If you wish to engage with me personally and want to do this via the e-mail contact form you are required to supply your name and e-mail address. When your e-mail arrives in my inbox I have your name, e-mail address, and if supplied, your telephone number. I therefore conclude that you wish me to make contact with you. The contact form also supplies your IP address. The only reason for this is to manage a potential bulk spam situation and your IP address is not retained by me.
If you decide to work with me I will ask for your permission to transfer your contact details to a cloud based contact management system, Sticky Prospect. My account is password protected. If you decide you no longer wish to work with me I will delete all your data from Sticky Prospect, (www.stickyprospect.com).
Here is Sticky Prospect's own policy in relation to privacy and GDPR:
Restricting access to confidential data - Data on our servers is password protected at both the database level and server level. Access to the databases is limited only to the personnel who require it, and likewise for the server maintenance. Each database uses a unique password to enhance security and minimise access in the unlikely event one database should ever be compromised.
Security arrangements - Data transfer between a client and our servers is encrypted using SSL. All data transfer between the web application and database occurs within the same server environment and is not accessed from other machines. Access to web systems is protected by a username and password combination using up to date Microsoft technologies on the back end. Data backups are taken nightly (full backup) and hourly (differential backup). This data is encrypted by password and stored in two locations - on an internal server protected by password, and on Amazon's S3 data servers which is protected by a key and secret combination and additionally encrypted at the file system level. These arrangements are reviewed and tested regularly.
Subject access request - On requesting information about the data stored about an individual, after verifying their identity, we will provide them with a detailed breakdown of what and how we store this data.