Regal Software Privacy Policy

1.0 Our core beliefs regarding user privacy and data protection

2.0 Relevant legislation

Along with our business and internal computer systems, this website is designed to comply with the following national and international legislation with regards to data protection and user privacy:

This site’s compliance with the above legislation, all of which are stringent in nature, means that this site is likely compliant with the data protection and user privacy legislation set out by many other countries and territories as well. If you are unsure about whether this site is compliant with your own country of residences’ specific data protection and user privacy legislation you should contact our data protection officer (details of whom can be found in section 9.0) for clarification.

3.0 Personal information that this website collects and why we collect it

This website collects and uses personal information for the following reasons:

3.1 Site logging

By visiting this website your computer’s IP address (which could be used to personally identify you) is logged by our server. These logs are used to ensure there is no abuse of the service (e.g. banning IP addresses which try to cause a Denial of Service attack).

3.2 Contact forms and email links

Should you choose to contact us using the contact form on our Contact us page or an email link like this one, none of the data that you supply will be stored by this website but will be passed to, and/or be processed by, the Microsoft Exchange Online third party data processor as defined in section 6.0. The data will be collated into an email and sent to us over the Simple Mail Transfer Protocol (SMTP). The Microsoft Exchange Online SMTP servers are protected by TLS (sometimes known as SSL) meaning that the email content is encrypted using SHA-2, 256-bit cryptography before being sent across the internet. The email content is then decrypted by the Microsoft Exchange Online servers. However, not all mail servers are secured in such a way. Therefore, we would suggest that you always consider email as an insecure medium and not include personal, confidential or otherwise sensitive information within an email.

4.0 How we store your personal information

As detailed in section 3.1 above, if you visit this website some personal information will be stored within the server logs. Your IP Address will be stored in a plain text format for an initial 24 hour period and, under normal circumstances, can only be accessed by our server operators who have the highest system privileges. After 24 hours the server logs are encrypted, these encrypted logs are retained for a further 30 days before being destroyed.

5.0 About this website’s server

This website is hosted by Real Hosts Ltd. within multiple UK data centres located just outside London.

Some of the data centre’s more notable security features are as follows:

All traffic (transferral of files) between this website and your browser is encrypted and delivered over HTTPS.

6.0 Our third party data processors

We use a number of third parties to process personal data on our behalf. These third parties have been carefully chosen and comply with the legislation set out in section 2.0.

7.0 Data Breaches

We will report any unlawful data breach of this website’s database or the database(s) of any of our third party data processors to any and all relevant persons and authorities within 72 hours of the breach if it is apparent that personal data stored in an identifiable manner has been stolen.

8.0 Data Controller

The data controller of this website is: Regal Software, a trading name of David A. King

Whose operating office is:
7A Woodside Crescent,

9.0 Data Protection Officer

Mr. David King
Owner, Regal Software
Telephone: 07957 936533
Email: [email protected]

10.0 Changes to our privacy policy

This privacy policy may change from time to time inline with legislation or industry developments. We will not explicitly inform our clients or website users of these changes. Instead, we recommend that you check this page occasionally for any policy changes. Specific policy changes and updates are mentioned in the change log below.

10.1 Change log