Providing you with the complete security package 



Privacy Policy and GDPR Information

Client Privacy Notice

This notice gives details about how we store and use the personal information that we hold about you.


When you request for a locksmith to visit you, we keep a record of your full name, address, email and telephone number(s).

This personal information is held on our company’s client outlook system which is accessible via a secure webmail which is password protected.


The lawful bases for processing personal data are set out in Article 6 of the General Data Protection Regulation (GDPR). At least one of these must apply whenever we process your personal information.

The legal bases that we use to process your information will fall under the following regulation:

(a) Consent: the individual has given clear consent for A3 Locksmiths to process their personal data for a specific purpose.


Your personal information is stored electronically in a password protected secure webmail system. We are required to retain your personal information for a maximum of 10 years. All personal information is disposed of in a secure manner.


Online contact

If you complete the “want us to call you back?” page on the website, your information will be transferred to us through Name2Net our website hosting company and will be delivered to our secure webmail system. Your data is used solely for us to telephone you and visit the site where you require a locksmith.


The GDPR provides the following rights for individuals in respect of the personal information that we hold:

1. The right to be informed

2. The right of access

3. The right to rectification

4. The right to erasure

5. The right to restrict processing

6. The right to data portability

7. The right to object

8. Rights in relation to automated decision making and profiling.

For further information on your GDPR rights please visit the Information Commissioner’s website at:

FURTHER INFORMATION For further information please contact Dave Morgon at

Data Breach Response Plan

Step 1:

For data breaches within our computer system, we would be notified by our security software. This alerts us to both potential and actual threats

Step 2:

Once a breach has been reported by our security software, we would act immediately by doing a full security scan of our computer system. This would quarantine and remove any actual threats.

Step 3:

If we did not believe our security software had been able to deal with the threat, we would seek additional IT support from the software company or independent IT advice.

Step 4:

As a last resort we would look to replace any potentially hazardous systems within our network. 

FURTHER INFORMATION For further information please contact Dave Morgon at


Copyright ©2015 A3 Locksmiths