Return to website

IAAS Policy

Terms and Policies

Cookie Policy | Privacy Policy | Terms of Use | IAAS | Disclaimer Policy

 

Lakehouse Technology is an Infrastructure as a Service provider, supplying web, email and database services to their customers.

Customer Responsibility

  • a) Website(s) must be compliant with the General Data protection Regulation (GDPR) and all other legal responsibilities.
  • b) Personal or Sensitive Data requested through websites are compliant with the General Data protection Regulation (GDPR) and all other legal responsibilities.
  • c) Emails containing personal data are stored and processed in compliance with the General Data protection Regulation (GDPR) and all other legal responsibilities.
  • d) Personal Data within databases are stored and processed in compliance with the General Data protection Regulation (GDPR) and all other legal responsibilities.
  • e) Maintain the security of all usernames and passwords used to access our online Platform, and not share them with unauthorised or individuals not directly employed by them
  • f) Maintain a secure connection to collect and send emails via our mail service
  • g) Maintain a secure connection to connect to our database services
  • h) Ensure their devices use a supported Operating System with adequate Firewall and Anti-Virus technologies installed and updated regularly
  • i) Inform Lakehouse Technology of any Security issues immediately, including the hacking or unauthorised access of your devices or unauthorised access to our systems using your authentication details

 

Lakehouse Technology is a 3rd Party Processor of our customer's data

No Data access other than the following:-

  • a) Automated Backup to retain a current snapshot of customer mailboxes.
  • b) Automated Backup to retain a current snapshot of customer databases.
  • c) Automated Restore of mailboxes or databases, due to hardware failure or upgrades.
  • d) Automated Restore of mailbox or database, due to hardware failure or upgrades.
  • e) We create mailboxes for our customers when requested to do so and issue a creation password for the mailbox which our customers can change.
  • f) We create databases for our customers when requested to do, all passwords and any personal information contained in those database are stored securely and specific data records encrypted where neccessary.

 

Security

We take appropriate steps to maintain the security of Customer Data.

  • a) Hosting is located within a secure Data Centre, monitored by CCTV, and accessible only be approved personnel with specific security privileges based upon the data centre requirements.
  • b) The information contained within the data centre are secured with appropriate firewall policies and security permissions as well as authentication levels of access.