Data Handling

A detailed explanation of how PIP Agency processes and protects your personal data — including the security measures, encryption standards, compliance frameworks, and procedures we have in place.

Last updated: 1 April 2026

Compliance & Standards

UK GDPREU GDPRData Protection Act 2018ISO 27001 AlignedTLS 1.3AES-256SOC 2 Aligned

Overview

At PIP Agency, the responsible and secure handling of personal data is fundamental to our operations. This page explains, in plain language, exactly how we process the data you entrust to us — from the moment of collection through to secure deletion.

We operate under a data minimisation principle: we collect only what is strictly necessary, store it only for as long as required, and protect it using industry-standard security controls throughout its lifecycle.

Our Commitment

We treat your data with the same care we would want our own information to be treated. We do not monetise your data, sell it to third parties, or use it for any purpose beyond processing your claim.

Data We Process

The personal data we process falls into the following categories, each collected for a specific and documented purpose:

Identity Data

  • Full name
  • Email address
  • Phone number (if provided)
  • Wallet address used for authentication

Claim Data

  • Description of financial loss
  • Names of platforms or entities involved
  • Approximate dates and amounts
  • Transaction identifiers or reference numbers

Supporting Documentation

  • Uploaded files (screenshots, PDFs, transaction exports)
  • Correspondence with third parties
  • Bank statements or financial records (where provided)

Technical Data

  • IP address
  • Browser and device information
  • Session timestamps
  • Platform interaction logs

Communication Data

  • Emails and messages exchanged with our support team
  • Internal case notes related to your claim

Processing Purposes

We process personal data under the following lawful bases as defined under the UK GDPR. Each processing activity has a documented purpose and legal basis.

PurposeLawful Basis
Processing your claim submissionContract performance
Communicating about your caseContract performance
Identity verification and fraud preventionLegitimate interests
Improving platform functionalityLegitimate interests (anonymised)
Compliance with legal obligationsLegal obligation
Reporting to authorities when requiredLegal obligation
Sending service-related notificationsContract performance / Consent

Security Measures

We implement a layered security architecture aligned with ISO/IEC 27001 principles and industry best practices. Our security programme covers technical infrastructure, operational procedures, and human factors.

Infrastructure Security

  • All servers are hosted in SOC 2 Type II certified data centres within the UK and EEA
  • Network perimeter protected by enterprise-grade firewall and intrusion detection systems
  • Automated vulnerability scanning performed on a continuous basis
  • Regular third-party penetration testing (minimum annually)
  • DDoS protection and rate limiting on all public-facing endpoints
  • Isolated network segments for different data sensitivity levels

Access Control

  • Role-based access control (RBAC) — staff access only what they need for their role
  • Multi-factor authentication (MFA) mandatory for all staff with system access
  • Privileged access management (PAM) for administrative functions
  • All access is logged, monitored, and subject to audit
  • Access rights reviewed quarterly and upon any change in role
  • Immediate access revocation upon staff departure

Operational Security

  • All staff complete mandatory data protection and security awareness training
  • Confidentiality agreements required for all personnel and contractors
  • Security incident response plan maintained and tested
  • Business continuity and disaster recovery plans in place
  • Regular security reviews of third-party service providers

Encryption Standards

We use strong, industry-standard encryption to protect your data both in transit and at rest. Our encryption practices are reviewed regularly to ensure they remain current with best practices.

Data in Transit

  • Transport Layer Security (TLS) version 1.3 for all browser-to-server communication
  • HTTP Strict Transport Security (HSTS) enforced — all traffic over HTTPS
  • Strong cipher suites only; weak and deprecated ciphers disabled
  • Certificate Transparency logging and OCSP stapling enabled
  • Secure cookies with HttpOnly and SameSite attributes enforced

Data at Rest

  • AES-256 (Advanced Encryption Standard, 256-bit key) for all stored personal data
  • Separate encryption keys for different data categories
  • Key management using hardware security modules (HSMs)
  • Encrypted database backups stored separately from primary data
  • Uploaded files encrypted individually prior to storage

What this means in practice: Even in the unlikely event of unauthorised access to our storage systems, your personal data would remain encrypted and unreadable without access to the corresponding encryption keys, which are stored separately under strict controls.

Data Retention & Deletion

We retain personal data only for as long as necessary to fulfil the purpose for which it was collected, and to comply with our legal and regulatory obligations. Once data is no longer required, it is securely deleted using methods appropriate to the sensitivity of the information.

Retention Schedule

Data TypeRetention PeriodBasis
Claim records & documentation7 years post-closureLegal obligation
Identity & contact data7 years post-closureLegal obligation
Authentication logs12 monthsLegitimate interest
Support communications3 years from last contactLegitimate interest
Legal correspondence10 yearsLegal obligation
Analytics (anonymised)26 monthsLegitimate interest
Marketing consent records5 years from consentLegal obligation

Secure Deletion Methods

  • Database records are cryptographically overwritten and logically deleted
  • File system data is securely erased using NIST 800-88 compliant methods
  • Physical media is destroyed using certified providers when decommissioned
  • Backup copies are deleted in line with their own scheduled purge cycle
  • Deletion is logged and auditable to confirm completion

Your Rights Under GDPR

Under the UK GDPR and EU GDPR, you have the following enforceable rights in respect of your personal data. PIP Agency is committed to honouring these rights promptly and without charge in the vast majority of cases.

Right of Access (Article 15)

Request a copy of all personal data we hold about you, along with information about how and why we process it. We will respond within 30 days.

Right to Rectification (Article 16)

Request correction of inaccurate or incomplete data. We will action this within 30 days and notify any third parties who received the incorrect data.

Right to Erasure (Article 17)

Request deletion of your data where it is no longer necessary for its original purpose, subject to our legal retention obligations.

Right to Restriction (Article 18)

Request that we limit our processing of your data in certain circumstances, such as while you contest its accuracy.

Right to Portability (Article 20)

Receive your data in a structured, machine-readable format to transfer to another organisation.

Right to Object (Article 21)

Object to processing based on legitimate interests. We will cease processing unless we can demonstrate compelling legitimate grounds.

Right not to be Subject to Automated Decisions (Article 22)

We do not use fully automated decision-making that produces significant legal effects. All significant decisions involve human review.

How to exercise your rights

Submit your request in writing to [email protected]. We may need to verify your identity before processing your request. Responses are provided within 30 days; complex requests may be extended by a further two months with notice.

Data Breach Procedures

Despite our robust security measures, no system is entirely immune to incidents. We have a documented and tested incident response plan that ensures any personal data breach is handled promptly, transparently, and in compliance with our legal obligations.

Detection and Assessment

  • Automated monitoring systems are in place to detect anomalous activity 24/7
  • Any suspected security incident is escalated to our security team immediately
  • The nature, scope, and likely impact of the incident are assessed without delay
  • Affected data categories and individuals are identified as quickly as possible

Regulatory Notification

Where a data breach is likely to result in a risk to the rights and freedoms of individuals, we will notify the Information Commissioner's Office (ICO) within 72 hours of becoming aware of the breach, in accordance with Article 33 of the UK GDPR. Our notification will include:

  • The nature of the breach, including categories and approximate number of individuals affected
  • The name and contact details of our Data Protection contact
  • The likely consequences of the breach
  • Measures taken or proposed to address the breach and mitigate its effects

Individual Notification

If a breach is likely to result in a high risk to your rights and freedoms, we will notify you directly without undue delay. Our notification will describe what happened, what data was affected, the potential consequences, and what steps we are taking — as well as guidance on steps you can take to protect yourself.

Report a security concern

If you believe your account has been compromised or you have identified a security vulnerability, please contact us immediately at [email protected]. We take all reports seriously and will respond promptly.

Third-Party Processors

We engage a small number of carefully vetted third-party processors to help us operate our platform. All processors are bound by Data Processing Agreements (DPAs) that require them to process data only on our instructions and to maintain appropriate security standards.

Processor CategoryPurposeLocation
Cloud InfrastructureHosting, storage, and database servicesUK / EEA
Email Service ProviderTransactional and case notification emailsUK / EEA
Identity VerificationOptional KYC verification where requiredUK / EEA
Analytics (Anonymised)Aggregated platform performance metricsUK / EEA
Security MonitoringIntrusion detection and log analysisUK / EEA

We review our third-party processors annually and following any material changes to their services or security practices. We will update this page if we engage new processors who handle personal data in a materially different way.

International Transfers

We endeavour to keep all personal data within the United Kingdom and the European Economic Area. In the rare cases where a transfer outside these territories is necessary, we ensure appropriate safeguards are in place:

  • Adequacy decisions: transfers to countries recognised as providing adequate data protection by the UK ICO or European Commission
  • Standard Contractual Clauses (SCCs): legally binding contractual commitments by the recipient to protect your data to UK/EU standards
  • Binding Corporate Rules: where applicable for transfers within a corporate group
  • Supplementary technical measures: additional encryption or pseudonymisation for all international transfers

You have the right to request information about any specific international transfers of your data and the safeguards in place. Contact us at [email protected] for details.