Our website may contain links to third-party websites, applications, or services that are not owned or controlled by Cipher Pixel. These links are provided for your convenience and reference, and they may include social media platforms, payment processors, advertising networks, or other external resources. This section explains our relationship with third-party links, your responsibilities when accessing them, and how we ensure compliance with applicable data protection laws.
9.1 Nature of Third-Party Links
Third-party links on our website may include, but are not limited to:
- Social Media Platforms: Links to our official social media profiles on platforms such as Facebook, Twitter, LinkedIn, or Instagram.
- Payment Processors: Links to third-party payment gateways, such as PayPal or Stripe, for processing transactions.
- Advertising Networks: Links to third-party advertising platforms that display targeted ads on our website.
- Resource Websites: Links to external resources, such as blogs, articles, or tools, that may be relevant to your interests.
These links are provided for informational purposes or to enhance your experience on our website. However, we do not endorse or assume responsibility for the content, privacy practices, or security of these third-party websites.
9.2 No Control Over Third-Party Practices
Cipher Pixel does not own or control third-party websites, applications, or services linked from our website. As such, we are not responsible for:
- Privacy Practices: The way third parties collect, use, or disclose your personal information.
- Content Accuracy: The accuracy, completeness, or reliability of the content on third-party websites.
- Security Measures: The security measures implemented by third parties to protect your information.
We encourage you to review the privacy policies, terms of use, and security practices of any third-party websites you visit before providing any personal information or engaging with their services.
9.3 Third-Party Data Collection
When you click on a third-party link, you may be directed to a website or service that collects your personal information independently of Cipher Pixel. This may include:
- Cookies and Tracking Technologies: Third parties may use cookies, web beacons, or other tracking technologies to collect information about your browsing behavior.
- Form Submissions: Third parties may collect information you provide through forms, such as your name, email address, or payment details.
- Analytics Data: Third parties may collect data about your interactions with their website or service for analytics or marketing purposes.
Any information you provide to third parties is subject to their privacy policies and practices, not ours. We recommend that you read their policies carefully to understand how they handle your information.
9.4 No Liability for Third-Party Actions
Cipher Pixel shall not be liable for any loss, damage, or harm arising from your use of third-party websites, applications, or services. This includes, but is not limited to:
- Data Breaches: Any unauthorized access, disclosure, or misuse of your personal information by third parties.
- Fraudulent Activities: Any fraudulent or malicious activities conducted by third parties.
- Service Interruptions: Any interruptions, errors, or downtime experienced on third-party websites or services.
By accessing third-party links, you acknowledge and agree that Cipher Pixel is not responsible for any consequences resulting from your interactions with third parties.
9.5 Recommendations for Safe Browsing
To protect your personal information and ensure a safe browsing experience, we recommend the following best practices when accessing third-party links:
- Review Privacy Policies: Always read the privacy policy of the third-party website before providing any personal information.
- Verify Website Authenticity: Ensure that the website is legitimate and secure by checking for HTTPS in the URL and looking for trust seals or certifications.
- Avoid Sharing Sensitive Information: Be cautious about sharing sensitive information, such as passwords or financial details, on third-party websites.
- Use Security Software: Install and regularly update antivirus and anti-malware software on your device to protect against online threats.
9.6 Changes to Third-Party Links
We may update or remove third-party links on our website from time to time without prior notice. This may be due to changes in our business relationships, the relevance of the links, or updates to our website content. However, we are not responsible for maintaining or updating the content of third-party websites.
9.7 Contacting Third Parties
If you have any questions or concerns about a third-party website or service, please contact the third party directly using the contact information provided on their website. Cipher Pixel cannot mediate or resolve disputes between you and third parties.
9.8 Compliance with UK Law
While we strive to ensure that third-party links on our website comply with applicable laws and regulations, we cannot guarantee their compliance. If you believe that a third-party website linked from our website violates UK law, including data protection laws, please contact us at support@cipherKnights.com. We will investigate the matter and take appropriate action, which may include removing the link from our website.
9.9 Your Acknowledgment
By using our website and accessing third-party links, you acknowledge and agree that:
- Cipher Pixel is not responsible for the privacy practices, content, or security of third-party websites.
- Your interactions with third parties are at your own risk.
- You are responsible for reviewing the privacy policies and terms of use of third-party websites before providing any personal information.
9.10 Contact Us
If you have any questions or concerns about third-party links on our website, please contact us at support@cipherKnights.com.
10. Children’s Privacy
At Cipher Pixel, we are committed to protecting the privacy of all individuals, especially children. Our services are designed for individuals aged 16 and above, and we do not knowingly collect, use, or disclose personal information from individuals under the age of 16. This section outlines our approach to children’s privacy, the steps we take to ensure compliance with applicable laws, and how we handle any inadvertent collection of children’s data.
10.1 Age Restrictions
Our services, including our website, applications, and digital solutions, are intended for use by individuals aged 16 and above. By accessing or using our services, you represent and warrant that you are at least 16 years old. If you are under the age of 16, you must not use our services or provide any personal information to us.
10.2 No Intentional Collection of Children’s Data
We do not knowingly collect, store, or process personal information from individuals under the age of 16. This includes, but is not limited to:
- Personal Identifiers: Names, email addresses, phone numbers, or other contact details.
- Payment Information: Credit card details, bank account information, or other financial data.
- Technical Information: IP addresses, device identifiers, or browsing behavior.
If we become aware that we have inadvertently collected personal information from a child under the age of 16, we will take immediate steps to delete such information from our systems.
10.3 Parental Responsibility
Parents and legal guardians play a critical role in protecting their children’s privacy online. We encourage parents and guardians to:
- Monitor Online Activity: Supervise their children’s use of the internet and ensure they do not access websites or services intended for adults.
- Educate Children: Teach children about the importance of privacy and the risks of sharing personal information online.
- Use Parental Controls: Implement parental control tools or software to restrict access to inappropriate content or services.
10.4 Reporting Inadvertent Collection
If you believe that we have inadvertently collected personal information from a child under the age of 16, please contact us immediately at support@cipherKnights.com. Provide as much detail as possible, including:
- The child’s name and age.
- The type of information collected.
- How the information was collected (e.g., through a form submission or account creation).
We will investigate the matter promptly and take all necessary steps to delete the information from our systems.
10.5 Compliance with UK Law
Our approach to children’s privacy is designed to comply with applicable UK laws, including:
- UK GDPR: Under the UK GDPR, the processing of personal data of children under the age of 16 requires parental consent unless otherwise permitted by law.
- Data Protection Act 2018: This Act reinforces the principles of the UK GDPR and provides additional safeguards for children’s data.
- Children’s Code (Age-Appropriate Design Code): This code sets out standards for online services likely to be accessed by children, ensuring that their best interests are prioritized.
While our services are not intended for children, we take additional precautions to ensure compliance with these laws.
10.6 Age Verification
To prevent the collection of personal information from children, we implement age verification measures, such as:
- Account Creation: Requiring users to confirm that they are at least 16 years old when creating an account.
- Form Submissions: Including age verification fields in forms that collect personal information.
- Third-Party Tools: Using third-party age verification tools or services where appropriate.
However, no age verification method is foolproof, and we rely on users to provide accurate information.
10.7 No Liability for Misrepresentation
Cipher Pixel shall not be liable for any misrepresentation of age by users. If a child under the age of 16 provides false information to access our services, we cannot be held responsible for any consequences arising from such actions. Parents and guardians are encouraged to monitor their children’s online activities and ensure compliance with age restrictions.
10.8 Education and Awareness
We are committed to promoting online safety and privacy for children. This includes:
- Providing Resources: Sharing educational resources and tips for parents and guardians on how to protect children’s privacy online.
- Raising Awareness: Participating in initiatives and campaigns that promote online safety for children.
- Collaborating with Experts: Working with child protection organizations and experts to develop best practices for children’s privacy.
10.9 Changes to Children’s Privacy Policy
We may update our approach to children’s privacy from time to time to reflect changes in our services, legal requirements, or industry standards. If we make significant changes, we will notify users through our website or other communication channels.
10.10 Contact Us
If you have any questions or concerns about our children’s privacy practices, please contact us at support@cipherKnights.com.
11. International Data Transfers
At Cipher Pixel, we operate globally and may need to transfer your personal information to countries outside the United Kingdom (UK) for processing and storage. This section explains how and why international data transfers occur, the safeguards we implement to protect your information, and your rights regarding such transfers.
11.1 Why International Transfers Occur
Your personal information may be transferred to and processed in countries outside the UK for the following reasons:
- Global Operations: We have offices, data centers, or service providers located in multiple countries to support our global operations.
- Third-Party Services: We use third-party service providers, such as cloud hosting providers, payment processors, and analytics platforms, that may operate outside the UK.
- Client Requirements: If you are located outside the UK or request services that involve international collaboration, your data may need to be transferred to other jurisdictions.
11.2 Countries Involved in Data Transfers
Your personal information may be transferred to and processed in countries that include, but are not limited to:
- European Economic Area (EEA): Countries within the EEA are considered to provide an adequate level of data protection under UK law.
- United States: We may transfer data to the US, where many of our third-party service providers are based.
- Other Countries: Data may also be transferred to other countries where we have operations or engage service providers.
11.3 Safeguards for International Transfers
To ensure that your personal information is protected during international transfers, we implement the following safeguards:
11.3.1 Adequacy Decisions
If we transfer your data to a country that has been deemed to provide an adequate level of data protection by the UK government (e.g., EEA countries), no additional safeguards are required. These countries are considered to have data protection laws that are equivalent to the UK GDPR.
11.3.2 Standard Contractual Clauses (SCCs)
For transfers to countries without an adequacy decision, we use Standard Contractual Clauses (SCCs) approved by the UK government. These are legally binding agreements that require the recipient to protect your data in accordance with UK data protection standards.
11.3.3 Binding Corporate Rules (BCRs)
If we transfer data within our corporate group, we may use Binding Corporate Rules (BCRs) to ensure consistent protection of your data across all entities.
11.3.4 Additional Safeguards
In addition to the above, we may implement additional safeguards, such as:
- Data Encryption: Encrypting data during transmission and storage to prevent unauthorized access.
- Access Controls: Restricting access to your data to authorized personnel only.
- Regular Audits: Conducting regular audits of third-party service providers to ensure compliance with data protection standards.
11.4 Your Consent to International Transfers
By using our services, you consent to the transfer of your personal information to countries outside the UK, including countries that may not have the same data protection laws as the UK. This consent is necessary for us to provide our services effectively and fulfill our contractual obligations.
11.5 Your Rights Regarding International Transfers
Under the UK GDPR, you have the following rights regarding international data transfers:
- Right to Information: You have the right to be informed about the countries to which your data is transferred and the safeguards in place.
- Right to Object: You may object to the transfer of your data to certain countries if you believe it poses a risk to your rights and freedoms.
- Right to Restrict Processing: You may request that we restrict the processing of your data if you have concerns about international transfers.
To exercise these rights, please contact us at support@cipherKnights.com.
11.6 Third-Party Transfers
When we engage third-party service providers located outside the UK, we ensure they adhere to strict data protection standards. This includes:
- Data Processing Agreements: Requiring third parties to sign agreements that outline their responsibilities for protecting your data.
- Compliance with UK Law: Ensuring that third parties comply with the UK GDPR and other applicable data protection laws.
- Ongoing Monitoring: Regularly reviewing third-party practices to ensure continued compliance.
11.7 Risks of International Transfers
While we take extensive measures to protect your data during international transfers, it is important to recognize that transferring data to countries outside the UK may involve certain risks, such as:
- Different Legal Standards: Countries outside the UK may have different data protection laws and enforcement mechanisms.
- Government Access: Foreign governments may have the authority to access data stored within their jurisdiction.
We strive to minimize these risks by implementing robust safeguards and working with trusted third parties.
11.8 Changes to International Transfer Practices
We may update our international data transfer practices from time to time to reflect changes in our operations, legal requirements, or industry standards. If we make significant changes, we will notify you through our website or other communication channels.
11.9 Contact Us
If you have any questions or concerns about international data transfers, please contact us at support@cipherKnights.com.
12. Changes to This Privacy Policy
At Cipher Pixel, we are committed to maintaining the highest standards of data protection and privacy. As part of this commitment, we may update this Privacy Policy from time to time to reflect changes in our practices, legal requirements, or industry standards. This section explains how and why we may update the Privacy Policy, how we will notify you of changes, and what your rights and responsibilities are in relation to these updates.
12.1 Reasons for Updates
We may update this Privacy Policy for the following reasons:
- Legal and Regulatory Changes: To comply with new or amended laws, regulations, or guidelines, such as updates to the UK GDPR, the Data Protection Act 2018, or other applicable legislation.
- Operational Changes: To reflect changes in our business operations, such as the introduction of new services, technologies, or processes that affect how we collect, use, or protect your information.
- Industry Standards: To align with evolving industry standards or best practices for data protection and privacy.
- User Feedback: To address feedback or concerns from users regarding our data practices.
12.2 Types of Changes
Changes to this Privacy Policy may include, but are not limited to:
- Clarifications: Updating the language or structure of the policy to make it clearer and easier to understand.
- New Practices: Adding information about new data collection or processing practices, such as the use of new technologies or third-party services.
- Enhanced Safeguards: Introducing additional measures to protect your information, such as new encryption methods or access controls.
- User Rights: Expanding or clarifying your rights under applicable data protection laws.
12.3 Notification of Changes
We will notify you of significant changes to this Privacy Policy through one or more of the following methods:
- Website Notice: Posting a prominent notice on our website, such as a banner or pop-up, to inform you of the changes.
- Email Notification: Sending an email to the address associated with your account, outlining the key changes and their implications.
- In-App Alerts: Displaying notifications within our applications or platforms, if applicable.
- Other Communication Channels: Using other communication methods, such as SMS or postal mail, if necessary.
We will provide advance notice of significant changes whenever possible, allowing you time to review the updated policy and understand how it affects you.
12.4 Your Acceptance of Changes
Your continued use of our services after the effective date of the updated Privacy Policy constitutes your acceptance of the changes. This means that:
- Implied Consent: By continuing to use our services, you agree to the updated terms and conditions outlined in the revised Privacy Policy.
- No Additional Consent Required: Unless required by law, we will not seek additional consent for changes that do not materially affect your rights or the way we process your information.
If you do not agree with the changes, you must stop using our services and contact us to discuss your concerns.
12.5 Reviewing the Updated Policy
We encourage you to review the updated Privacy Policy carefully to understand how your information is being collected, used, and protected. Key sections to pay attention to include:
- Data Collection: Any changes to the types of information we collect or the purposes for which it is used.
- Data Sharing: Updates to how and with whom your information is shared.
- User Rights: Changes to your rights under applicable data protection laws.
- Security Measures: New or enhanced measures to protect your information.
12.6 Historical Versions
We maintain a record of previous versions of this Privacy Policy for your reference. If you would like to review a historical version, please contact us at support@cipherKnights.com.
12.7 Legal Compliance
All changes to this Privacy Policy will be made in compliance with applicable UK laws, including the UK GDPR and the Data Protection Act 2018. This includes ensuring that any changes that materially affect your rights or the way we process your information are communicated clearly and transparently.
12.8 Contact Us
If you have any questions or concerns about changes to this Privacy Policy, please contact us at support@cipherKnights.com.
13. Contact Us
At Cipher Pixel, we are committed to addressing your questions, concerns, and requests regarding your personal information and our data practices. This section provides detailed information on how you can contact us, the types of inquiries we handle, and what you can expect when you reach out to us.
13.1 How to Contact Us
If you have any questions or concerns about this Privacy Policy, our data practices, or your rights under applicable data protection laws, you can contact us using the following methods:
- Email: support@cipherKnights.com
- Phone: +44 7459 107834
- Postal Address: Cipher Pixel, LE1 6FF
We recommend using email for non-urgent inquiries, as it allows us to provide a detailed and accurate response. For urgent matters, please call us during our business hours.
13.2 Types of Inquiries We Handle
We are available to assist you with a wide range of inquiries, including but not limited to:
- Privacy Policy Questions: Clarifications about this Privacy Policy, its terms, or its implications.
- Data Access Requests: Requests to access the personal information we hold about you (Subject Access Requests).
- Data Correction Requests: Requests to correct or update inaccurate or incomplete personal information.
- Data Deletion Requests: Requests to delete your personal information, subject to legal obligations.
- Objections to Processing: Requests to object to the processing of your personal information for specific purposes.
- Complaints: Concerns or complaints about how we handle your personal information.
- Security Concerns: Reports of potential data breaches, unauthorized access, or other security issues.
13.3 What to Include in Your Inquiry
To help us address your inquiry promptly and effectively, please provide the following information when contacting us:
- Your Full Name: So we can verify your identity and ensure your information is handled securely.
- Contact Information: Your email address, phone number, or postal address so we can respond to you.
- Details of Your Inquiry: A clear description of your question, concern, or request, including any relevant context or supporting information.
- Account Information (if applicable): If your inquiry relates to an account or service, please provide your username, account number, or other identifying details.
13.4 Response Times
We strive to respond to all inquiries as quickly as possible. Our typical response times are as follows:
- General Inquiries: We aim to respond within 2 business days.
- Data Subject Requests: We will acknowledge receipt of your request within 1 business day and provide a full response within 1 month, as required by the UK GDPR. If your request is complex, we may extend the response period by an additional 2 months and notify you of the delay.
- Urgent Matters: For urgent inquiries, such as security concerns, we will prioritize your request and respond as soon as possible.
13.5 Verification of Identity
To protect your personal information, we may need to verify your identity before processing certain requests, such as data access or deletion requests. This may involve:
- Requesting Documentation: Asking you to provide a copy of a government-issued ID, such as a passport or driver’s license.
- Security Questions: Asking you to answer security questions related to your account or personal information.
We will only use this information to verify your identity and will not store it longer than necessary.
13.6 Complaints and Disputes
If you are not satisfied with our response to your inquiry or believe that we have not complied with applicable data protection laws, you have the right to lodge a complaint with the Information Commissioner’s Office (ICO), the UK’s supervisory authority for data protection. You can contact the ICO at:
- Website: https://ico.org.uk
- Phone: 0303 123 1113
- Address: Information Commissioner’s Office, Wycliffe House, Water Lane, Wilmslow, Cheshire, SK9 5AF
13.7 Feedback and Suggestions
We welcome your feedback and suggestions on how we can improve our Privacy Policy or data practices. If you have any ideas or recommendations, please share them with us at support@cipherKnights.com.
13.8 Business Hours
Our customer support team is available during the following business hours:
- Monday to Friday: 9:00 AM to 5:00 PM (GMT)
- Weekends and Public Holidays: Closed
Inquiries received outside of business hours will be addressed on the next business day.
13.9 Data Protection Officer (DPO)
If you wish to contact our Data Protection Officer (DPO) directly regarding data protection matters, please email dpo@cipherKnights.com.
13.10 Updates to Contact Information
If our contact information changes, we will update this section of the Privacy Policy and notify you through our website or other communication channels.
13.11 Your Acknowledgment
By contacting us, you acknowledge that we may need to collect and process your personal information to respond to your inquiry. This information will be handled in accordance with this Privacy Policy and applicable data protection laws.
13.12 Contact Us
If you have any questions or concerns about this Privacy Policy or our data practices, please contact us at:
Cipher Pixel
Email: support@cipherKnights.com
Phone: +44 7459 107834