Data Security Statement
At Tooligo, we take the protection of our users' personal data seriously. We apply appropriate technical and organisational measures to ensure that personal data is processed securely and only when necessary. This statement explains how we protect your data and the security measures we have in place.
1. Infrastructure and Server Security
The Tooligo platform stores personal data in secure, industry-standard data centres operated by trusted service providers. All data transmitted between your device and our systems is protected using strong encryption protocols (TLS/SSL 256-bit).
2. Access Controls
Access to personal data is restricted to authorised personnel only and granted on a need-to-know basis. Different access levels are defined according to roles and responsibilities, and all access activities are logged and monitored.
3. Backup and Recovery
Critical data is regularly backed up to ensure availability and resilience. Backups are stored securely and can be restored promptly in the event of data loss, system failure or incident.
4. Protection Against Unauthorised Access and Cyber Attacks
Tooligo employs firewalls, monitoring tools and intrusion detection mechanisms to protect systems against unauthorised access, malware and other cyber threats. In the event of a suspected or confirmed security incident, an incident response procedure is activated without delay.
5. Staff Awareness and Training
Data security also depends on people. Tooligo ensures that employees and authorised contractors receive regular training on information security, data protection obligations and secure data handling practices.
6. Personal Data Breach Notification
In the event of a personal data breach that is likely to result in a risk to individuals' rights and freedoms, Tooligo will:
• notify the Information Commissioner's Office (ICO) without undue delay and, where required, within 72 hours, and
• inform affected users in accordance with applicable legal requirements.
7. Continuous Improvement
Tooligo regularly reviews and updates its security practices, policies and infrastructure in line with technological developments, regulatory guidance and risk assessments. Protecting the confidentiality, integrity and availability of our users' data remains a core priority.