We understand that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of all of our customers and will only collect and use personal data in ways that are described here, in our Cookies Policy and in our Terms of Use, and in a way that is consistent with our obligations and your rights under the law.
This policy together with our Terms of Use and any other agreement between you and us and sets out the basis on which any personal data we collect from you, or that you provide to us, will be processed.
1. What does this Policy cover?
This Privacy Information explains how we use your personal data: how it is collected, how it is held, and how it is processed. It also explains your rights under the law relating to your personal data.
2. What is Personal Data?
Personal data is defined by the General Data Protection Regulation (EU Regulation 2016/679) (the “GDPR”) as ‘any information relating to an identifiable person who can be directly or indirectly identified in particular by reference to an identifier’.
Personal data is, in simpler terms, any information about you that enables you to be identified. Personal data covers obvious information such as your name and contact details, but it also covers less obvious information such as identification numbers, electronic location data, and other online identifiers.
The personal data that we use is set out in Section 4, below.
3. What are my rights?
Under the GDPR, if you are a resident in the EEA, you have the following rights, which we will always work to uphold:
The right to be informed about our collection and use of your personal data. This Privacy Notice should tell you everything you need to know, but you can always contact us to find out more or to ask any questions using the details in Section 10.
The right to access the personal data we hold about you. Section 9 will tell you how to do this.
The right to have your personal data rectified if any of your personal data held by us is inaccurate or incomplete. Please contact us using the details in Section 10 to find out more.
The right to be forgotten, i.e. the right to ask us to delete or otherwise dispose of any of your personal data that we have. Please contact us using the details in Section 10 to find out more.
The right to restrict (i.e. prevent) the processing of your personal data.
The right to object to us using your personal data for a particular purpose or purposes.
The right to data portability. This means that you can ask us for a copy of your personal data held by us to re-use with another service or business in many cases.
Rights relating to automated decision-making and profiling. We do not use your personal data in this way.
For more information about our use of your personal data or exercising your rights as outlined above, please contact us using the details provided in Section 10.
4. What Personal Data do you collect?
We may collect some or all of the following personal data (this may vary according to your relationship with us:
Name;
Address;
Email address;
Telephone number;
Business name;
Job title;
Profession;
Payment information;
Location information;
Information provided by third parties;
Information about how you access and use our services (e.g.: pages visited, referral website);
Information about your device (e.g.: anonymized IP address, type of device);
Comments and opinions that you express when you contact us via email, phone or chat.
5. How is my personal data used?
Under the GDPR, we must always have a lawful basis for using personal data. This may be because the data is necessary for our performance of a contract with you, because you have consented to our use of your personal data, or because it is in our legitimate business interests to use it. Your personal data will be used for the following purposes:
Providing and managing your account (legal basis: contractual).
Supplying our products and services to you. Your personal details are required in order for us to enter into a contract with you (legal basis: contractual).
Personalising, improving and tailoring our products and services for you (legal basis: legitimate interests).
Communicating with you. This may include responding to emails or calls from you (legal basis: contractual and legitimate interests).
Supplying you with information by email or post that you have opted-in to. You may unsubscribe or opt-out at any time by updating your communication preferences in the user profile page of your product or by clicking the unsubscribe link in our emails to you (legal basis: legitimate interests).
With your permission and/or where permitted by law, we may also use your personal data for marketing purposes, which may include contacting you by email or telephone or post with information, news, and offers on our products and services. You will not be sent any unlawful marketing or spam. We will always work to fully protect your rights and comply with our obligations under the GDPR and the Privacy and Electronic Communications (EC Directive) Regulations 2003, and you will always have the opportunity to opt-out.
6. For how long will you keep my personal data?
We will not keep your personal data for any longer than is necessary in light of the reason(s) for which it was first collected. Your personal data will therefore be kept for the following periods (or, where there is no fixed period, the following factors will be used to determine how long it is kept):
We will use and store your personal data for as long as it is necessary to provide our service to you and for the purpose of satisfying any legal, accounting or reporting requirements. Thereafter we will only keep data in anonymised form so that it can no longer be associated with you to help improve our products and services;
if you are not a customer and we have your personal data for the purpose of communicating with you we will use it and store it until either you let us know that you no longer want to receive communications from us or for a period of up to 24 months;
7. How and Where do you store my personal data?
We may store or transfer some or all of your personal data in countries that are not part of the European Economic Area (the “EEA” consists of all EU member states, plus Norway, Iceland, and Liechtenstein). These are known as “third countries” and may not have data protection laws that are as strong as those in the UK and/or the EEA. This means that we will take additional steps in order to ensure that your personal data is treated just as safely and securely as it would be within the UK and under the GDPR including:
Having a GDPR-compatible Data Processing Addendum with sub-processors in third countries;
Making sure that such sub-processors have adequate security procedures in place.
The security of your personal data is essential to us, and to protect your data, we take a number of important measures, including the following:
· Encrypting your data while it is in transit;
· Where possible, encrypting your data when it is stored;
· Yearly independent reviews of our security processes and procedures via our ISO27001 certification.
8. Do you share my personal data?
We may sometimes contract with the following third parties to supply products and services to you on our behalf. These may include payment processing, delivery, and marketing. In some cases, those third parties may require access to some or all of your personal data that we hold. You can check the list of sub processors here.
If any of your personal data is required by a third party, as described above, we will take steps to ensure that your personal data is handled safely, securely, and in accordance with your rights, our obligations, and the third party’s obligations under the law.
We may sometimes contract with third parties (as described above) that are located outside of the European Economic Area (the “EEA” consists of all EU member states, plus Norway, Iceland, and Liechtenstein). If any personal data is transferred to a third party outside of the EEA, we will take suitable steps in order to ensure that your personal data is treated just as safely and securely as it would be under the GDPR, as explained above in Section 7.
In some limited circumstances, we may be legally required to share certain personal data, which might include yours, if we are involved in legal proceedings or complying with legal obligations, a court order, or the instructions of a government authority.
9. How can I access my personal data?
If you want to know what personal data we have about you, you can ask us for details of that personal data and for a copy of it (where any such personal data is held). This is known as a “subject access request”.
All subject access requests should be made in writing and sent to the email or postal addresses shown in Section 10.
There is not normally any charge for a subject access request. If your request is ‘manifestly unfounded or excessive’ (for example, if you make repetitive requests) a fee may be charged to cover our administrative costs in responding.
We will respond to your subject access request within 21 days and, in any case, not more than one month of receiving it. Normally, we aim to provide a complete response, including a copy of your personal data within that time. In some cases, however, particularly if your request is more complex, more time may be required up to a maximum of three months from the date we receive your request. You will be kept fully informed of our progress.
10. How can I contact you?
To contact us about anything to do with your personal data and data protection, including to make a subject access request, visit the contact us page
11. Changes to this Privacy NoticeWe may change this Privacy Notice from time to time. This may be necessary, for example, if the law changes, or if we change our business in a way that affects personal data protection.
Any changes will be made available here and where applicable we might also notify you via email and/or in our products
Version 1.0, 15 January 2020
FAQs
What is spoofing and how do you prevent it? ›
Spoofing is a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information. Spoofing attacks copy and exploit the identity of your contacts, the look of well-known brands, or the addresses of trusted websites.
What is spoofing in simple words? ›Spoofing is when someone or something pretends to be something else in an attempt to gain a victim's confidence, get access to a system, steal data, or spread malware.
What is the meaning of spoof call? ›Spoofing is when a caller deliberately falsifies the information transmitted to your caller ID display to disguise their identity.
Can you spoof Caller ID? ›Caller ID spoofing is generally legal in the United States unless done "with the intent to defraud, cause harm, or wrongfully obtain anything of value". The relevant federal statute, the Truth in Caller ID Act of 2009, does make exceptions for certain law-enforcement purposes.
What is the purpose of spoofing? ›In cybersecurity, 'spoofing' is when fraudsters pretend to be someone or something else to win a person's trust. The motivation is usually to gain access to systems, steal data, steal money, or spread malware.
How is spoofing used? ›Spoofing is a type of scam in which a criminal disguises an email address, display name, phone number, text message, or website URL to convince a target that they are interacting with a known, trusted source.
What is spoofing and types? ›Spoofing is a technique through which a cybercriminal disguises themselves as a known or trusted source. Spoofing can take many forms, such as spoofed emails, IP spoofing, DNS Spoofing, GPS spoofing, website spoofing, and spoofed calls.
What is spoofing PDF? ›Spoofing means impersonating another person or computer, usually by providing false information (E-mail name, URL or IP address). Spoofing can take on many forms in the computer world, all of which involve some type false representation of information.
How common is spoofing? ›98% of cyberattacks contain one or more elements of social engineering like spoofing. 98% of organizations received a threat from a supplier domain in 2021. 1 in 3 employees is likely to click the links in phishing emails. 45% of employees click emails they consider to be suspicious “just in case it's important.”
Why do people spoof call? ›Call spoofing is when someone disguises their caller ID information to hide who they really are. Scammers may use call spoofing to commit fraud by impersonating government agencies or companies and requesting money or your personal information.
How do they spoof phone numbers? ›
Call spoofing is when the caller deliberately sends false information to change the caller ID. Most spoofing is done using a VoIP (Voice over Internet Protocol) service or IP phone that uses VoIP to transmit calls over the internet.
Where can you find spoofing? ›Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.
What happens if my number is spoofed? ›Phone number spoofing causes the Caller ID to display a phone number or other information to make it look like the calls are from a different person or business. While the caller's information may appear local, the calls are often placed by telemarketers located outside the state or country.
Does * 67 block your number? ›You have the option to block Caller ID either temporarily or permanently. To block your number from being displayed temporarily for a specific call: Enter *67.
Can you block spoofed numbers? ›Some Android devices also allow you to block all unknown callers. While the process varies among different devices, you typically open the Phone app and go to the Settings menu. Find the option for blocking numbers and activate the feature. You can also manually add phone numbers that you want blocked.
What can someone do with your phone number? ›- Rerouting your messages.
- Stealing your personal information.
- SIM swaps.
- Text scams and spyware.
- Doxxing that leads to harassment and fraud.
- Blackmail using your sensitive data.
- Spoofing caller ID numbers.
- Preying on your family.
Scam artists now use technology to make a person's caller ID show their own name and phone number-making it appear as though a person is calling him or herself. These scam artists are falsifying-or "spoofing"-caller ID information.
What is IP spoofing example? ›What are examples of IP spoofing? When attackers launch a DDoS attack, they use spoofed IP addresses to overwhelm computer servers with packet volumes too large for the destination computers to handle. Botnets are often used to send geographically dispersed packets.
Is spoofing a crime? ›Not all number spoofing is illegal, just when it's done with malintent. There are legitimate reasons for spoofing that are completely legal, such as a doctor calling a patient from a personal phone and displaying an office number, or a business showing a toll-free call back number instead of an extension.
Can you stop spoofing? ›Install an anti-spoofing app on your smartphone
You can protect your phone calls and text messages with an anti-spoofing app. These services typically focus on reducing access to your actual phone number by masking it with a secondary number (that you can often specify).
Is spoofing legal? ›
Is Spoofing Illegal? Under the Truth in Caller ID Act, FCC rules prohibit any person or entity from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm, or wrongly obtain anything of value. If no harm is intended or caused, spoofing is not illegal.
What is spoof domain? ›Domain spoofing, a common form of phishing, occurs when an attacker appears to use a company's domain to impersonate a company or one of its employees. This can be done by sending emails with false domain names which appear legitimate, or by setting up websites with slightly altered characters that read as correct.
What are spoofing indicators? ›Spelling errors, broken links, suspicious contact us information, missing social media badges can all be indicators that the website has been spoofed. Website addresses containing the name of the spoofed domain are not the official domain.
What is blind spoofing? ›Blind spoofing. Blind spoofing occurs when the attacker is not on the same subnet as the destination. Therefore, obtaining correct TCP sequence numbers is more difficult. However, using techniques such as IP source routing (described next), an attacker can accurately determine those sequence numbers.
Is pretexting social engineering? ›Pretexting is a certain type of social engineering technique that manipulates victims into divulging information. A pretext is a made-up scenario developed by threat actors for the purpose of stealing a victim's personal data.
What is sniffing and spoofing in Kali Linux? ›Sniffing and spoofing means to wiretap the network, checking on all the traffic coming and going in that network. Kali Linux has the 10 best tools available for sniffing and spoofing. Most of these tools come pre-installed in Kali Linux. However, some of the tools might require you to install them manually.
Can you spoof a text message number? ›The internet has been invaded with tools that alter names and mobile phone numbers. All it takes is one download, and fraudsters can send text messages from whatever number they choose, using names of well-known companies or even banks. Some businesses even offer spoofing online services, but this borders on illegal.
What's the difference between spoofing and phishing? ›Differences between Spoofing and Phishing
Spoofing is an identity theft where a person is trying to use the identity of a legitimate user. Phishing is where a person steals the sensitive information of user like bank account details. Spoofing can be phishing in part.
Just like you do, if a spammer gains access to the username/password of your email account, they can log in and use your email server to send emails.
How do you find out who a number is registered to? ›One option is to use reverse lookup services, which will provide you with the owner's name and address. Another option is to use an online search engine, such as Google or Bing, which will allow you to input the phone number and see who owns it.
How do I find out whose phone number it is? ›
Whitepages.com is one of the most accurate options for landlines, but not all the information is free. Go to www.whitepages.com to see your options for a reverse address search or reverse lookup on a phone number. Addresses.com and Anywho.com are two other sites that do free reverse phone number searches for landlines.
Can a scammer use my phone number to call someone else? ›Practically any number can be spoofed, meaning scammers can target any phone number they have in their database. Many scammers don't stop at just spoofing caller ID numbers. Some will use digital tech tools to change the display name on the caller ID, as well.
How can I check if a phone number is working? ›Visit www.textmagic.com or download the TextMagic mobile app on google play store. Enter your phone number and country and click on Validate Number. This app will show you the status of the number if it is active or not. Another app you can use is Phone Number Monitoring.
How does email spoofing work? ›In spoofing attacks, the sender forges email headers so that client software displays the fraudulent sender address, which most users take at face value. Unless they inspect the header more closely, users see the forged sender in a message. If it's a name they recognize, they're more likely to trust it.
How can IP spoofing attacks be prevented? ›To help prevent IP spoofing, you should use a VPN to hide your IP address. Then, monitor your network for suspicious activity with a firewall, which uses a packet filter that inspects IP packet headers. Only visit secure sites that use HTTPS protocol, and make sure to use strong passwords everywhere possible.
Can 2 people have the same phone number? ›Can multiple people share the same phone number? Yes, a single phone number can be shared across multiple users, cell phones, team members, colleagues, or family members. For example, work colleagues can use a mobile app to share a common business phone number.
How do I remove my number from spam lists? ›Visit DoNotCall.gov or call 1-888-382-1222 to verify the status of, or unsubscribe, your phone number on the registry. Placing your phone number on this national registry will stop telemarketing sales calls. But you might still receive calls from scammers and robocallers. Some telemarketing calls are still permitted.
What does * 82 do on a phone? ›You can also use *82 to unblock your number in case your call gets rejected temporarily. Some providers and users will automatically block private numbers, so using this code will help you bypass this filter. Blocking your number can go a long way in stopping annoying robocalls.
What happens when you dial * 57? ›Activate Call Trace
Pick up the phone and press *57 (touch tone) or 1157 (rotary). You'll hear a confirmation tone and message will be heard If the trace is successful. You must keep a written log of the date and time of harassing calls to retrieve Call Trace information.
Call return (*69) automatically dials your last incoming call, whether the call was answered, unanswered or busy. To activate: Dial *69 and listen for a recording of the last number that was called. To call that number, dial 1.
What numbers should you not answer? ›
- 268: Antigua and Barbuda.
- 284: British Virgin Islands.
- 473: Grenada, Carriacou and Petite Martinique.
- 664: Montserrat.
- 649: Turks and Caicos Islands.
- 767: Commonwealth of Dominica.
- 809, 829, 849: Dominican Republic.
Why am I getting spam calls all of a sudden? Usually, it's because your number has been sold in a group list of phone numbers to other scammers. Remember, you can always report spam calls to the Better Business Bureau and also the Federal Trade Commission.
What does * 77 do on a landline? ›Anonymous Call Rejection (*77) stops calls from people that use a blocking feature to keep their name or number from being displayed. When Anonymous Call Rejection is turned on, callers will hear a message telling them to hang up, turn off the blocking feature, and call again.
Can you stop spoofing? ›Install an anti-spoofing app on your smartphone
You can protect your phone calls and text messages with an anti-spoofing app. These services typically focus on reducing access to your actual phone number by masking it with a secondary number (that you can often specify).
The reality is that it's impossible to stop email spoofing because the Simple Mail Transfer Protocol, which is the foundation for sending emails, doesn't require any authentication. That's the vulnerability of the technology. There are some additional countermeasures developed to counter email spoofing.
What is one way you can prevent email spoofing? ›So, for domain owners, setting up SPF, DKIM, and DMARC records is an essential step to prevent cybercriminals and spammers from sending spoofed emails using their domain name.
How is phone spoofing done? ›Some spoofing services work just like a prepaid calling card. Customers pay upfront for a PIN number that they use to place calls. Then they dial the number provided by the service provider, enter their pin, enter the outgoing call number and then enter the number they want to appear as their caller ID.
Can someone else use my phone number? ›Mobile phone numbers can legally be ported from one provider to another when you switch your mobile phone service, and can also be ported from one mobile phone to another when you upgrade or change devices. But with enough of your personal information, scammers can have your number ported to a device they possess.
Can someone use my number to text? ›TL;DR: Yes, just like telemarketers and spammers who spoof the number a call comes from, the number a text comes from can be spoofed.
What can someone do with your phone number? ›- Rerouting your messages.
- Stealing your personal information.
- SIM swaps.
- Text scams and spyware.
- Doxxing that leads to harassment and fraud.
- Blackmail using your sensitive data.
- Spoofing caller ID numbers.
- Preying on your family.
How do spoofers get my contacts? ›
The FROM header can be spoofed and the spammer can use any SMTP server that lets them log in, but to steal the contact list they have to log into the account.
How would you know if it was spoofed? ›If the email is spoofed, the received field information won't match the email address. For example, in the received filed from a legitimate Gmail address, it will look something like "Received from 'google.com: domain of'" and then the actual email address.
How do hackers send email from my email address? ›How Spammers Spoof Your Email Address. Spoofing is the act of forging an email address, so it appears to be from someone other than the person who sent it. Often, spoofing is used to trick you into thinking an email came from someone you know, or a business you work with, like a bank or other financial service.
What is an example of email spoofing? ›For example, a spoofed email may pretend to be from a well-known shopping website, asking the recipient to provide sensitive data, such as a password or credit card number. Alternatively, a spoofed email may include a link that installs malware on the user's device if clicked.
When did email spoofing start? ›Because of the way email protocols work, email spoofing has been an issue since the 1970s. It started with spammers who used it to get around email filters. The issue became more common in the 1990s, then grew into a global cybersecurity issue in the 2000s.
Can Gmail be spoofed? ›Your Gmail account might be spoofed if you get bounce messages for emails that look like they were sent from your account, or if you get a reply to a message you never sent.
Can you block spoofed numbers? ›Some Android devices also allow you to block all unknown callers. While the process varies among different devices, you typically open the Phone app and go to the Settings menu. Find the option for blocking numbers and activate the feature. You can also manually add phone numbers that you want blocked.
Is spoofing legal? ›Is Spoofing Illegal? Under the Truth in Caller ID Act, FCC rules prohibit any person or entity from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm, or wrongly obtain anything of value. If no harm is intended or caused, spoofing is not illegal.
How can I check if a phone number is working? ›Visit www.textmagic.com or download the TextMagic mobile app on google play store. Enter your phone number and country and click on Validate Number. This app will show you the status of the number if it is active or not. Another app you can use is Phone Number Monitoring.