Who we are: 
 
Nubis 365 Ltd 
https://nubis365.com 
Email: info@nubis365.com 
Phone: +44 1536 428937 
Address: Oakley House, Headway Business Park, 3 Saxon Way W, Great Oakley, Corby NN18 9EZ 

Effective Date: 09/06/2025 

At Nubis 365 Ltd, we are committed to protecting the privacy and security of our clients, staff and website visitors. This Privacy Policy outlines how we collect, use, disclose, and safeguard your information in compliance with the General Data Protection Regulation (GDPR). 

  1. Information We Collect

We may collect and process the following types of information: 

  • Personal Information: Name, contact details, company name, job title, and payment information. 
  • Technical Information: IP address, device information, browser type, and system logs. 
  • Service Usage Data: Details of services requested, support tickets, and interactions with our team. An anonymised string created from your email address (also know as a Hash) may be provided to the Gravatar service if you are using it. The Gravatar service privacy policy is available here: https://automatic.com/provacy/. After approval of your comment your profile picture is visible to the public in the context of your comment. 
  • Comments when a visitor leaves comments n the site we collect the data shown in the comments form, the visitors IP address and browser user agent string to assist with spam detection.  
  • If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website. 
  • If you leave a comment on our site you may opt in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. 
  • If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. 
  • When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed. 
  • If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day. 
  • Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website. 
  • These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website. 

 

  1. Lawful Basis for Processing Under GDPR

We process personal data based on the following lawful grounds: 

  • Consent – When you provide consent for specific data collection and usage. 
  • Contractual Necessity – To fulfil our obligations in providing IT services. 
  • Legal Obligation – When required by law or regulatory requirements. 
  • Legitimate Interests – For cybersecurity, fraud prevention, and service improvements. 
  1. How We Use Your Information

We use collected data for the following purposes: 

  • Providing and managing IT services 
  • Billing and account management 
  • Security monitoring and incident prevention 
  • Customer support and communication 
  • Compliance with legal obligations 
  1. Your GDPR Rights

As a data subject, you have the following rights under GDPR: 

  • Right to Access – Request details of your personal data we hold. 
  • Right to Rectification – Correct inaccurate or incomplete data. 
  • Right to Erasure (“Right to Be Forgotten”) – Request deletion of your data, subject to legal obligations. 
  • Right to Restrict Processing – Limit how your data is processed. 
  • Right to Data Portability – Obtain and reuse your personal data across services. 
  • Right to Object – Object to processing based on legitimate interests or direct marketing. 
  • Right Not to Be Subject to Automated Decision-Making – Protection against decisions made solely by automated systems. 
  1. Data Sharing & Third Parties

We do not sell personal data. We may share information with: 

  • Trusted third-party service providers for operational needs. 
  • Law enforcement or regulatory authorities when legally required. 
  • Business partners under strict confidentiality agreements. 
  • Visitor comments may be checked through an automated spam detection service. 
  1. Data Security & Retention

We implement industry-standard security measures, including encryption, access controls, and regular audits to protect your data. Personal data is retained only as long as necessary for legal, contractual, or operational purposes. 

  1. Contact & Complaints

If you have concerns about how we handle your data or wish to exercise your rights, please contact us at: 
 
Email: info@nubis365.com 
Phone: +44 1536 428937 
Address: Oakley House, Headway Business Park, 3 Saxon Way W, Great Oakley, Corby NN18 9EZ 

If you believe we have not adequately addressed your concerns, you have the right to lodge a complaint with the Information Commissioner’s Office (ICO) in the UK or another relevant data protection authority. 

  1. Data Breach Response

At Nubis 365 Ltd, we take data security seriously. In the event of a data breach, we follow a structured response process to minimise impact and ensure compliance with GDPR and other relevant regulations. 

Our Data Breach Protocol: 

  1. Detection & Assessment 
  • Immediate identification and assessment of the breach. 
  • Determine the nature, extent, and affected data. 
  1. Containment & Mitigation 
  • Secure systems to prevent further unauthorised access. 
  • Implement patches, updates, or emergency security measures. 
  1. Notification & Reporting 
  • Notify affected individuals if required under GDPR. 
  • Report the breach to the Information Commissioner’s Office (ICO) within 72 hours, if the breach poses a risk to individuals’ rights and freedoms. 
  • Inform any affected third parties and business partners. 
  1. Investigation & Remediation 
  • Conduct a forensic analysis to determine the cause of the breach. 
  • Implement necessary security improvements to prevent recurrence. 
  • Review and update internal policies and incident response plans. 
  1. Ongoing Monitoring & Compliance 
  • Continuous security monitoring for signs of vulnerabilities. 
  • Regular audits and staff training to ensure best practices. 

 

  1. Cybersecurity Measures

At Nubis 365 Ltd, we employ rigorous cybersecurity protocols to safeguard your data from unauthorised access, loss, or breaches. Our security framework is designed to meet industry standards and GDPR compliance. 

Key Security Measures Implemented: 

  • Data Encryption: All stored and transmitted sensitive data is encrypted using industry-leading standards (e.g., AES-256, TLS/SSL). 
  • Access Control: Strict access policies, multi-factor authentication (MFA), and role-based permissions ensure only authorised personnel handle sensitive information. 
  • Network Security: Firewalls, intrusion detection/prevention systems (IDS/IPS), and continuous network monitoring mitigate cyber threats. 
  • Endpoint Protection: Advanced antivirus, anti-malware, and endpoint security solutions prevent unauthorised access to company devices. 
  • Regular Security Audits: Periodic security assessments, vulnerability scans, and penetration testing strengthen defences. 
  • Incident Response Plan: A comprehensive strategy to identify, mitigate, and recover from cybersecurity incidents efficiently. 
  • Employee Training & Awareness: Staff members receive cybersecurity training to recognise phishing, social engineering, and best security practices. 
  • Secure Cloud Infrastructure: For clients utilising cloud services, we implement strict security controls, encryption, and access policies. 
  • Backup & Disaster Recovery: Regular automated backups ensure business continuity in case of unforeseen incidents. 
  • GDPR Compliance: We continually review and update our security practices to align with GDPR requirements for data protection and privacy. 

By implementing these cybersecurity measures, we safeguard data integrity, confidentiality, and availability 

Menu