KM Security Consulting Ltd. ("us", "we", or "our") appreciate the trust you place in us when sharing your personal data. The security of that data is very important to us. In this document, we will explain how we collect, use and protect your personal data.
We will also explain what rights you have with regards to your personal data and how you can exercise those rights.
Who we are
KM Security Consulting Ltd is the data controller for all personal data it collects, processes, stores, transmits and destroys. This means that KM Security Consulting Ltd determines what data is collected, how this data is going to be used and how this data is protected.
Our registered office address is:
KM Security Consulting Ltd.
2 The Dale
If you have questions about how we process personal data, or would like to exercise your data subject rights, please email us at email@example.com
Companies and services within scope
Collection of personal data
We collect personal data from you for one or more of the following purposes:
Lawful basis for the processing of personal data
We process your information on the basis of legitimate interest, which are aligned to the purposes described above.
No data will be shared with third parties, without your consent.
When we process on the lawful basis of legitimate interest, we apply the following test to determine whether it is appropriate:
Storage of personal data
KM Security Consulting is based in Ireland.
Our website www.kmsecurityconsulting.com is hosted in GoDaddy.com which has a registered address of GoDaddy.com, 14455 N Hayden Road, Suite 226, Scottsdale, Arizona, 85260, United Stated of America who are participating in the E.U-U.S and Swiss-U.S. Privacy Shield Frameworks.
Our email domain @kmsecurityconsulting.com and Fileshare data storage are hosted in Microsoft Office365 which is hosted in Microsoft's Data Centre in Dublin, Ireland.
We securely store your personal data either on our own storage systems or within our Microsoft Office365 data repositories, with controller access to such areas. Access to personal data is both electronic and paper form is restricted to staff who have a legitimate and justifiable reason to process such data.
We have what we believe are appropriate security controls in place to protect personal data. Risk assessment, including assessing risks to the rights and freedoms of data subjects, is at the heart of our information security management system (ISMS). We do not, however, have any control over what happens between your device and the boundary of our information infrastructure. You should be aware of the many information security risks that exist and take appropriate steps to safeguard your own information. We accept no liability in respect of breaches that occur beyond our sphere of control.
Your rights as a data subject
As a data subject whose personal information we hold, you have certain rights. If you wish to exercise any of these rights, please email firstname.lastname@example.org or use the information supplied in the Contact us section below. In order to process your request, we will ask you to provide two valid forms of identification for verification purposes. Your rights are as follows:
Alternatively, you can contact our Compliance Manager at the postal address above.
You have the right to lodge a complaint with the Data Protection Commission (Ireland) if you are unhappy with how your personal data is being handled.