Privacy Policy
Policies
Privacy Policy
Stealth Robotics ("we," "us," or "our") is committed to protecting the privacy of our customers and website visitors. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you use our remote robotics software solutions and related services.
By using our services and providing your personal data, you confirm that you have read and understood this Privacy Policy. You consent to the collection, use, and processing of your personal information as described in this Privacy Policy.
You acknowledge that your consent is given freely, specifically, and informedly, and that you may withdraw consent at any time by contacting us at [contact@stealthrobotics.co.uk].
1. Personal Data
1.1 Where necessary, we collect information from you that enables you to be identified as an individual, such as the names and contact details of representatives from your company, including email addresses, phone numbers, and addresses. This kind of information is defined in the GDPR as personal data. The terms “personal data” and “personal information” are used interchangeably throughout this privacy policy. Stealth Robotics complies with the Data Protection Act 2018 (DPA 2018), the UK General Data Protection Regulation (UK GDPR), and the GDPR, ensuring that your personal data is processed lawfully, fairly, and transparently.
1.2 Generally, the type of personal data we collect is the information that we need to enable you to use our access our Services and fulfil our contractual obligations to you. To minimise the impact on your privacy, we will never knowingly collect more personal data than is strictly necessary to perform the activities described in this privacy policy.
2. Information We Collect
2.1 Company Information
We may collect company-specific information such as:
- a) Company name and registration details;
- b) Business address and contact information;
- c) Industry sector and type of robotics used.
2.2 Personal Information
We collect personal information from business representatives, including:
- a) Names and contact details;
- b) Job titles and departments;
- c) User account credentials.
3. Payment Processing and Billing
3.1 To process payments, we collect:
- a) Billing address;
- b) Payment method details (processed securely through our payment processor);
- c) Transaction history.
3.2 Automated Billing
By subscribing to our services, you consent to automatic billing. Depending on your chosen plan, we will automatically charge your payment method on a monthly or annual basis.
3.3 Payment Processing
We use [Stripe] to process all payments. Our payment processor has its own privacy policy governing the handling of your payment information: [https://stripe.com/gb/privacy]. We do not store your credit card information directly. We retain payment records (transaction IDs, amounts, dates) for accounting and legal compliance.
3.4 Payment Data Retention
- a) Transaction records are kept for 6 years as required by UK tax law.
- b) Failed payment attempts are recorded for 13 months to manage recurring billing.
- c) Billing addresses are retained for the duration of the active subscription and for 6 years after the last transaction for tax purposes.
4. Technical Data
4.1 We collect technical data related to how you interact with our services, including:
- a) IP addresses;
- b) Browser type and version;
- c) Operating system;
- d) Time zone setting and location;
- e) Log data related to software usage.
5. How We Use Your Information
5.1 We use the collected information for the following purposes:
- a) Providing and maintaining our services;
- b) Processing payments and managing subscriptions;
- c) Communicating about service updates and offers;
- d) Responding to inquiries and customer support;
- e) Improving our software and services;
- f) Complying with legal obligations.
6. Legal Basis for Processing
6.1 Under GDPR, we process your data based on:
- a) Contract performance;
- b) Legal obligations;
- c) Legitimate business interests;
- d) Consent (where applicable).
7. Data Sharing and Disclosure
7.1 We may share your information with:
- a) Payment processors for billing purposes;
- b) Cloud service providers for hosting;
- c) Professional advisers when necessary;
- d) Law enforcement when required by law.
7.2 We do not sell your personal data to third parties.
8. Data Security
8.1 We implement appropriate technical and organizational measures to secure your data, including:
- a) Encryption of data in transit and at rest;
- b) Regular security assessments;
- c) Access controls and authentication;
- d) Staff training on data protection.
9. Detailed Data Processing Activities
9.1 Automated Processing Techniques
We employ various automated processing methods, including:
- a) Machine learning algorithms for predictive maintenance;
- b) Statistical analysis for performance optimisation;
- c) Automated anomaly detection;
- d) Real-time data processing for system monitoring.
9.2 Processing Technologies
Our systems utilise:
- a) Edge computing for real-time processing;
- b) Cloud-based analytics platforms;
- c) Distributed database systems;
- d) API integrations with client systems.
9.3 Aggregated Data Analysis
We may use aggregated, anonymised data for:
- a) Service improvement;
- b) Industry benchmarking;
- c) Research and development;
- d) Trend analysis and reporting.
- e) Client data used for these purposes is:
- f) Thoroughly anonymised;
- g) Aggregated across multiple clients;
- h) Stripped of any identifying characteristics.
10. Data Retention
10.1 We retain your data for as long as necessary to:
- a) Provide our services;
- b) Comply with legal obligations;
- c) Resolve disputes;
- d) Enforce agreements.
11. Automated Decision Making
11.1 We may use automated decision making for:
- a) Subscription management;
- b) Fraud prevention.
12. Children’s Privacy
12.1 Our services are not intended individuals under 18 years of age. We do not knowingly collect data from children.
13. Incident Response and Data Breaches
13.1 Incident Classification
We classify security incidents based on:
- a) Type of data affected;
- b) Number of individuals impacted;
- c) Potential harm to data subjects;
- d) System availability impact.
- e) Severity levels
- I. Critical- Immediate response required;
- II. High- Response within 2 hours;
- III. Medium- Response within 24 hours;
- IV. Low- Response within 48 hours.
13.2 Notification Procedures
13.2.1 Client Notification
We will notify affected clients:
- a) Without undue delay;
- b) Within 24 hours of breach discovery;
- c) With regular updates as the investigation progresses;
13.2.2 Notification includes:
- a) Nature of the breach;
- b) Categories of data affected;
- c) Approximate number of records affected;
- d) Likely consequences;
- e) Measures taken or proposed.
13.2.3 Regulatory Notification
We will notify the ICO:
- a) Within 72 hours of becoming aware of a breach;
- b) Unless the breach is unlikely to result in risk to rights and freedoms;
- c) With all information required by GDPR Article 33.
13.3 Incident Response Team
Our dedicated incident response team includes:
- a) Data Protection Officer;
- b) IT Security Specialists;
- c) Legal Counsel;
- c) Client Support Representatives.
13.4 Response and Recovery Procedures
13.4.1 Immediate Response
- a) Incident containment;
- b) Evidence preservation;
- c) Impact assessment;
- d) Stakeholder notification.
13.4.2 Investigation
- a) Root cause analysis;
- b) Extent of breach determination;
- c) Data exposure assessment;
- d) Timeline reconstruction.
13.4.3 Remediation
- a) Security vulnerability patching;
- b) System hardening;
- c) Policy and procedure updates;
- d) Staff training improvements.
13.5 Post-Incident Activities
- a) Detailed incident reports for clients;
- b) Lessons learned documentation;
- c) Implementation of preventive measures;
- d) Review and update of security protocols.
13.6 Business Continuity
- a) Redundant systems for critical functions;
- b) Data backup and recovery procedures;
- c) Alternative communication channels;
- d) Regular disaster recovery testing.
14. Documentation and Compliance
14.1 Incident Documentation
We maintain detailed records of all incidents:
- a) Incident logs and timeline;
- b) Response actions taken;
- c) Communication records;
- d) Post-incident analysis reports.
14.2 Regular Testing
We conduct regular:
- a) Penetration testing;
- b) Vulnerability assessments;
- c) Incident response drills;
- d) Recovery procedure testing.
15. International Data Transfers
15.1 Data Storage Locations:
- a) Primary data storage: [England];
15.2 Transfer Mechanisms
For transfers outside the UK/EEA, we rely on:
- a) UK Adequacy Regulations;
- b) Standard Contractual Clauses (SCC);
- c) Binding Corporate Rules (if applicable).
15.3 Transfer Safeguards
We implement additional safeguards:
- a) End-to-end encryption for data in transit;
- b) Data minimisation principles;
- c) Regular transfer impact assessments;
- d) Contractual commitments from recipients.
15.4 International Access Controls
- a) Strict access controls for international staff;
- b) Data access logging and monitoring;
- c) Regular audits of international data access;
- d) Geofencing of sensitive data where required.
16. Cookies and Tracking
16.1 We use cookies and similar technologies for:
- a) Essential functionality;
- b) Performance monitoring;
- c) User experience improvement.
16.2 You can manage cookie preferences through your browser settings.
17. Your Rights
17.1 Under GDPR and UK data protection law, you have the right to:
- a) Access your personal data;
- b) Rectify inaccurate data;
- c) Erase your data (in certain circumstances);
- d) Restrict processing;
- e) Data portability;
- f) Object to processing;
- g) Withdraw consent.
17.2 To exercise these rights, contact us at [contact@stealthrobotics.co.uk].
18. Changes to This Policy
We may update this Privacy Policy periodically. We will notify you of any material changes and obtain consent where required.
19. Supervisory Authority
You have the right to lodge a complaint with the Information Commissioner’s Office (ICO):
- Website: www.ico.org.uk
- Phone: 0303 123 1113.