Technical data such as IP Address
When you visit our website, our systems will log a record of your visit in our server logs, and typically this record will include the technical ‘IP’ address that is associated with your device and the browser type and version that you are using.
Such server logs are extremely common practice, and are used to monitor technical resources, monitor high-level server activity, and importantly to detect and prevent malicious or fraudulent activity on our systems. This data can also be used, if required, to diagnose reports of technical issues. The storage of IP addresses, allow us to identify patterns of behaviour (such as repeated malicious attempts to access a system).
IP addresses, in and of themselves, do not allow us in any way to identify you as an individual, especially given that it is very common for IP addresses to be dynamically allocated by your service provider, and will therefore often routinely change.
Furthermore, we do not and will not use the content of server access logs to attempt to determine an identifiable individual. We therefore do not consider that data held within server logs falls within the scope of ‘personal data’, and accordingly we do not seek your consent to collect it.
In the event that such anonymous data is considered to fall within the scope of the applicable data protection regulations, the legal basis for processing such data is:
Our Legitimate interest (GDPR Art 6(1)(f)): The integrity, security and performance of our systems and infrastructure is a vital part of the services that we offer. We consider that it is in our legitimate interest to maintain and protect our systems to this end.
Types of processing
- We will store the information you provide to us in our website server logs
- For the purpose of maintaining the integrity of our systems, we may also store this data in infrastructure backups
- We will NOT use this data to attempt to identify an individual person
Server logs are automatically rotated on our systems, and are retained for a maximum of 12 months following the closure of the relevant log file.