How do I make a complaint?
If you do have a concern or complaint, please contact us as soon as you are aware of the problem. You can contact us by:
Email: management@toparound.com
Post:
Top Around Media
71-75 Shelton St
Covent Garden
London
WC2H 9JQ
Please include the following information:
What happens next?
We will send you a letter acknowledging receipt of your complaint within 10 days of receiving the complaint, detailing our procedure and who will be responding to the complaint.
We will do our best to resolve your complaint fully within 21 days of sending you the acknowledgement letter.
Here at Top Around, we take privacy seriously. That is why we take every possible precaution to protect personal data, and actively work to avoid any data protection breaches which could compromise our data security, or the personal rights of our clients, customers, stakeholders or anyone else associated with our company.
To mitigate the risk that any such data compromise could pose, we have developed the following data breach policy. It is an integral part of our compliance responsibilities under the General Data Protection Regulation and Data Protection Act 2018, and is designed to develop clear lines of responsibility and processes that must be followed to adequately mitigate and manage data breach and security incidents.
The scope of this data breach policy encompasses all personal and sensitive data our company holds. This data breach policy applies to everyone at our company – including employees, temporary or casual staff, consultants, suppliers, contractors, freelance workers or other data processors who are storing or processing data on the behalf of our company.
What is the purpose of this policy?
The purpose of this data breach policy is to contain all data breaches and to minimise the risks associated with any breaches. It also outlines the actions that should be taken in the event of a breach to ensure data is secure and to prevent further breaches.
About data breaches
A data breach is defined as any incident, event or action that has the potential to compromise the availability of data, the integrity of data, confidentiality or our company’s data systems. This includes incidents or events that happen by accident or deliberately. Both confirmed and suspected incidents may qualify as a data breach.
For the purposes of this data breach policy, an incident may include (but is not limited to) any of the following:
· Unauthorised use or accessing of data
· Unauthorised modification of data
· Loss of personal or sensitive data
· Theft of personal or sensitive data
· Loss or theft of equipment on which data has been stored
· Individual error
· Any attempts to gain access to data or our company IT systems (both successful or failed)
· Defacement of web property
· Physical incidents, like a fire, which could compromise IT systems
All employees who access, manage or use data in any way are responsible for reporting a data breach or any other type of security incident. This report should be made immediately to the employee’s line manager, using the data breach reporting form.
This report must include full details of the incident or breach, when it occurred, who the data relates to and how. It must also include details about the individual reporting the incident.
If a data breach or a data security incident occurs outside of normal company hours, or a data breach or data security incident is discovered outside of normal company hours, it must be reported as soon as possible.
Any violation of this data breach policy could result in disciplinary action procedures taking place for company employees.
All necessary steps must be immediately carried out to minimise the effects of any data security breach or data security incident. This process of containment should begin with an initial assessment designed to establish the severity of the incident. The initial assessment should also include analysing whether there is any way to recover the lost data, and mitigate further risks associated with the incident.
Your initial assessment should include the following information:
· The data involved
· Whether the data involved is sensitive in nature
· The individuals affected
· The security measures that are in place to protect the data
· What has happened to the data
· Whether the data involved could be used in an illegal or otherwise inappropriate way
· Any perceived wider consequences associated with the breach or incident
Top Around will determine which individuals must be notified in the event of a data breach or data security incident. Each incident must be assessed on a case-by-case basis. In every instance, the following considerations will be made:
· Any contractual notification requirements
· Any legal notification requirements
· How many people are affected
· What consequences may occur as a result of the data breach or data security incident
· Whether notification of a breach or incident would help the individual to mitigate risks associated with the incident
· Whether notification could assist the company in meeting its legal obligations under GDPR and Data Protection Act 2018
· Whether notifying an individual could prevent the unauthorised or illegal use of data
· Whether Top Around must notify the Information Commissioner’s Office
All data breaches and data security incidents, both suspected and verified, must be recorded, to assist in further analysis and to help prevent further breaches.
There will be data security incidents in which a large number of individuals will need to be notified. However, there will be other incidents in which notifying a large number of individuals may have the potential to cause disproportionate enquiries.
Whenever we notify an individual whose personal data has been affected by an incident or breach, that notification must include a description of when the breach occurred, how the breach occurred and what data was involved. Notifications must also include explicit guidance concerning what said individual can do to protect themselves. We should also outline to concerned individuals what steps our company has already taken to mitigate risks.
After the data breach or data security incident has been contained by carrying out all necessary measures, Top Around will conduct an extensive review detailing:
· The cause(s) of the breach
· The effectiveness of any responses
· Whether changes to existing IT systems, company procedures or policies must be implemented
All existing protocols must be reviewed to analyse their adequacy. Any necessary amendments to protocols must be identified and carried out as soon as possible.
Top Around Media Ltd
71-75 Shelton Street, Covent Garden, London WC2H 9JQ
Company Number: 15709589
ICO Number: ZB688931
Top Around Consulting & Services LLC
3975 Camino de la Plaza Ste 208-1353, San Ysidro CA 92173
Top Around S.L.
Paseo de la Castellana 194, 28046 Madrid, Spain
NIF: B45795432
Copyright © 2024 Top Around - All Rights Reserved
Built with ❤️ from London