Security and GDPR

Last updated: 31st Dec 2023

Security of your data is our first priority and this page outlines some of our operating procedures and security practices.

Definitions

We, our, us - Online Youth Manager Ltd.

You, your, user - a person logging on via the Leader's Login page.

Support team - our employees or contractors who have access to provide support to you.

Confidentiality

We place strict access controls over your data and are committed to ensuring that nobody has access to your data that shouldn't.

If you contact our support team, you will grant them temporary access to your section(s) so that they can provide support to you. Members of our support team are vetted and have strict rules and controls about what they can do with their access, and their usage is monitored. They cannot access your section(s) unless you contact support.

The operation of our systems requires that some of our employees and contractors have access to the systems that store and process your data. Our employees and contractors are prohibited from using this access to view your data unless absolutely required.

Our employees undergo periodic data, security and privacy training, and they are bound by Non Disclosure Agreements.

Security Features

Logging

Usage of our system by users, the support team, employees and contractors is logged. We track every login, including the time, device details, IP address and a fingerprint of the device. This data is automatically purged after a period of time.

Access

We have a password policy requiring passwords to be at least 12 characters with two different types of characters, and that the password is not in the top 10,000 commonly used passwords. Passwords are stored using a non-reversible method.

We have a compulsory secondary layer of authentication that requires all users to enter certain characters from an answer to a security question when they logon on a new device (if they aren't using Two Factor Authentication). The available security questions are obscure and are unlikely to be known by others (e.g. "Mother's maiden name" is not an option).

If users forget their credentials, they can only reset their password after receiving an email with a time-restricted link. If they have forgotten their security answer, they can only reset their password after a text message/phone-call with a verification code.

Users can opt to use Two Factor Authentication that provides them with a code that expires in 60 seconds.

Users are automatically logged out of the system after a period of inactivity.

Users who attempt to login with invalid credentials too many times will be temporarily blocked from the system.

Users are encouraged to periodically review their access control lists to ensure fellow users have the right access.

External Audits

We contract respected security firms to perform 'penetration testing' (sometimes known as 'ethical hacking') to ensure that data can only be seen be the right people.

Infrastructure

Physical Locations

Our data is replicated in two separate data-centres in London to ensure that we can provide business continuity.

Data

We do not share personal data to third-parties with the exception of text messaging, email providers, and payment providers for the instances where users send text messages, emails, and when payments are collected via the payment providers.

We are not responsible for the data that users add within the system, including its accuracy. This includes, but is not limited to, contents of external links, activities, emails, downloads and attachments.

Mobile System

Our mobile system stores data for offline use by users - sensitive personal data is encrypted on their device.

The system automatically removes data held on the device when the user no longer has access to the section. In the event of a device being lost, users can contact our support team to tell the device to remove its data when it is next used online.

Encryption

Our data is encrypted in transit and at rest.

Database backups are encrypted individually and off-site backups have full-disk encryption too.

Our employees' computers have full-disk encryption (although your data is not stored on employees' devices).

Intrusion Detection Systems

We have systems that monitor the usage and automatically block users who appear to be malicious.

Firewalls and Software Patching

Firewalls are configured according to industry best practices and all unnecessary ports are blocked.

We perform automated network vulnerability scanning and software patching.

Backups

Database and filesystem backups are taken daily, and are stored for a week.

Weekly database backups are sent off-site and stored for six months.

Monthly database backups are stored indefinitely.

Daily filesystem backups are sent off-site and stored for one week.

Legal Jurisdiction

We operate under the laws of England and Wales.

Payment Providers

Braintree Payments

Users may pay for services using a credit or debit card. We use Braintree Payments to process the data - we do not store any cardholder data.

Data Subject Rights (GDPR)

Breach Notification

We will notify our users of any breach of data via email within 72hrs of identifying the breach.

Right to Access

Users are able to download information about members if required, and the support team can provide assistance if the downloads are not sufficient.

Right for Erasure

Users are able to delete all personal data with the exception of the audit trail. Users can contact the support team for 'Right for Erasure' requests.

Data Portability

Users can download personal information in a spreadsheet format. It should be noted that this requirement is only applicable if you use 'consent' for your lawful processing mechanism. 'Legitimate interests' is likely to be more appropriate and therefore consent is not required, as the data provided by parents is expected to be stored and processed for the purposes of running a Group/Unit and its associated events.

Privacy by Design

Our system is always designed with privacy as our top priority. Features are tested manually by our expert development teams, automatically as part of the development & deploy process, and through external security audits.

Data Protection Officer

Evalian Limited act as our Data Protection Officer. They can be contacted via the Contact Us pages.