This Policy establishes requirements for The Company’s compliance and preparation for GDPR with information security policies, standards, procedures, guidelines and applicable laws and regulations.
2 Policy Statement
To ensure that all its staff and business operations comply with rules, regulations, customs and practices within Irish, EU Law and GDPR guidelines, Employment contracts and terms must ensure Data protection and GDPR instructions.
2.1 Compliance Policy
2.1.1 COMPLIANCE WITH LEGAL REQUIREMENTS
188.8.131.52 THE DESIGN, OPERATION MANAGEMENT AND USE OF LSS INFORMATION SYSTEMS AND RELATED FACILITIES MUST COMPLY WITH ALL APPLICABLE LEGAL, REGULATORY OR CONTRACTUAL SECURITY REQUIREMENTS.
184.108.40.206 THE SYSTEM SECURITY DOCUMENTATION FOR EACH INFORMATION SYSTEM MUST INCLUDE STATUTORY, REGULATORY AND CONTRACTUAL REQUIREMENTS ASSOCIATED WITH THE SYSTEM AND PROCEDURES TO ASSURE COMPLIANCE WITH THE REQUIREMENTS IDENTIFIED IN ACCORDANCE WITH PARAGRAPH 220.127.116.11 ABOVE.
2.1.2 INTELLECTUAL PROPERTY RIGHTS
18.104.22.168 LSS WILL RECOGNIZE AND RESPECT INTELLECTUAL PROPERTY RIGHTS ASSOCIATED WITH ITS INFORMATION SYSTEMS AND THEIR BUSINESS PARTNERS.
22.214.171.124 THE COMPANY MUST COMPLY WITH:
Copyright requirements associated with proprietary material, software, and designs used or acquired by LSS.
Licensing requirements limiting the usage of products, software, designs and other material used or acquired by LSS.
126.96.36.199 THE COMPANY MUST ENSURE CONTINUED COMPLIANCE WITH PRODUCT COPYRIGHT RESTRICTIONS AND LICENSING REQUIREMENTS.
2.1.3 SAFEGUARDING OF ORGANIZATIONAL RECORDS
188.8.131.52 THE COMPANY ORGANIZATIONAL RECORDS RELATING TO INFORMATION SECURITY MUST BE PROTECTED AND STORED IN ACCORDANCE WITH LSS CORPORATE POLICY ON MAINTENANCE OF SUCH RECORDS AND THE REQUIREMENTS OF APPLICABLE LAWS AND GOVERNMENTAL REGULATIONS.
The company organizational records relating to information security include but are not limited to system logs, audit logs, configuration setting records, change control logs, user access authorization documentation, etc in electronic or hard-copy format.
184.108.40.206 THE RECORDS SHOULD BE AFFORDED PROTECTION BASED ON THE RELEVANCE AND IMPORTANCE OF THE RECORDS, AND SHALL BE STORED IN A MANNER APPROPRIATE TO THE MEDIA ON WHICH THEY ARE RECORDED. FOR MORE INFORMATION ON SELECTING AN APPROPRIATE PROTECTION AND MEDIA, REFER TO THE BACKUP AND STORAGE GUIDELINES.
2.1.4 COLLECTION OF EVIDENCE
220.127.116.11 EVIDENCE COLLECTED FOR THE PURPOSES OF PRESENTATION IN A COURT OF LAW DURING A CIVIL OR CRIMINAL ACTION SHALL BE COLLECTED IN CONFORMANCE WITH A FORENSIC EVIDENCE METHODOLOGY AND APPLICABLE TO THE LAW AND THE RELEVANT COURT OF LAW IN WHICH THE EVIDENCE IS TO BE PRESENTED.
2.1.5 TECHNICAL COMPLIANCE CHECKING
18.104.22.168 THE COMPANY’S INFORMATION SYSTEMS IMPLEMENTATIONS AND ASSOCIATED DOCUMENTATION MUST BE REVIEWED IMMEDIATELY AFTER IMPLEMENTATION AND THEREAFTER ON AN ANNUAL BASIS TO VERIFY THAT THEY ARE COMPLIANT WITH THE COMPANY’S SECURITY STANDARDS AND SYSTEM SECURITY DOCUMENTATION DEVELOPED FOR EACH INDIVIDUAL SYSTEM.
22.214.171.124 A COMPLIANCE REVIEW MUST BE PERFORMED BY APPROPRIATELY QUALIFIED PERSONNEL; THEREFORE, THERE SHOULD BE ADEQUATE SEGREGATION OF DUTIES BETWEEN THE SYSTEM ENGINEERS/ADMINISTRATORS, SYSTEM OPERATORS AND SYSTEM AUDITORS.
2.1.6 DETECTION OF NON-COMPLIANCE
126.96.36.199 ALL PERSONNEL WHO DETECT ANY NON-COMPLIANCE ISSUE MUST IMMEDIATELY REPORT IT TO THE IT MANAGER AND GENERAL MANAGER. THEY SHOULD NOT CONTACT ANY EXTERNAL AUTHORITIES WITHOUT PRIOR AUTHORIZATION FROM THE COMPANY MANAGEMENT.
188.8.131.52 ALL PERSONNEL MUST FOLLOW A PLAN DEFINED BY THE COMPANY MANAGEMENT FOR REPORTING NON-COMPLIANCE ISSUES AND SHOULD NOT INVESTIGATE ON HIS OWN.
2.2 Information Systems Audits
2.2.1 TIMING OF INFORMATION SYSTEMS AUDITS
184.108.40.206 AUDITS OF OPERATIONAL INFORMATION SYSTEMS SHALL BE PLANNED AND PERFORMED AT PERIODIC INTERVALS WITH THE AGREEMENT OF THE INFORMATION SYSTEMS’ OWNER AND SUCH AS TO MINIMIZE THE RISK OF DISRUPTION TO BUSINESS PROCESSES. FOR THAT PURPOSE, AUDITS HAVE TO BE PERFORMED IN ACCORDANCE WITH THE THE COMPANY CHANGE MANAGEMENT POLICY.
2.2.2 USAGE OF SYSTEM AUDIT TOOLS
220.127.116.11 THE USAGE OF SYSTEM AUDIT TOOLS IS TO BE SUBJECT TO AUTHORIZATION, RESTRICTIONS, AND CONTROLS TO BE IN ACCORDANCE WITH SPECIFIC GUIDELINES FOR THIS PURPOSE.
The objective of this section is:
To maximize the effectiveness of the audit,
To prevent the possible misuse of system audit tools (for example to extract confidential information without appropriate authorization),
To ensure that the integrity of the information system and associated data is maintained and
To avoid possible disruptions to the information systems as a result of the usage of such tools
Systems audit tools include monitoring software, data extraction and manipulation software and utilities that may or may not be an intrinsic part of an information systems software suite.
SECTION 1 – WHAT DO WE DO WITH YOUR INFORMATION?
When you purchase something from our store, as part of the buying and selling process, we collect the personal information you give us such as your name, address and email address.
When you browse our store, we also automatically receive your computer’s internet protocol (IP) address in order to provide us with information that helps us learn about your browser and operating system.
Email marketing (if applicable): With your permission, we may send you emails about our store, new products and other updates.
SECTION 2 – CONSENT
How do you get my consent?
When you provide us with personal information to complete a transaction, verify your credit card, place an order, arrange for a delivery or return a purchase, we imply that you consent to our collecting it and using it for that specific reason only.
If we ask for your personal information for a secondary reason, like marketing, we will either ask you directly for your expressed consent, or provide you with an opportunity to say no.
How do I withdraw my consent?
If after you opt-in, you change your mind, you may withdraw your consent for us to contact you, for the continued collection, use or disclosure of your information, at anytime, by contacting us at [email protected] or mailing us at:
GASOLINE URBAN CASUALS
Unit 285 Block G
Blanchardstown Corporate Park 2
SECTION 3 – DISCLOSURE
We may disclose your personal information if we are required by law to do so or if you violate our Terms of Service.
SECTION 4 – SHOPIFY
Our store is hosted on Shopify Inc. They provide us with the online e-commerce platform that allows us to sell our products and services to you.
Your data is stored through Shopify’s data storage, databases and the general Shopify application. They store your data on a secure server behind a firewall.
If you choose a direct payment gateway to complete your purchase, then Shopify stores your credit card data. It is encrypted through the Payment Card Industry Data Security Standard (PCI-DSS). Your purchase transaction data is stored only as long as is necessary to complete your purchase transaction. After that is complete, your purchase transaction information is deleted.
All direct payment gateways adhere to the standards set by PCI-DSS as managed by the PCI Security Standards Council, which is a joint effort of brands like Visa, Mastercard, American Express and Discover.
PCI-DSS requirements help ensure the secure handling of credit card information by our store and its service providers.
For more insight, you may also want to read Shopify’s Terms of Service (https://www.shopify.com/legal/terms) or Privacy Statement (https://www.shopify.com/legal/privacy).
SECTION 5 – THIRD-PARTY SERVICES
In general, the third-party providers used by us will only collect, use and disclose your information to the extent necessary to allow them to perform the services they provide to us.
However, certain third-party service providers, such as payment gateways and other payment transaction processors, have their own privacy policies in respect to the information we are required to provide to them for your purchase-related transactions.
For these providers, we recommend that you read their privacy policies so you can understand the manner in which your personal information will be handled by these providers.
In particular, remember that certain providers may be located in or have facilities that are located a different jurisdiction than either you or us. So if you elect to proceed with a transaction that involves the services of a third-party service provider, then your information may become subject to the laws of the jurisdiction(s) in which that service provider or its facilities are located.
As an example, if you are located in Canada and your transaction is processed by a payment gateway located in the United States, then your personal information used in completing that transaction may be subject to disclosure under United States legislation, including the Patriot Act.
When you click on links on our store, they may direct you away from our site. We are not responsible for the privacy practices of other sites and encourage you to read their privacy statements.
SECTION 6 – SECURITY
To protect your personal information, we take reasonable precautions and follow industry best practices to make sure it is not inappropriately lost, misused, accessed, disclosed, altered or destroyed.
If you provide us with your credit card information, the information is encrypted using secure socket layer technology (SSL) and stored with a AES-256 encryption. Although no method of transmission over the Internet or electronic storage is 100% secure, we follow all PCI-DSS requirements and implement additional generally accepted industry standards.
SECTION 7 – COOKIES
Here is a list of cookies that we use. We’ve listed them here so you that you can choose if you want to opt-out of cookies or not.
_session_id, unique token, sessional, Allows Shopify to store information about your session (referrer, landing page, etc).
_shopify_visit, no data held, Persistent for 30 minutes from the last visit, Used by our website provider’s internal stats tracker to record the number of visits
_shopify_uniq, no data held, expires midnight (relative to the visitor) of the next day, Counts the number of visits to a store by a single customer.
cart, unique token, persistent for 2 weeks, Stores information about the contents of your cart.
_secure_session_id, unique token, sessional
storefront_digest, unique token, indefinite If the shop has a password, this is used to determine if the current visitor has access.
SECTION 8 – AGE OF CONSENT
By using this site, you represent that you are at least the age of majority in your state or province of residence, or that you are the age of majority in your state or province of residence and you have given us your consent to allow any of your minor dependents to use this site.
If our store is acquired or merged with another company, your information may be transferred to the new owners so that we may continue to sell products to you.
QUESTIONS AND CONTACT INFORMATION
If you would like to: access, correct, amend or delete any personal information we have about you, register a complaint, or simply want more information contact our Privacy Compliance Officer at [email protected] or by mail at
GASOLINE URBAN CASUALS
Unit 285 Block G
Blanchardstown Corporate Park 2