Company: Design Direct Web Solutions Ltd

Registered: United Kingdom

Established: 2012

Version: 1.0

Effective Date: 23 September 2025

1) Introduction & Scope

Design Direct Web Solutions ("Design Direct", "we", "us") delivers web, data, AI/ML, and digital platforms for clients in the UK and globally. Trust, privacy, and information security are foundational to our services. This whitepaper sets out our approach to safeguarding personal data, securing applications and infrastructure, and aligning with applicable laws and standards, including (as applicable to the engagement):

Scope: This document covers Design Direct's core operations, engineering and delivery processes, data handling, and controls across people, process, and technology. Client-specific addenda (e.g., sector rules, data residency, bespoke SLAs) are appended to Statements of Work (SoW) or Data Processing Agreements (DPA) as needed.

2) Our Privacy Commitment

We treat privacy as a fundamental right and follow these principles:

3) Roles, Responsibilities & Governance

Governance cadences: quarterly risk review, monthly vulnerability posture review, change advisory board (CAB) for high‑risk changes, and annual policy review.

4) Lawful Bases & Processing Activities

We rely on lawful bases appropriate to each activity:

Typical processing (as a processor for clients): customer accounts, authentication, transaction records, support communications, analytics (as configured), and integrations with third‑party providers chosen by the client.

5) Data Categories & Sensitivity

6) Data Flow & Residency

7) Security Framework & Standards Alignment

We align our controls with recognised frameworks and best practices:

8) Organisational Security

9) Technical Security Controls

10) Secure Development Lifecycle (SSDLC)

11) AI/ML & Data Ethics

12) Vendor & Sub‑processor Management

A current sub‑processor list can be provided under NDA and includes hosting, email delivery, observability, and support tooling providers as relevant to each engagement.

13) Data Subject Rights (DSRs)

We assist controllers (our clients) in fulfilling DSRs:

Contact: info@designdirect.co.uk (for requests relating to Design Direct as controller) or route via the relevant client (controller) for project data.

14) Incident Response & Breach Notification

15) Business Continuity & Disaster Recovery (BC/DR)

16) Retention & Deletion

17) Cookies & Tracking (for Websites/Apps We Operate)

18) Physical & Environmental Security

19) Customer Responsibilities (Shared Responsibility Model)

Security and compliance is shared:

20) Audits, Assurance & Reporting

21) Contact & Escalation

22) Change Log

Appendix A: Example Retention Schedule (Baseline)

Data Type Typical Retention Notes
Application logs 90 days (active), 12 months (archive) Pseudonymise/anonymise where possible
Backups 30–90 days Encrypted; periodic restore tests
User accounts Life of contract + 90 days Or as instructed by controller
Support tickets 24 months May contain personal data; redact where feasible
CI/CD artifacts 12 months Signed where applicable

Appendix B: Incident Severity Matrix (Excerpt)

Severity Example Initial Response Target
Sev‑1 (Critical) Confirmed breach of personal data at scale; production outage > 1h for critical systems 15 minutes
Sev‑2 (High) Elevated suspicious activity; limited data exposure; partial outage 1 hour
Sev‑3 (Moderate) Contained vulnerability; no evidence of data loss 4 hours
Sev‑4 (Low) Minor policy deviation; informational alerts Next business day

Appendix C: Glossary