At Chamberlains, the privacy of our Clients, potential Clients and operatives is of the utmost importance. We do not compromise in any way the integrity of any company or individual who contacts us by the use of gained information. As a front line security company, we do not pass any information about anyone, to anyone, at any time, for any purpose or reason whatsoever.
Storage of your Information
No sensitive information is stored on any electronic device that can be connected to the internet, forwarded or sold to third parties. No information is used to sell, promote, market or make contact with any person or company that contacts Chamberlains.
No information is stored electronically, except information that is used for the day to day running of the business and other operational procedures that are necessary. This will include company name and address, telephone number and contact information. This is for our personal contact and invoicing and at no time available for outside interested parties. At the termination of any contract, any records in our possession are cross-cut shredded and any keys returned by ourselves manually
Credit card details.
We do not store your debit or credit card details. All invoices are emailed to your chosen email address
No financial information is kept electronically or manually concerning any person, company or any other body for any purpose whatsoever except for invoicing with Sage Accounting software. If a credit search is undertaken then this information is not stored.
As we only operate in the West Midlands, we do not require to keep your demographic details for marketing or sales purposes. Only on-going operational details that are necessary are stored.
If you require us to be key holders, first responders or both, then it is necessary to hold certain information. This will include contact numbers, addresses and alarm codes. It will also include the holding of keys. This is done under the British Standard that is applicable to this industry and has 'need to know' circulation within our business. All persons who have access to this information are tracked and reconciled through a vigorous audit trail. All keys and access information (such as alarm codes, addresses etc) are kept under code only access which is restricted and monitored.