IT Managed 247 London – IT Support and Cyber Security

Privacy Policy

1. Who we are

Our website address is:

2. What personal data we collect and why we collect it


When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

2.2 Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

2.3 Contact forms

When you use our contact forms to get in touch with us, we collect the information you provide, such as your name, email address, and any additional details you choose to share. This information is crucial for us to respond to your inquiries and provide the necessary assistance.

We respect your privacy, and the data collected through contact forms is used solely for communication purposes. We do not share this information with third parties unless explicitly stated or required by law.

Please be aware that the information you submit through contact forms may be stored in our databases for future reference. However, rest assured that we have implemented robust security measures to protect your data from unauthorized access, disclosure, alteration, and destruction.

By submitting information through our contact forms, you consent to the collection and use of the provided data in accordance with this Privacy Policy.

If you have any concerns about the information you have submitted or wish to request its removal from our records, please contact us through the provided channels, and we will promptly address your request in compliance with applicable privacy laws.

2.4 Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

2.5 Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

2.6 Analytics

To enhance your experience on our website and improve its functionality, we utilize analytics tools that may collect non-personal information about your visit. This information includes but is not limited to your IP address, browser type, device type, and pages visited. These tools help us analyze user behavior, track website performance, and make data-driven decisions to optimize our content and services.

The data collected through analytics tools is aggregated and anonymized, ensuring that it cannot be traced back to individual users. We use this information to gain insights into overall website trends, identify popular content, and tailor our offerings to better meet the needs of our users.

Please note that we do not knowingly collect any personally identifiable information through our analytics tools. We respect your privacy, and the data gathered is used solely for internal purposes.

By continuing to use our website, you consent to the use of these analytics tools as described in this Privacy Policy. If you wish to opt out of this data collection, you can adjust your browser settings or use third-party browser plugins.

For any questions or concerns regarding the use of analytics on our website, please contact us through the provided channels, and we will be happy to address your inquiries.

3. Who we share your data with

ITM247 does not provide services to businesses engaged in the Gambling, Drug/Alcohol, or pornography industries. By using our services, clients confirm that their business activities do not fall within these restricted categories.

3.1 Service Providers

We may engage reputable third-party service providers to assist us in various aspects of our operations, such as hosting, analytics, payment processing, and customer support. These service providers are contractually obligated to handle your data securely and in accordance with our privacy standards.

3.2 Legal Compliance

In compliance with applicable laws and regulations, we may disclose your information if required by law or in response to a valid legal request, such as a court order, government inquiry, or subpoena.

3.3 Business Transfers

In the event of a merger, acquisition, or sale of all or a portion of our assets, your data may be transferred to the acquiring entity. We will ensure that the acquiring entity respects your privacy rights and informs you of any changes to this Privacy Policy.

3.4 With Your Consent

We may share your data with third parties for purposes not covered by this Privacy Policy when we have your explicit consent to do so.

It’s important to note that even in cases where we share your data, we maintain strict control and oversight to ensure the confidentiality and security of your information.

If you have any concerns or questions regarding the sharing of your data, please reach out to us through the provided contact channels, and we will be happy to provide more details and address your inquiries.

4. How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

5. What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

6. Your contact information

Your satisfaction and trust are important to us at ITM247. If you have any questions, concerns, or feedback regarding our privacy policy or any other matter, please don’t hesitate to reach out to us in our contact page:

We are committed to addressing your inquiries promptly and providing the assistance you need. Please include relevant details, such as your name, contact information, and a detailed description of your query, to help us serve you better.

7. Additional information

7.1 How we protect your data

At ITM247, we take the security and privacy of your data seriously. We employ robust measures to ensure the confidentiality, integrity, and availability of your information. Here’s an overview of how we protect your data:

7.1.1 Encryption

All data transmitted between your browser and our servers is encrypted using secure socket layer (SSL) technology. This encryption helps safeguard your personal information during the transmission process.

7.1.2 Access Controls

Access to your data is restricted to authorized personnel who require it for specific purposes. Our access controls and authentication mechanisms ensure that only those with the appropriate permissions can access and handle your information.

7.1.3 Secure Infrastructure

Our infrastructure is hosted on secure servers with industry-leading providers. We regularly update our systems and software to address potential vulnerabilities and adhere to best security practices.

7.1.4 Regular Audits and Monitoring

We conduct regular security audits and monitoring to identify and address potential security threats. This proactive approach allows us to respond swiftly to any suspicious activities and continually improve our security posture.

7.1.5 Employee Training

Our team members undergo comprehensive training on data protection and privacy best practices. This includes awareness of potential security risks and the importance of safeguarding sensitive information.

7.1.6 Data Backups

Regular data backups are performed to ensure the availability of your information in the event of unforeseen circumstances. This helps us recover your data quickly and minimize any potential impact on your experience.

7.1.7 Incident Response Plan

In the rare event of a data security incident, we have an incident response plan in place. This plan outlines the steps we take to investigate, mitigate, and notify affected parties promptly.

7.1.8 Third-Party Assessments

We work with third-party security experts to conduct assessments and audits of our security practices. This external validation ensures that we meet and exceed industry standards for data protection.

While we implement stringent security measures, it’s important to note that no system can be entirely foolproof. We continuously strive to enhance our security protocols and stay vigilant in the ever-evolving landscape of cybersecurity threats.

If you have any specific concerns or questions about how we protect your data, please don’t hesitate to contact our Data Protection Officer or our customer support team. Your trust is of paramount importance to us, and we are committed to maintaining the highest standards of data security.

7.2 What data breach procedures we have in place

At ITM247, we understand the importance of promptly and effectively responding to any potential data breaches. Our data breach procedures are designed to minimize the impact on you and ensure that your personal information remains secure. Here’s an overview of our data breach response plan:

7.2.1 Incident Identification

Our systems are equipped with advanced monitoring tools to detect any unusual activities or potential security incidents. Additionally, our team members are trained to recognize signs of a data breach.

7.2.2 Immediate Containment

Upon identification of a potential breach, we take immediate action to contain the incident. This may involve isolating affected systems or temporarily suspending services to prevent further unauthorized access.

7.2.3 Assessment and Investigation

A thorough investigation is conducted to assess the scope and nature of the breach. This includes determining the type of data affected, the extent of the compromise, and identifying the potential impact on users.

7.2.4 Notification

If the breach poses a risk to your personal information, we will promptly notify you and any relevant authorities as required by applicable data protection laws. Our notification will include details about the nature of the breach, the type of information compromised, and the steps we are taking to address the situation.

7.2.5 Communication and Support

We are committed to keeping you informed throughout the process. In the event of a data breach, we will provide clear and transparent communication about the incident and the steps you can take to protect yourself.

7.2.6 Remediation and Recovery

Once the breach is contained and the investigation is complete, we take necessary measures to remediate the vulnerabilities that led to the incident. This may involve implementing additional security measures, updating systems, or enhancing our security protocols.

7.2.7 Learnings and Improvements

Every data breach provides an opportunity for us to learn and improve our security practices. We conduct a post-incident analysis to identify areas for enhancement, implement corrective actions, and fortify our defenses against future threats.

It’s important to note that we continuously invest in proactive security measures to prevent data breaches. However, in the event of an incident, our priority is to respond swiftly, transparently, and in accordance with legal obligations to protect your privacy and security.

If you have any concerns or questions about our data breach procedures, please contact our Data Protection Officer or our customer support team. We are committed to addressing your inquiries and maintaining the trust you place in us.

7.3 What third parties we receive data from

At ITM247, we may receive data from various third parties to enhance and personalize your experience. It’s important to note that we handle such data with the same level of care and respect for privacy as outlined in our Privacy Policy. Here are some instances where we may receive data from third parties:

7.3.1 Analytics Services

We may utilize analytics services provided by third parties to gather information about how users interact with our website or application. This data helps us analyze user behavior, improve our services, and enhance the overall user experience.

7.3.2 Advertising Partners

If we engage in online advertising, we may receive aggregated and anonymized data from advertising partners. This data may include information about the effectiveness of our advertising campaigns or user interactions with our ads.

7.3.3 Social Media Platforms

If you choose to connect with us through social media platforms, we may receive information from these platforms in accordance with your privacy settings. This may include basic profile information and interactions with our social media accounts.

7.3.4 Payment Processors

When you make a purchase on our platform, we may receive information from payment processors to facilitate the transaction. This may include details related to payment authorization, fraud detection, and transaction status.

7.3.5 Third-Party Integrations

If you use third-party services integrated with our platform, such as social login or authentication services, we may receive data from these services to streamline your user experience.

7.3.6 Customer Support Tools

If you contact our customer support, we may use third-party tools to manage and respond to your inquiries. Information shared during these interactions may be stored in these tools to provide efficient and effective support.

It’s important to highlight that the data received from third parties is often aggregated, anonymized, or in a format that protects individual privacy. We do not knowingly receive or process sensitive personal information without explicit consent.

If you have specific questions about the third parties from which we receive data, or if you wish to opt out of certain data sharing practices, please contact us through the provided channels, and we will be happy to provide more details and address your inquiries.

7.4 What automated decision-making and/or profiling we do with user data

At ITM247, we may utilize automated decision-making processes and profiling to enhance your experience, provide personalized services, and optimize our offerings. It’s important to understand how these processes work and the impact on your privacy. Here’s an overview:

7.4.1 Personalized Content and Recommendations

We may use automated algorithms to analyze your usage patterns, preferences, and interactions with our platform. This information helps us tailor content, product recommendations, and services to better align with your interests and needs.

7.4.2 Ad Targeting

Automated processes may be employed to analyze user demographics, behavior, and preferences for the purpose of delivering targeted advertisements. This allows us to present you with content and offers that are more relevant to your interests.

7.4.3 User Experience Optimization

Automated decision-making may be used to optimize your overall experience on our platform. This includes features such as suggesting relevant search results, prioritizing content based on your historical interactions, and streamlining navigation.

7.4.4 Fraud Detection and Prevention

Automated processes may be employed to analyze patterns and detect potentially fraudulent activities. This helps us ensure the security of our platform and protect users from unauthorized access or malicious behavior.

7.4.5 Customer Support Automation

In customer support interactions, automated systems may be used to categorize and route inquiries, suggest potential solutions, and streamline the support process. This enhances the efficiency and responsiveness of our customer support services.

It’s important to note that while automated decision-making and profiling play a role in improving user experiences, we are committed to ensuring fairness, transparency, and accountability. Decisions made through automated processes are subject to regular reviews to minimize any potential biases and ensure compliance with applicable privacy laws.

If you have concerns or questions about the automated decision-making and profiling practices, or if you wish to opt out of certain aspects, please contact us through the provided channels, and we will be happy to provide more details and address your inquiries.

7.5 Industry regulatory disclosure requirements

As ITM247 operates within specific industries, we are committed to complying with relevant regulatory standards and disclosure requirements. This commitment extends to informing our users about how we adhere to industry-specific regulations. Below are the industry regulatory disclosure requirements that may be applicable to our services:

7.5.1 Data Protection and Privacy Laws

We comply with data protection and privacy laws applicable to the regions in which we operate. This may include regulations such as the General Data Protection Regulation (GDPR) in the European Union, the California Consumer Privacy Act (CCPA) in the United States, or similar laws in other jurisdictions.

7.5.2 Financial Industry Regulations

If our services involve financial transactions, we adhere to industry-specific regulations, such as those outlined by financial regulatory bodies. This ensures the secure handling of financial information and compliance with relevant financial laws.

7.5.3 Healthcare Industry Regulations

If our services involve the handling of healthcare data, we comply with regulations such as the Health Insurance Portability and Accountability Act (HIPAA) in the United States or similar healthcare data protection laws in other regions.

7.5.4 Telecommunications Regulations

If our services include telecommunications components, we adhere to regulations set forth by telecommunications authorities to ensure the security and privacy of communications.

7.5.5 E-Commerce and Consumer Protection Laws

In the context of e-commerce, we comply with consumer protection laws and e-commerce regulations to safeguard the rights and interests of consumers.

7.5.6 Intellectual Property Laws

We respect intellectual property laws and regulations, ensuring that our services do not infringe on the intellectual property rights of others.

7.5.7 Accessibility Standards

We strive to meet accessibility standards and regulations to ensure that our digital content and services are accessible to individuals with disabilities.

It’s important to note that the specific regulatory landscape may vary based on the nature of our services and the geographic locations in which we operate. Our commitment is to stay informed about and compliant with relevant industry regulations, providing transparency to our users about how we handle data and operate within legal frameworks.

For more detailed information about our compliance with specific industry regulations, please refer to our dedicated compliance documentation or contact us through the provided channels, and we will be happy to address your inquiries.

Our Selected Partners

You are in a safe hand

For Peace of Mind, Security & Productivity, Choose ITM247

Find out how our services help your creativity flourish and empower your business.