Yorkshire Financial Management Limited is the data controller for the purpose of data protection legislation. This Policy will explain the basis on which any personal information we collect from you, or which you provide to us, is processed.
What kind of information do we gather about you and how do we use that information?
We only hold the information you choose to give us, or is already within the public domain.
We may use your information to:
To process and respond to enquiries
For the purpose for which you provided the information
We would only share your information when legally required to do so.
We do not ask for or collect any sensitive personal data.
Unless you give us permission we would not ask for sensitive personal data, this would be data revealing information about an individual's racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade-union membership, and includes genetic data, biometric data (for the purpose of uniquely identifying an individual), data concerning health, or data concerning a natural person's sex life or sexual orientation. If you do provide it, this will be an indication that you explicitly consent to us processing this information.
Your ability to view and correct information:
At your request and upon receiving proof of identity, we will inform you of any personal information we may hold on you. Such information may be corrected, added to or deleted to ensure that it is accurate and is held in accordance with your wishes.
Website security and security of transmitting information:
We have security procedures in place for the administration of the website which prevent unauthorised access to the website processes and records. However, communications over ordinary email between us are not secure.
Breach of security:
If you suspect that we have allowed your data to reach an unauthorised person, we ask that you provide us with a statement of how you believe this happened and any evidence you have to help us establish any issues. We will investigate and take action as necessary to remedy any breach of security.
We retain records in both electronic and paper form and maintain adequate backup procedures in the event of data corruption or accidental destruction. At the point that records are no longer required to be kept, they will be deleted.
Changes to our policy: