GDPR & Legal Centre
Subject Access Request Form
Our Website collects, holds, and processes certain personal data about e.g. our visitors (“data subjects”). As a data subject, you have a legal right, under UK Data Protection Legislation (including EU Regulation 2016/679 General Data Protection Regulation (“GDPR”) and any successor legislation) to find out about our use of your personal data as follows:
Confirmation that your personal data is being processed by us;
Access to your personal data;
How we use your personal data and why;
Details of any sharing or transfers of your personal data;
How long we hold your personal data;
Details of your rights under UK Data Protection Legislation including, but not limited to, your rights to withdraw your consent to our use of your personal data at any time and/or to object to our processing of it.
No fee is payable under normal circumstances. We reserve the right to charge a reasonable fee for requests that are manifestly unfounded, excessive, or repetitive. Such charges will be based only on the administrative cost that we will incur in order to respond.
Please complete the required information overleaf and return it to us by submitting online or by email to:
Robert Maurer, Email: email@example.com
You do not have to use this form and may instead write to us using the same contact details.
After receiving your subject access request, we may contact you to request additional supporting information and/or proof of your identity. This helps us to safeguard your privacy and personal data.
We will respond to all subject access requests within one month of receipt and will aim to provide all required information to you within the same period. If we require further proof of ID, or if your request is unusually complicated, we may require more time and will inform you accordingly.
If you are making a subject access request on someone else’s behalf, please contact Robert Maurer (Email: firstname.lastname@example.org) before making your request.
Robert Maurer and the website tectonic-forces.org understand that your privacy is important to you and that you care about how your personal data is used. I respect and value the privacy of all of my visitors (data subjects) and will only collect and use personal data in ways that are described here, and in a way that is consistent with my obligations and your rights under the law.
1. Information About Me
Address: Uxbridge, Middlesex, UB8 3AD, U.K.
Email address: email@example.com
Telephone number: +44 (0) 7831 129130
What Does This Notice Cover?
This Privacy Information explains how I use your personal data: how it is collected, how it is held, and how it is processed. It also explains your rights under the law relating to your personal data.
What Is Personal Data?
Personal data is defined by the General Data Protection Regulation (EU Regulation 2016/679) (the “GDPR”) and the Data Protection Act 2018 (collectively, “the Data Protection Legislation”) as ‘any information relating to an identifiable person who can be directly or indirectly identified in particular by reference to an identifier’.
Personal data is, in simpler terms, any information about you that enables you to be identified. Personal data covers obvious information such as your name and contact details, but it also covers less obvious information such as identification numbers, electronic location data, and other online identifiers.
The personal data that I use is set out in Part 5, below.
What Are My Rights?
Under the Data Protection Legislation, you have the following rights, which I will always work to uphold:
The right to be informed about my collection and use of your personal data. This Privacy Notice should tell you everything you need to know, but you can always contact [us] OR [me] to find out more or to ask any questions using the details in Part 11.
The right to access the personal data I hold about you. Part 10 will tell you how to do this.
The right to have your personal data rectified if any of your personal data held by me is inaccurate or incomplete. Please contact me using the details in Part 11 to find out more.
The right to be forgotten, i.e. the right to ask me to delete or otherwise dispose of any of your personal data that I hold. Please contact me using the details in Part 11 to find out more.
The right to restrict (i.e. prevent) the processing of your personal data.
The right to object to me using your personal data for a particular purpose or purposes.
The right to withdraw consent. This means that, if I am relying on your consent as the legal basis for using your personal data, you are free to withdraw that consent at any time.
The right to data portability. This means that, if you have provided personal data to me directly, I am using it with your consent or for the performance of a contract, and that data is processed using automated means, you can ask me for a copy of that personal data to re-use with another service or business in many cases.
Rights relating to automated decision-making and profiling. I do not use your personal data in this way, including automated decision-making and profiling.
For more information about my use of your personal data or exercising your rights as outlined above, please contact me using the details provided in Part 11.
It is important that your personal data is kept accurate and up-to-date. If any of the personal data I hold about you changes, please keep me informed as long as I have that data.
Further information about your rights can also be obtained from the Information Commissioner’s Office or your local Citizens Advice Bureau.
If you have any cause for complaint about [our] OR [my] use of your personal data, you have the right to lodge a complaint with the Information Commissioner’s Office. I would welcome the opportunity to resolve your concerns myself, however, so please contact me first, using the details in Part 11.
5. What Personal Data Do You Collect and How?
Depending upon your use of My Site, I may collect and hold some or all of the personal and non-personal data set out in the table below, using the methods also set out in the table. I do not collect any ‘special category’ or ‘sensitive’ personal data AND personal data relating to children AND data relating to criminal convictions and/or offences.
How I Collect the Data
Identity Information including name, surname, forename, title when you use the contact form, the Subject Request Form, or interact with any form or discussion/forum page.
Contact information including email address, telephone number, when you use the contact form or the Subject Access Request Form
Business information including e.g. business name, job title, profession, when contact me by the contact form or sending me emails which includes these details.
Data from third parties including your country, city, IP address, the pages you visited through Google Analytics. Nothing of these details can identify a person.
6. How Do You Use My Personal Data?
Under the Data Protection Legislation, I must always have a lawful basis for using personal data. The following table describes how I may use your personal data, and my lawful bases for doing so:
What I Do
What Data I Use: Cookies, IP, name, surname, forename, email, telephone number, address, visitor behaviour (visited pages, country, city)
My Lawful Basis: "Consent", "legitimate interests" to respond your emails (communication with you) and service you, supplying you with information by email AND/OR post that you have requested.
With your permission and/or where permitted by law, I may also use your personal data for marketing purposes, which may include contacting you by email OR post with information, news, and offers on my Site. You will not be sent any unlawful marketing or spam. I will always work to fully protect your rights and comply with my obligations under the Data Protection Legislation and the Privacy and Electronic Communications (EC Directive) Regulations 2003, and you will always have the opportunity to opt-out. I will always obtain your express opt-in consent before sharing your personal data with third parties for marketing purposes and you will be able to opt-out at any time.
I do not use automated systems for carrying out certain kinds of decision-making AND/OR profiling.
I will only use your personal data for the purpose(s) for which it was originally collected unless I reasonably believe that another purpose is compatible with that or those original purpose(s) and need to use your personal data for that purpose. If I do use your personal data in this way and you wish me to explain how the new purpose is compatible with the original, please contact me using the details in Part 11.
If I need to use your personal data for a purpose that is unrelated to, or incompatible with, the purpose(s) for which it was originally collected, I will inform you and explain the legal basis which allows me to do so.
In some circumstances, where permitted or required by law, I may process your personal data without your knowledge or consent. This will only be done within the bounds of the Data Protection Legislation and your legal rights.
7. How Long Will You Keep My Personal Data?
I will not keep your personal data for any longer than is necessary in light of the reason(s) for which it was first collected.
8. How and Where Do You Store or Transfer My Personal Data?
I will only store or transfer your personal data within the UK and the European Economic Area (the “EEA”). The EEA consists of all EU member states, plus Norway, Iceland, and Liechtenstein. This means that your personal data will be fully protected under the Data Protection Legislation, GDPR, and/or to equivalent standards by law. This means that it will be fully protected under the Data Protection Legislation.]
I may store or transfer some or all of your personal data in countries that are not part of the European Economic Area (the “EEA” consists of all EU member states, plus Norway, Iceland, and Liechtenstein) OR EEA. These are known as “third countries” and may not have data protection laws that are as strong as those in the UK and/or the EEA. This means that I will take additional steps in order to ensure that your personal data is treated just as safely and securely as it would be within the UK and under the Data Protection Legislation as follows:
I share your data within the group of companies of which I am a part. Where this involves the transfer of personal data outside the EEA, my group ensures that personal data is protected by requiring all companies within the group to follow the same rules with respect to personal data usage. These are known as “binding corporate rules”. More information on binding corporate rules is available from the European Commission.]
I share your data with external third parties, as detailed below in Part 9, that are based outside of the EEA. The following safeguards are applied to such transfers:
I will only transfer your personal data to third countries whose levels of data protection are deemed ‘adequate’ by the European Commission. More information is available from the European Commission.]
I use specific contracts with external third parties that are approved by the European Commission for the transfer of personal data to third countries. These contracts require the same levels of personal data protection that would apply under the Data Protection Legislation. More information is available from the European Commission.
Where I transfer your data to a third party based in the US, the data may be protected if they are part of the EU-US Privacy Shield. This requires that third party to provide data protection to standards similar levels of data protection to those in Europe. More information is available from the European Commission.
Please contact me using the details below in Part 11 for further information about the particular data protection mechanisms used by me when transferring your personal data to a third country.
The security of your personal data is essential to me, and to protect your data, I take a number of important measures, including the following:
No access to your personal data to those employees, agents, contractors, and other third parties with a legitimate need to know and ensuring that they are subject to duties of confidentiality;
Procedures for dealing with data breaches (the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, your personal data) including notifying you and/or the Information Commissioner’s Office where I am legally required to do so;
Secure, transparent, and GDPR compliant IT and hosting providers and third-parties (Google and their services).
Encryption and SSL.
Two-Factor Authentication in all cloud and desktop application which may have access to this site and your personal data.
The data are collected in a way that cannot be combined or processed in any way to identify a specific person.
9. Do You Share My Personal Data?
I will not share any of your personal data with any third parties for any purposes, subject to the following exceptions.
In some limited circumstances, I may be legally required to share certain personal data, which might include yours, if I am involved in legal proceedings or complying with legal obligations, a court order, or the instructions of a government authority.
If any of your personal data is shared with a third party, as described above, I will take steps to ensure that your personal data is handled safely, securely, and in accordance with your rights, my obligations, and the third party’s obligations under the law, as described above in Part 8.
If any personal data is transferred outside of the EEA, I will take suitable steps in order to ensure that your personal data is treated just as safely and securely as it would be within the UK and under the Data Protection Legislation, as explained above in Part 8.
In some limited circumstances, I may be legally required to share certain personal data, which might include yours, if I am involved in legal proceedings or complying with legal obligations, a court order, or the instructions of a government authority.
10. How Can I Access My Personal Data?
If you want to know what personal data I have about you, you can ask [us] OR [me] for details of that personal data and for a copy of it (where any such personal data is held). This is known as a “subject access request”.
All subject access requests should be made in writing and sent to the email or postal addresses shown in Part 11. To make this as easy as possible for you, a Subject Access Request Form is available for you to use. You do not have to use this form, but it is the easiest way to tell me everything I need to know to respond to your request as quickly as possible.
There is not normally any charge for a subject access request. If your request is ‘manifestly unfounded or excessive’ (for example, if you make repetitive requests) a fee may be charged to cover [our] OR [my] administrative costs in responding.
I will respond to your subject access request within less than one month and, in any case, not more than one month of receiving it. Normally, I aim to provide a complete response, including a copy of your personal data within that time. In some cases, however, particularly if your request is more complex, more time may be required up to a maximum of three months from the date I receive your request. You will be kept fully informed of my progress.
11. How Do I Contact You?
To contact me about anything to do with your personal data and data protection, including to make a subject access request, please use the following details:
Email address: firstname.lastname@example.org
Telephone number: +44 (0) 7831 129130
OR use our contact form
12. Changes to this Privacy Notice
I may change this Privacy Notice from time to time. This may be necessary, for example, if the law changes, or if I change my business in a way that affects personal data protection.
Any changes will be made available herein. This Privacy Notice was last updated on 28th of September 2020.
IT Security Policy
28 September 2020
This document sets out the measures to be taken to protect computer systems, devices, infrastructure, computing environment and any and all other relevant equipment (collectively, “IT Systems”) from damage and threats whether internal, external, deliberate, or accidental.
Where IT Partner/Third-Party/Contractor: Authorised and specialised partners and contractors by Robert Maurer.
Where main Partner: Google
2. Key Principles
All IT Systems are to be protected against unauthorised access.
All IT Systems are to be used only in compliance with relevant Website Policies.
All employees of the Company and any and all third parties authorised to use the IT Systems including, but not limited to, contractors and sub-contractors (collectively, “Users”), must ensure that they are familiar with this Policy and must adhere to and comply with it at all times.
All line managers must ensure that all Users under their control and direction must adhere to and comply with this Policy at all times as required under paragraph 2.3.
All data stored on IT Systems are to be managed securely in compliance with all relevant parts of EU Regulation 2016/679 General Data Protection Regulation (“GDPR”) and all other laws governing data protection whether now or in the future in force.
All data stored on IT Systems are to be classified appropriately (including, but not limited to, personal data). All data so classified must be handled appropriately in accordance with its classification.
All data stored on IT Systems shall be available only to those Users with a legitimate need for access.
All data stored on IT Systems shall be protected against unauthorised access and/or processing.
All data stored on IT Systems shall be protected against loss and/or corruption.
All IT Systems are to be installed, maintained, serviced, repaired, and upgraded by Google and Me or by secure and reputable third party/parties/contractors may from time to time authorise.
The responsibility for the security and integrity of all IT Systems and the data stored thereon (including, but not limited to, the security, integrity, and confidentiality of that data) lies with Me unless expressly stated otherwise.
All breaches of security pertaining to the IT Systems or any data stored thereon shall be reported and subsequently investigated by the IT Department.
All Users must report any and all security concerns relating to the IT Systems or to the data stored thereon immediately to Me.
3. Users and Contractors Responsibilities
ensuring that all IT Systems are assessed and deemed suitable for compliance with the Company’s security requirements;
ensuring that IT security standards within the Company are effectively implemented and regularly reviewed, working in consultation with the Me and reporting the outcome of such reviews;
ensuring that all Users are kept aware of the requirements of this Policy and of all related legislation, regulations, and other relevant rules whether now or in the future in force including, but not limited to, the GDPR and the Computer Misuse Act 1990.
assisting all Users in understanding and complying with this Policy;
providing all Users with appropriate support and training in IT security matters and use of IT Systems;
ensuring that all Users are granted levels of access to IT Systems that are appropriate for each User, taking into account their job role, responsibilities, and any special security requirements;
receiving and handling all reports relating to IT security matters and taking appropriate action in response;
taking proactive action, where possible, to establish and implement IT security procedures and raise User awareness;
assisting the IT Manager or IT Contractor or Third-Party in monitoring all IT security within the Company and taking all necessary action to implement this Policy and any changes made to this Policy in the future; and
ensuring that regular backups are taken of all data stored within the IT Systems at intervals and that such backups are stored at a suitable location onsite AND on cloud. All backups should be encrypted.
All Users must comply with all relevant parts of this Policy at all times when using the IT Systems.
All Users must use the IT Systems only within the bounds of UK law and must not use the IT Systems for any purpose or activity which is likely to contravene any UK law whether now or in the future in force.
Users must immediately inform Me and the IT third-party or contractor of any and all security concerns relating to the IT Systems.
Users must immediately inform the Me and the IT third-party or contractor of any other technical problems (including, but not limited to, hardware failures and software errors) which may occur on the IT Systems.
Any and all deliberate or negligent breaches of this Policy by Users will be handled as appropriate under the procedures.
4. Software Security Measures
All software in use on the IT Systems (including, but not limited to, operating systems, individual software applications, and firmware) will be kept up-to-date and any and all relevant software updates, patches, fixes, and other intermediate releases will be applied at the sole discretion of the IT Department. This provision does not extend to upgrading software to new ‘major releases’ (e.g. from version 1.0 to version 2.0), only to updates within a particular major release (e.g. from version 1.0 to version 1.0.1 etc.). Unless a software update is available free of charge it will be classed as a major release, falling within the remit of new software procurement and outside the scope of this provision.
Where any security flaw is identified in any software that flaw will be either fixed immediately or the software may be withdrawn from the IT Systems until such time as the security flaw can be effectively remedied.
No Users may install any software of their own, whether that software is supplied on physical media or whether it is downloaded, without the approval of the IT Manager/Contractor. Any software belonging to Users must be approved by the IT Manager/Contractor and may only be installed where that installation poses no security risk to the IT Systems and where the installation would not breach any licence agreements to which that software may be subject.
All software will be installed onto the IT Systems by the IT Department unless an individual User is given written permission to do so by the IT Manager. Such written permission must clearly state which software may be installed and onto which computers or device(s) it may be installed.
5. Anti-Virus Security Measures
Most IT Systems (including all computers and servers) will be protected with suitable anti-virus, firewall, and other suitable internet security software. All such software will be kept up-to-date with the latest software updates and definitions.
All IT Systems protected by anti-virus software will be subject to a full system scan at least daily.
All physical media (e.g. USB memory sticks or disks of any kind) used by Users for transferring files must be virus-scanned before any files may be transferred. Such virus scans shall be performed.
All files downloaded from any cloud storage system must be scanned for viruses during the download process.
Any files being sent to third parties outside the Company, whether by email, on physical media, or by other means (e.g. shared cloud storage) must be scanned for viruses before being sent or as part of the sending process, as appropriate. All email attachments are scanned automatically upon sending.
Where any virus is detected by a User this must be reported immediately to Me (this rule shall apply even where the anti-virus software automatically fixes the problem). The IT Contractor or Third-Party shall promptly take any and all necessary action to remedy the problem. In limited circumstances this may involve the temporary removal of the affected computer or device. Wherever possible a suitable replacement computer or device will be provided immediately to limit disruption to the User.
If any virus or other malware affects, is likely to affect, or is suspected to affect any personal data, in addition to the above, the issue must be reported immediately to Me.
Where any User deliberately introduces any malicious software or virus to the IT Systems this will constitute a criminal offence under the Computer Misuse Act 1990 and will be handled as appropriate under the Company’s disciplinary procedures.
6. Hardware Security Measures
Wherever practical, IT Systems will be located in rooms which may be securely locked when not in use or, in appropriate cases, at all times whether in use or not (with authorised Users being granted access by means of a key, smart card, door code or similar). Where access to such locations is restricted, Users must not allow any unauthorised access to such locations for any reason.
All IT Systems not intended for normal use by Users (including, but not limited to, servers, networking equipment, and network infrastructure) shall be located, wherever possible and practical, in secured, climate-controlled rooms and/or in locked cabinets which may be accessed only by designated members of the IT Partner/Third-Party/Contractor.
No Users shall have access to any IT Systems not intended for normal use by Users (including such devices mentioned above) without the express permission of the IT Manager. Under normal circumstances, whenever a problem with such IT Systems is identified by a User, that problem must be reported to the IT Department. Under no circumstances should a User attempt to rectify any such problems without the express permission (and, in most cases, instruction and/or supervision) of the IT Partner/Third-Party/Contractor.
All non-mobile devices (including, but not limited to, desktop computers, workstations, and monitors) shall, wherever possible and practical, be physically secured in place with a suitable locking mechanism. Where the design of the hardware allows, computer cases shall be locked to prevent tampering with or theft of internal components.
All mobile devices (including, but not limited to, laptops, tablets, and smartphones) should always be transported securely and handled with care. In circumstances where such mobile devices are to be left unattended they should be placed inside a lockable case or other suitable container. Users should make all reasonable efforts to avoid such mobile devices from being left unattended at any location. If any such mobile device is to be left in a vehicle it must be stored out of sight and, where possible, in a locked compartment.
The IT Partner/Third-Party/Contractor shall maintain a complete asset register of all IT Systems. All IT Systems shall be labelled, and the corresponding data shall be kept on the asset register.
7. Access Security
Access privileges for all IT Systems shall be determined on the basis of Users’ levels of authority within the Site and the requirements of their job roles. Users shall not be granted access to any IT Systems or electronic data which are not reasonably required for the fulfilment of their job roles.
All IT Systems (and in particular mobile devices including, but not limited to, laptops, tablets, and smartphones) shall be protected with a secure password or passcode, or such other form of secure log-in system as the IT Partner/Third-Party/Contractor may deem appropriate and approve. Not all forms of biometric log-in are considered secure. Only those methods approved by the IT Partner/Third-Party/Contractor may be used.
All passwords must, where the software, computer, or device allows:
be at least 8 characters long;
contain a combination of upper and lower case letters, numbers, and symbols;
verified by authorised device or user;
use of Two-Factor Authentication; and
be created by individual Users.
Passwords should be kept secret by each User. Under no circumstances should a User share their password with anyone, including the IT Partner/Third-Party/Contractor. No User will be legitimately asked for their password by anyone at any time and any such request should be refused. If a User has reason to believe that another individual has obtained their password, they should change their password immediately.
If a User forgets their password, this should be reported to the IT Partner/Third-Party/Contractor. The latter will take the necessary steps to restore the User’s access to the IT Systems which may include the issuing of a temporary password which may be fully or partially known to the member of the IT Staff responsible for resolving the issue. A new password must be set up by the User immediately upon the restoration of access to the IT Systems.
Users should not write down passwords if it is possible to remember them. If a User cannot remember a password, it should be stored securely (e.g. in a locked drawer or in a secure password database) and under no circumstances should passwords be left on display for others to see (e.g. by attaching a note to a computer display).
All IT Systems with displays and user input devices (e.g. mouse, keyboard, touchscreen etc.) shall be protected, where possible, with a password protected screensaver that will activate after 60 seconds of inactivity. This time period cannot be changed by Users and Users may not disable the screensaver. Activation of the screensaver will not interrupt or disrupt any other activities taking place on the computer (e.g. data processing).
All mobile devices (including, but not limited to, laptops, tablets, and smartphones) provided by the Company shall be set to lock, sleep, or similar, after 60 seconds of inactivity, requiring a password, passcode, or other form of log-in to unlock, wake, or similar. Users may not alter this time period.
Users may not use any software which may allow outside parties to access the IT Systems without the express consent of the IT Partner/Third-Party/Contractor. Any such software must be reasonably required by the User for the performance of their job role and must be fully inspected and cleared by the IT Partner/Third-Party/Contractor and Me.
8. Data Storage Security
All data, and in particular personal data, should be stored securely using passwords and data encryption.
All data stored electronically on physical media, and in particular personal data, should be stored securely in a locked box, drawer, cabinet, or similar.
No personal data should be stored on any mobile device (including, but not limited to, laptops, tablets, and smartphones), whether such device belongs to the Site.
No data, and in particular personal data, should be transferred to any computer or device personally belonging to a User unless the User in question is a contractor or sub-contractor working on behalf of the Company and that User has agreed to comply fully with the Company’s Data Protection Policy and the GDPR.
8. Data Protection
All personal data (as defined in the GDPR) collected, held, and processed by the Company will be collected, held, and processed strictly in accordance with the principles of the GDPR, the provisions of the GDPR and the Company’s Data Protection Policy.
All Users handling data for and on behalf of the Company shall be subject to, and must comply with, the provisions of the Company’s Data Protection Policy at all times. In particular, the following shall apply:
All emails containing personal data must be encrypted ;
All emails containing personal data must be marked “confidential”;
Personal data may be transmitted over secure networks only; transmission over unsecured networks is not permitted under any circumstances;
Personal data may not be transmitted over a wireless network if there is a wired alternative that is reasonably practicable;
Personal data contained in the body of an email, whether sent or received, should be copied directly from the body of that email, and stored securely. The email itself should be deleted. All temporary files associated therewith should also be deleted;
All personal data to be transferred physically, including that on removable electronic media, shall be transferred in a suitable container marked “confidential”.
Where any confidential or personal data is being viewed on a computer screen and the computer in question is to be left unattended for any period of time, the User must lock the computer and screen before leaving it.
Any questions relating to data protection should be referred to Me (Email: email@example.com).
9. Internet and Email Use
All Users shall be subject to, and must comply with, the provisions of the Company’s Communications, Email and Internet Policy when using the IT Systems.
Where provisions in this Policy require any additional steps to be taken to ensure IT security when using the internet or email over and above the requirements imposed by the Communications, Email and Internet Policy, Users must take such steps as required.
10. Reporting IT Security Breaches
Subject to paragraph 12.2, all concerns, questions, suspected breaches, or known breaches shall be referred immediately to Me.
Upon receiving a question or notification of a breach, the IT Partner/Third-Party/Contractor shall immediately assess the issue including, but not limited to, the level of risk associated therewith, and shall take any and all such steps as the IT Partner/Third-Party/Contractor deems necessary to respond to the issue.
Under no circumstances should a User attempt to resolve an IT security breach on their own without first consulting the IT Partner/Third-Party/Contractor . Users may only attempt to resolve IT security breaches under the instruction of, and with the express permission of, the IT Partner/Third-Party/Contractor.
All IT security breaches, whether remedied by the IT Partner/Third-Party/Contractor or by a User shall be fully documented.
11. Policy Review
The Site shall review this Policy not less than one year and otherwise as required in order to ensure that it remains up-to-date and fit for purpose. All questions, concerns, and other feedback relating to this Policy should be communicated to the IT Partner/Third-Party/Contractor and Me.
12 Implementation of Policy
This Policy shall be deemed effective as of 28 September 2020. No part of this Policy shall have retroactive effect and shall thus apply only to matters occurring on or after this date.
This Policy has been approved and authorised by:
Name: Robert Maurer
Position: Owner and operator of the Site tectonic-forces.org
Date: 28 September 2020
Acceptable Usage Policy
By Using Our Site You Accept The Terms of this Policy
Please read this Acceptable Usage Policy carefully and ensure that you understand it before using Our Site. Our Acceptable Usage Policy sets out standards which apply to your use of this website, www.tectonic-forces.org (“Our Site”) when communicating via Our Site, or otherwise interacting with it. It is recommended that you print a copy of this Policy for your future reference.
This Policy was last updated on 28 September 2020.
Your agreement to comply with this Policy is indicated by your use of Our Site. If you do not agree to this Policy, you must stop using Our Site immediately.
The following document[s] also apply to your use of Our Site:
Our Policies, Resources, and tools under the GDPR Centre section.
1. Definitions and Interpretation
In this Policy, unless the context otherwise requires, the following expressions have the following meanings:
“content” or “Content”: means any and all text, images, audio, video, scripts, code, software, databases, and any other form of information capable of being stored on a computer that appears on, or forms part of, Our Site;
“User”: means a user of Our Site; [and]
“We/Us/Our” means Robert Maurer and authorised third-parties and contractors by him.
2. Information About Us
Our Site is operated by Robert Maurer of address Uxbridge, Middlesex, UB8 3AD, U.K.
The exclusive mission of this Site is the support to the academic research, knowledge and scientific information
3. How to Contact Us
To contact Us, please email Us at firstname.lastname@example.org or use the contact form.
4. Changes to this Policy
We may alter the terms of this Policy at any time. If We do so, details of the changes will be highlighted at the top of this page. As explained above, your use of Our Site constitutes your acceptance of this Policy. Consequently, any changes made to this Policy will apply to your use of Our Site the first time you use it after the changes have been implemented. You are therefore advised to check this page every time you use Our Site.
If any part of the current version of this Policy conflicts with any previous version(s), the current version shall prevail unless We explicitly state otherwise.
5. Acceptable Usage of Our Site
You may only use Our Site in a lawful manner:
You must ensure that you comply fully with any and all local, national, or international laws and regulations that apply;
You must not use Our site in any way, or for any purpose, that is unlawful or fraudulent;
You must not use Our Site to knowingly send, upload, or in any other way transmit data that contains any form of virus or other malware or any other code designed to adversely affect computer hardware, software, or data of any kind;
You must not use Our Site to knowingly send, upload, or in any other way transmit unauthorised or unsolicited marketing or similar material (commonly referred to as “spam”);
You must not use Our Site to bully, threaten, harass, intimidate, insult, annoy, alarm, inconvenience, upset, or embarrass another person;
You must not use Our Site to harm or attempt to harm minors in any manner; and
You must not use Our Site [, submit User Content,] or communicate in any way using Our Site that does not comply with the content standards set out below in Part 7.
7. Interactive Services
The following interactive services are available on Our Site:
forums and discussion pages.
If We provide any kind of interactive service, clear information will be provided about that service. In particular, We will inform you of any moderation and whether that moderation is automated or carried out by people.
We are under no obligation to monitor, moderate, or in any other manner oversee any interactive services provided on Our Site. We hereby exclude any and all liability for any loss or damage arising out of the use of such interactive services by a User who breaches the content standards set out below in Part 7, whether We monitor the interactive service or not.
Minors may not use the interactive service(s) provided on Our Site with the consent and supervision of their parent or guardian.
8. Content Standards
When communicating via Our Site, or otherwise interacting with Our Site, you must not submit, communicate, or otherwise do anything that:
is sexually explicit;
in any way sexualises minors (including, but not limited to, child sexual abuse material);
is obscene, deliberately offensive, hateful, or otherwise inflammatory;
promotes, encourages, incites, or supports acts of terrorism;
promotes or assists in any form of unlawful activity;
is defamatory of another person;
bullies, insults, intimidates, or humiliates another person;
discriminates against, or is in any way defamatory of, any person, group, or class of persons; race; nationality; gender; gender identity; sexual orientation; religious or philosophical beliefs; disability; or age;
is intended or otherwise likely to threaten, harass, annoy, alarm, inconvenience, upset, or embarrass another person;
is calculated or otherwise likely to deceive;
is intended or otherwise likely to infringe (or threaten to infringe) another person’s right to privacy or otherwise uses their personal information in a way that you do not have a right to;
misleadingly impersonates any person or otherwise misrepresents your identity or affiliation in a way that is calculated to deceive (obvious parodies are not included in this definition provided that they do not breach any of the other content standards in this Part 7);
implies any form of affiliation with Us or any other party where there is none;
infringes, or assists in the infringement of, the intellectual property rights (including, but not limited to, copyright, designs, patents, trade marks, and database rights) belonging to Us or any other party;
is in breach of any legal duty owed to another party including, but not limited to, contractual duties and duties of confidence.
When communicating via Our Site, uploading User Content, or otherwise interacting with Our Site, you must ensure that your communication or submission:
is truthful and accurate (where you are stating facts);
states only genuinely held opinions; and
complies fully with any and all local, national, or international laws and regulations that apply.
9. Breaches of this Policy
Suspend or terminate your right to use Our Site;
Remove, either temporarily or permanently, your communication [, User Content,] or other submission from Our Site;
Issue you with a written warning;
Take legal proceedings against you for reimbursement of any and all relevant costs on an indemnity basis resulting from your breach;
Take further legal action against you, as appropriate;
Disclose such information to law enforcement authorities as required or as We deem reasonably necessary; and/or
Any other actions which We deem reasonably appropriate (and lawful).
We hereby exclude any and all liability arising out of any actions that We may take (including, but not limited to those set out above in Part 8.1) in response to your breach.
10. Law and Jurisdiction
This Policy, and the relationship between you and Us (whether contractual or otherwise) shall be governed by, and construed in accordance with, English law.
If you are a consumer, you will benefit from any mandatory provisions of the law in your country of residence. Nothing in Part 9.1 takes away from or reduces your legal rights as a consumer.
If you are a consumer, any dispute, controversy, proceedings, or claim between you and Us relating to this Policy or to the relationship between you and Us (whether contractual or otherwise) shall be subject to the jurisdiction of the courts of England, Wales, Scotland, or Northern Ireland, as determined by your residency.
If you are a business user, any dispute, controversy, proceedings, or claim between you and Us relating to this Policy or to the relationship between you and Us (whether contractual or otherwise) shall be subject to the exclusive jurisdiction of the courts of England and Wales.
Resources about Personal Data Privacy
Guide to the General Data Protection Regulation (GDPR) [External link to ico.org.uk]
Data Protection in the EU [External link to ec.europa.eu]
California Consumer Privacy Act (CCPA) [External link to oag.ca.gov/privacy/ccpa]