What we collect when you interact with our sites and apps.

As you may already know, most websites automatically collect certain information about the way in which you interact with them. This might include your IP address, geographical location, device information (such as your hardware model, mobile network information, unique device identifiers) browser type, referral source, length of visit to the site, number of page views, the search queries you make, and similar information.

This information will be collected by us or by a third-party site analytics service provider and will be collected using cookies.

As we’ve described above, we use this information to save your settings, such as the last product you searched for, so you can find it easily the next time, help improve our functionality and services, run diagnostics, analyse trends, track visitor movements, gather broad demographic information and personalise our services.

What do we mean by “cookies”?

Cookies are small amounts of information in the form of text files that we store on the device you use to access our site or our marketing communications.

Cookies allow us to monitor your use of our services and improve them. For example, a temporary cookie is also used to keep track of your “session”. Without that temporary cookie you will not be able to purchase products or other services that may be offered via our site.

We also use cookies for site analytics purposes and to monitor how customers interact with and receive our marketing communications (for example if you open a marketing communication and/or click on any of our offers). We use this information to try to improve the relevance and tone of our future communications to ensure we’re serving you as best as we can.

If you don’t want cookies to be installed on your device, you can change the settings on your browser or device to reject cookies.

For more information about how to reject cookies using your internet browser settings, please consult the “Help” section of your internet browser or visit http://www.aboutcookies.org . Please note that if you do set your Internet browser to reject cookies, you may not be able to access all the functions of the site.

Where your data is stored?

Stubben Edge took the decision to use the Microsoft 365 cloud based service because it is designed to meet needs for robust security, reliability, user

productivity and time and cost efficiency. Office 365 is designed on the principles of the Security Development Cycle, a mandatory process that embeds security requirements into every stage of development. Office 365 is continuously updated to enhance security, and all data is controlled by the user.

Users are given extensive controls and visibility into where data resides and who has access to it.

Where is Office 365 data held?

Microsoft 365 has data storage sites across the UK and Europe. Sites are located in Cardiff, Durham, Ireland and Holland with additional storage sites located in the United States.

How is my data protected?

Protecting the security and confidentiality of network traffic is a critical part of any data protection strategy. Securing the network infrastructure helps prevent attacks, block malware, and protect data from unauthorized access, interrupted access, or loss. In the public cloud, the isolation of customer infrastructure is fundamental to maintaining security. Microsoft Azure, on which most Microsoft business cloud services are built, accomplishes this primarily through a distributed virtual firewall, partitioned local area networks (LANs), and physical separation of back-end servers from public-facing interfaces. Customers can deploy multiple logically isolated private networks, and each virtual network is isolated from the other virtual networks. Furthermore, Microsoft business cloud services and products use encryption to safeguard customer data and help the owner of the data to maintain control over it. Encrypting information renders it unreadable to unauthorized persons, even if they break through firewalls, infiltrate the network, get physical access to devices, or bypass the permissions on a local machine. Encryption transforms data so that only someone with the decryption key can access it.