More Leads & More Customers @ SEO Wigan

Data Security Policy

Data Security Policy

Last Updated: 9 March 2026

This Data Security Policy explains the measures taken by Wigan SEO to protect personal data, client information, and digital assets when delivering services through https://www.wiganseo.co.uk.

We recognise the importance of protecting sensitive information and maintaining the confidentiality, integrity, and availability of data handled during digital marketing activities.

Throughout this document, “we”, “us”, and “our” refer to Wigan SEO, and “client” refers to any individual or business engaging our services.

  1. Purpose of This Policy

The purpose of this policy is to outline the technical and organisational measures used to safeguard data processed in connection with digital marketing services.

This includes protecting information relating to:

  • Client accounts and marketing platforms
  • Website analytics data
  • Advertising and campaign data
  • Customer or lead information processed within marketing systems
  • Internal business information and communications

Our approach to security aims to reduce the risk of unauthorised access, data loss, or misuse.

  1. Encryption and Secure Communication

Encryption is used where appropriate to protect data transmitted across networks.

Security measures may include:

  • HTTPS encryption on websites
  • Secure encrypted connections to marketing platforms
  • Secure authentication when accessing third-party services
  • Encrypted communication channels when transmitting sensitive information

Encryption helps ensure that information transmitted over the internet remains protected.

  1. Secure Servers and Hosting

Where websites or digital assets are hosted or managed as part of marketing services, we aim to use secure hosting environments.

Security features may include:

  • Secure server infrastructure
  • Firewall protection
  • Malware detection and monitoring
  • Regular security updates and patches
  • Monitoring for suspicious activity

Hosting providers may operate their own security frameworks to protect infrastructure and stored data.

  1. Access Control

Access to systems and platforms is restricted to authorised individuals only.

Security controls may include:

  • Password-protected accounts
  • Two-factor authentication where available
  • Role-based access permissions
  • Secure password management practices
  • Limited access to sensitive systems

Access permissions are typically granted only where necessary for delivering services.

  1. Platform Security

Digital marketing services often involve third-party platforms.

Examples may include:

  • Google Analytics
  • Google Ads
  • Google Search Console
  • Email marketing systems
  • CRM platforms
  • Content management systems such as WordPress

These platforms maintain their own security systems and compliance frameworks.

We follow recommended security practices when accessing or managing these systems.

  1. Data Retention

Data is retained only for as long as necessary to deliver services and fulfil operational or legal obligations.

Retention periods may depend on:

  • Client service agreements
  • Platform data retention settings
  • Legal or regulatory requirements
  • Ongoing marketing activity

When services end, access to client systems is normally removed unless otherwise agreed.

  1. Monitoring and Risk Management

Security practices are regularly reviewed to reduce risks associated with digital systems.

This may include:

  • Monitoring accounts for unusual activity
  • Reviewing access permissions
  • Updating security procedures where necessary
  • Maintaining awareness of emerging cybersecurity risks

The aim is to maintain an appropriate level of protection for data handled during service delivery.

  1. Third-Party Service Providers

Digital marketing services may involve the use of third-party providers.

These providers may include:

  • Website hosting companies
  • Analytics platforms
  • Advertising networks
  • Marketing software providers

These services operate under their own security frameworks and data protection policies.

We recommend reviewing the security and privacy policies of any third-party services used.

  1. Data Breach Response

In the unlikely event of a security incident or data breach affecting client data, appropriate steps will be taken to investigate and manage the situation.

This may include:

  • Identifying the nature and scope of the issue
  • Securing systems to prevent further exposure
  • Notifying affected parties where appropriate
  • Taking corrective measures to prevent recurrence

Clients will be informed if a breach directly impacts their systems or data.

  1. Staff Awareness and Responsibility

Individuals involved in delivering services are expected to follow security best practices.

This includes:

  • Protecting login credentials
  • Maintaining confidentiality of client data
  • Using secure systems and devices
  • Reporting any suspected security concerns

Security awareness plays an important role in maintaining a secure environment.

  1. Policy Updates

This Data Security Policy may be updated periodically to reflect changes in:

  • Security technologies
  • Industry best practices
  • Legal or regulatory requirements
  • Internal operational procedures

Any updates will be published on this page with a revised update date.

  1. Contact

If you have any questions regarding this Data Security Policy, please contact us via the website:

https://www.wiganseo.co.uk/contact/

expand_less