Need it quicker? Use our SOS service to get your order tomorrow!
UK FlagTHE UK'S LEADING SAME DAY PRINTER!
Cheapestprintonline logo
Search


Privacy Policy

This website is operated by CPO We take your privacy very seriously therefore we urge to read this policy very carefully because it contains important information about on:

Who we are, How and why we collect, store, use and share personal information, Your rights in relation to your personal information, and How to contact us and supervisory authorities in the event that you have a complaint.

Who we are

CPO ('we' or 'us') (trading as Cheapestprintonline) collect, use and are responsible for certain personal information about you. When we do so we are regulated under the General Data protection Regulations which apply across the European Union (including the United Kingdom) and we are responsible as 'controller' of that personal information for the purposes of those laws.

The personal information we collect and use
a) Personal information you provide to us
We collect the following personal information that you provide to us: Name, address, telephone, email
Some examples of when we collect this information include:
When registering for an account or requesting a quote

b) Personal information you provide about third parties
If you give us information about another person, you confirm that the other person has appointed you to act on their behalf and agreed that you:
shall consent on their behalf to the processing of their personal data;
shall receive any data protection notices on their behalf; and shall consent on their behalf to the transfer of their personal data abroad. c) Monitoring and recording communications
We may monitor communications such as emails and telephone calls for the following purposes:
Training and quality assurance

d) Cookies and similar technologies
A cookie is a small text file which is placed onto your computer or electronic device when you access our website. Similar technologies include web beacons, action tags, local shared objects ('flash cookies') and single-pixel gifs. Such technologies can be used to track users' actions and activities, and to store information about them. We use these cookies and/or similar technologies on this website.

e) We partner with Microsoft Clarity and Microsoft Advertising to capture how you use and interact with our website through behavioural metrics, heatmaps, and session replay to improve and market our products/services. Website usage data is captured using first and third-party cookies and other tracking technologies to determine the popularity of products/services and online activity. Additionally, we use this information for site optimization, fraud/security purposes, and advertising. For more information about how Microsoft collects and uses your data, visit the Microsoft Privacy Statement - https://clarity.microsoft.com/terms

For example we may use cookies to monitor and/or collect the following information:
Traffic data

This information helps us to build a profile of our users. Some of this information may be aggregated or statistical, which means that we will not be able to identify you individually. In addition it should be noted that in some cases our cookies or similar technologies may be owned and controlled by third parties who will also collect personal information about you. On the first occasion that you use our site we will ask whether you consent to our use of cookies. If you do not, cookies will not be used. Thereafter you can opt-out of using cookies at any time or you can set your browser not to accept cookies and the websites below tell you how to remove cookies from your browser. However, some of our website features may not function as a result.

For further information on cookies generally visit www.aboutcookies.org or www.allaboutcookies.org.

How we use your personal information
We collect information about our users for the following purposes:
Manage your account

Who your information may be shared with
We may share your information with:
Law enforcement agencies in connection with any investigation to help prevent unlawful activity We will not share you personal information with any other 3rd parties.

Marketing
We would like to send you information about products, services, offers, competitions and our business which may be of interest to you. Such information could be sent by post, email, telephone, text message or automated call. We will ask whether you would like us to send you marketing messages on the first occasion that you provide any relevant contact information (i.e. on purchase, signing up to a newsletter, entering a competition etc). If you do opt in to receive such marketing from us you can opt out at any time (see 'What rights do you have?' below for further information). If you have any queries about how to opt out, or if you are receiving messages you do not want you can contact us using the details provided below.

Whether personal information has to be provided by you, and if so why
The provision of the following information is required from you:
Name, address, email and phone number

This is to enable us to do the following:
For delivery
We will inform you at the point of collecting information from you, whether you are required to provide the information to us.

How long your personal information will be kept
We will hold your personal information for the following periods:
We will keep your information indefinitely
These periods are no longer than necessary in each case.

Reasons we can collect and use your personal information
We rely on the following as the lawful basis on which we collect and use your personal information:
consent
contract
Consequence of our use of your personal information
The consequence to you of our use of your personal information is:
You will be presented with adverts that suit your criteria

Keeping your information secure
We have appropriate security measures in place to prevent personal information from being accidentally lost, or used or accessed in an unauthorised way. We limit access to your personal information to those who have a genuine business need to know it. Those processing your information will do so only in an authorised manner and are subject to a duty of confidentiality. We will also use technological and organisation measures to keep your information secure. These measures may include the following examples: user Account access is controlled by a password

We also have procedures in place to deal with any suspected data security breach. We will notify you and any applicable regulator of a suspected data security breach where we are legally required to do so. Indeed, while we will use all reasonable efforts to secure your personal data, in using the site you acknowledge that the use of the internet is not entirely secure and for this reason we cannot guarantee the security or integrity of any personal data that are transferred from you or to you via the internet. If you have any particular concerns about your information, please contact us using the details below.

Transfers of your information out of the EEA
We will not transfer your personal information outside of the EEA at any time.

Children and the validity of consent
Where we obtain consent from any user we will take reasonable steps to ascertain whether the user is over 13 years of age and whether the child is sufficiently informed to give valid consent. If the user is not, parental consent will be required to provide consent for the processing of any personal information.

What rights do you have?
Under the General Data Protection Regulation you have a number of important rights free of charge.
In summary, those include rights to:
fair processing of information and transparency over how we use your use personal information
access to your personal information and to certain other supplementary information that this
Privacy Notice is already designed to address
require us to correct any mistakes in your information which we hold
require the erasure of personal information concerning you in certain situations
receive the personal information concerning you which you have provided to us, in a structured,
commonly used and machine-readable format and have the right to transmit those data to a third party in certain situations
object at any time to processing of personal information concerning you for direct marketing
object to decisions being taken by automated means which produce legal effects concerning
you or similarly significantly affect you
object in certain other situations to our continued processing of your personal information
otherwise restrict our processing of your personal information in certain circumstances
claim compensation for damages caused by our breach of any data protection laws
For further informaiton on each of those rights, including the circumstances in which they apply, see the Guidance from the UK Information Commissioner's Office (ICO) on individual's rights under the
General Data Protection Regulations
(http://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/individual-rights/)
If you would like to exercise any of these rights please:
email, call or write to us
let us have enough information to identify you
let us have proof of your identity (a copy of your driving license, passport or a recent credit card/utility bill) let us know the information to which your request relates
From time to time we may also have other methods to unsubscribe (opt-out) from any direct marketing including for example, unsubscribe buttons or web links. If such are offered, please note that there may be some period after selecting to unsubscribe in which marketing may still be received while your request is being processed.

How to complain
We hope that we can resolve any query or concern you raise about our use of your information.
The General Data Protection Regulation also gives you right to lodge a complaint with a supervisory authority, in particular in the European Union (or European Economic Area) state where you work, normally live or where any alleged infringement of data protection laws occurred. The supervisory authority in the UK is the Information Commissioner who may be contacted at https://ico.org.uk/concerns/ or telephone: 0303 123 1113.

Changes to the privacy policy
This privacy policy was published on 28/05/2018 and last updated on 28/05/2018.
We may change this privacy policy from time to time. You should check this policy occasionally to ensure you are aware of the most recent version that will apply each time you access this website. We will also attempt to notify users of any changes by: By a notice on website

Security Policy

CPO handles sensitive cardholder information daily. Sensitive Information must have adequate safeguards in place to protect the cardholder data, cardholder privacy, and to ensure compliance with various regulations, along with guarding the future of the organisation.
CPO commits to respecting the privacy of all its customers and to protecting any customer data from outside parties. To this end management are committed to maintaining a secure environment in which to process cardholder information so that we can meet these promises.
Employees handling sensitive cardholder data should ensure:

Handle Company and cardholder information in a manner that fits with their sensitivity and classification;

Limit personal use of CPO information and telecommunication systems and ensure it does not interfere with your job performance;

CPO reserves the right to monitor, access, review, audit, copy, store, or delete any electronic communications, equipment, systems and network traffic for any purpose;

Do not use e-mail, internet and other Company resources to engage in any action that is offensive, threatening, discriminatory, defamatory, slanderous, pornographic, obscene, harassing or illegal;

Do not disclose personnel information unless authorised;

Protect sensitive cardholder information;

Keep passwords and accounts secure;

Request approval from management prior to establishing any new software or hardware, third party connections, etc.;

Do not install unauthorised software or hardware, including modems and wireless access unless you have explicit management approval;

Always leave desks clear of sensitive cardholder data and lock computer screens when unattended;

Information security incidents must be reported, without delay, to the individual responsible for incident response locally. Please find out who this is.

We each have a responsibility for ensuring our company systems and data are protected from unauthorised access and improper use. If you are unclear about any of the policies detailed herein you should seek advice and guidance from your line manager.

Network Security

A high-level network diagram of the network is maintained and reviewed on a yearly basis. The network diagram provides a high level overview of the cardholder data environment (CDE), which at a minimum shows the connections in and out of the CDE. Critical system components within the CDE, such as POS devices, databases, web servers, etc., and any other necessary payment components, as applicable should also be illustrated.

In addition, ASV should be performed and completed by a PCI SSC Approved Scanning Vendor, where applicable. Evidence of these scans should be maintained for a period of 18 months.

Acceptable Use Policy

Management intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to CPO established culture of openness, trust and integrity. Management is committed to protecting the employees, partners and CPO from illegal or damaging actions, either knowingly or unknowingly by individuals. The Company will maintain an approved list of technologies and devices and personnel with access to such devices as detailed in Appendix B.

Employees are responsible for exercising good judgment regarding the reasonableness of personal use.

Employees should take all necessary steps to prevent unauthorized access to confidential data which includes card holder data.

Keep passwords secure and do not share accounts. Authorized users are responsible for the security of their passwords and accounts.

All PCs, laptops and workstations should be secured with a password-protected screensaver with the automatic activation feature.

All POS and PIN entry devices should be appropriately protected and secured so they cannot be tampered or altered.

The List of Devices in Appendix B will be regularly updated when devices are modified, added or decommissioned. A stocktake of devices will be regularly performed and devices inspected to identify any potential tampering or substitution of devices.

Users should be trained in the ability to identify any suspicious behaviour where any tampering or substitution may be performed. Any suspicious behaviour will be reported accordingly.

Information contained on portable computers is especially vulnerable, special care should be exercised.

Postings by employees from a Company email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of CPO, unless posting is in the course of business duties.

Employees must use extreme caution when opening e-mail attachments received from unknown senders, which may contain viruses, e-mail bombs, or Trojan horse code.

Protect Stored Data

All sensitive cardholder data stored and handled by CPO and its employees must be securely protected against unauthorised use at all times. Any sensitive card data that is no longer required by the Company for business reasons must be discarded in a secure and irrecoverable manner.

If there is no specific need to see the full PAN (Permanent Account Number), it has to be masked when displayed.

PAN'S which are not protected as stated above should not be sent to the outside network via end user messaging technologies like chats, ICQ messenger etc.,

It is strictly prohibited to store:

The contents of the payment card magnetic stripe (track data) on any media whatsoever.

The CVV/CVC (the 3 or 4 digit number on the signature panel on the reverse of the payment card) on any media whatsoever.

The PIN or the encrypted PIN Block under any circumstance.

Information Classification

Data and media containing data must always be labelled to indicate sensitivity level.

Confidential data might include information assets for which there are legal requirements for preventing disclosure or financial penalties for disclosure, or data that would cause severe damage to CPO if disclosed or modified. Confidential data includes cardholder data.

Internal Use data might include information that the data owner feels should be protected to prevent unauthorized disclosure.

Public data is information that may be freely disseminated.

Access to the sensitive card holder data

All Access to sensitive cardholder should be controlled and authorised. Any job functions that require access to cardholder data should be clearly defined.

Any display of the card holder should be restricted at a minimum to the first 6 and the last 4 digits of the cardholder data.

Access to sensitive cardholder information such as PAN, personal information and business data is restricted to employees that have a legitimate need to view such information.

No other employees should have access to this confidential data unless they have a genuine business need.

If cardholder data is shared with a Service Provider (3rd party) then a list of such Service Providers will be maintained as detailed in Appendix C.

CPO will ensure a written agreement that includes an acknowledgement is in place that the Service Provider will be responsible for the for the cardholder data that the Service Provider possess.

CPO will ensure that a there is an established process, including proper due diligence is in place, before engaging with a Service provider.

CPO will have a process in place to monitor the PCI DSS compliance status of the Service provider.

Physical Security

Access to sensitive information in both hard and soft media format must be physically restricted to prevent unauthorised individuals from obtaining sensitive data.

Media is defined as any printed or handwritten paper, received faxes, floppy disks, back-up tapes, computer hard drive, etc.

Media containing sensitive cardholder information must be handled and distributed in a secure manner by trusted individuals.

Visitors must always be escorted by a trusted employee when in areas that hold sensitive cardholder information.

Procedures must be in place to help all personnel easily distinguish between employees and visitors, especially in areas where cardholder data is accessible. Employee refers to full-time and part-time employees, temporary employees and personnel, and consultants who are resident on Company sites. A visitor is defined as a vendor, guest of an employee, service personnel, or anyone who needs to physically enter the premises for a short duration, usually not more than one day.

A list of devices that accept payment card data should be maintained.

The list should include make, model and location of the device.

The list should have the serial number or a unique identifier of the device

The list should be updated when devices are added, removed or relocated

POS devices surfaces are periodically inspected to detect tampering or substitution.

Personnel using the devices should be trained and aware of handling the POS devices

Personnel using the devices should verify the identity of and=y third party personnel claiming to repair or run maintenance tasks on the devices, install new devices or replace devices.

Personnel using the devices should be trained to report suspicious behaviour and indications of tampering of the devices to the appropriate personnel. CPO sites. A visitor is defined as a vendor, guest of an employee, service personnel, or anyone who needs to enter the premises for a short duration, usually not more than one day. Strict control is maintained over the external or internal distribution of any media containing card holder data and has to be approved by management

Strict control is maintained over the storage and accessibility of media

All computer that store sensitive cardholder data must have a password protected screensaver enabled to prevent unauthorised use.

Protect Data in Transit

All sensitive cardholder data must be protected securely if it is to be transported physically or electronically.

Card holder data (PAN, track data, etc.) must never be sent over the internet via email, instant chat or any other end user technologies.

If there is a business justification to send cardholder data via email or by any other mode then it should be done after authorization and by using a strong encryption mechanism (i.e. AES encryption, PGP encryption, IPSEC, etc.).

The transportation of media containing sensitive cardholder data to another location must be authorised by management, logged and inventoried before leaving the premises. Only secure courier services may be used for the transportation of such media. The status of the shipment should be monitored until it has been delivered to its new location.

Disposal of stored data

All data must be securely disposed of when no longer required by CPO, regardless of the media or application type on which it is stored.

An automatic process must exist to permanently delete on-line data, when no longer required.

All hard copies of cardholder data must be manually destroyed when no longer required for valid and justified business reasons. A quarterly process must be in place to confirm that all non-electronic cardholder data has been appropriately disposed of in a timely manner.

CPO will have procedures for the destruction of hardcopy (paper) materials. These will require that all hardcopy materials are crosscut shredded, incinerated or pulped so they cannot be reconstructed.

CPO will have documented procedures for the destruction of electronic media. These will require:

All cardholder data on electronic media must be rendered unrecoverable when deleted e.g. through degaussing or electronically wiped using military grade secure deletion processes or the physical destruction of the media;

If secure wipe programs are used, the process must define the industry accepted standards followed for secure deletion.

All cardholder information awaiting destruction must be held in lockable storage containers clearly marked To Be Shredded - access to these containers must be restricted.

Security Awareness and procedures

The policies and procedures outlined below must be incorporated into company practice to maintain a high level of security awareness. The protection of sensitive data demands regular training of all employees and contractors.

Review handling procedures for sensitive information and hold periodic security awareness meetings to incorporate these procedures into day to day company practice.

Distribute this security policy document to all company employees to read. It is required that all employees confirm that they understand the content of this security policy document by signing an acknowledgement form (see Appendix A).

All employees that handle sensitive information will undergo background checks (such as criminal and credit record checks, within the limits of the local law) before they commence their employment with CPO.

All third parties with access to credit card account numbers are contractually obligated to comply with card association security standards (PCI/DSS).

Company security policies must be reviewed annually and updated as needed.

Credit Card (PCI) Security Incident Response Plan

The Company PCI Security Incident Response Team (PCI Response Team) is comprised of the Information Security Officer and Merchant Services. CPO PCI security incident response plan is as follows:

Each department must report an incident to the Information Security Officer (preferably) or to another member of the PCI Response Team.

That member of the team receiving the report will advise the PCI Response Team of the incident.

The PCI Response Team will investigate the incident and assist the potentially compromised department in limiting the exposure of cardholder data and in mitigating the risks associated with the incident.

The PCI Response Team will resolve the problem to the satisfaction of all parties involved, including reporting the incident and findings to the appropriate parties (credit card associations, credit card processors, etc.) as necessary.

The PCI Response Team will determine if policies and processes need to be updated to avoid a similar incident in the future, and whether additional safeguards are required in the environment where the incident occurred, or for the institution.