Data Security Policy
Last Updated: 9 March 2026
This Data Security Policy explains the measures taken by Wigan SEO to protect personal data, client information, and digital assets when delivering services through https://www.wiganseo.co.uk.
We recognise the importance of protecting sensitive information and maintaining the confidentiality, integrity, and availability of data handled during digital marketing activities.
Throughout this document, “we”, “us”, and “our” refer to Wigan SEO, and “client” refers to any individual or business engaging our services.
- Purpose of This Policy
The purpose of this policy is to outline the technical and organisational measures used to safeguard data processed in connection with digital marketing services.
This includes protecting information relating to:
- Client accounts and marketing platforms
- Website analytics data
- Advertising and campaign data
- Customer or lead information processed within marketing systems
- Internal business information and communications
Our approach to security aims to reduce the risk of unauthorised access, data loss, or misuse.
- Encryption and Secure Communication
Encryption is used where appropriate to protect data transmitted across networks.
Security measures may include:
- HTTPS encryption on websites
- Secure encrypted connections to marketing platforms
- Secure authentication when accessing third-party services
- Encrypted communication channels when transmitting sensitive information
Encryption helps ensure that information transmitted over the internet remains protected.
- Secure Servers and Hosting
Where websites or digital assets are hosted or managed as part of marketing services, we aim to use secure hosting environments.
Security features may include:
- Secure server infrastructure
- Firewall protection
- Malware detection and monitoring
- Regular security updates and patches
- Monitoring for suspicious activity
Hosting providers may operate their own security frameworks to protect infrastructure and stored data.
- Access Control
Access to systems and platforms is restricted to authorised individuals only.
Security controls may include:
- Password-protected accounts
- Two-factor authentication where available
- Role-based access permissions
- Secure password management practices
- Limited access to sensitive systems
Access permissions are typically granted only where necessary for delivering services.
- Platform Security
Digital marketing services often involve third-party platforms.
Examples may include:
- Google Analytics
- Google Ads
- Google Search Console
- Email marketing systems
- CRM platforms
- Content management systems such as WordPress
These platforms maintain their own security systems and compliance frameworks.
We follow recommended security practices when accessing or managing these systems.
- Data Retention
Data is retained only for as long as necessary to deliver services and fulfil operational or legal obligations.
Retention periods may depend on:
- Client service agreements
- Platform data retention settings
- Legal or regulatory requirements
- Ongoing marketing activity
When services end, access to client systems is normally removed unless otherwise agreed.
- Monitoring and Risk Management
Security practices are regularly reviewed to reduce risks associated with digital systems.
This may include:
- Monitoring accounts for unusual activity
- Reviewing access permissions
- Updating security procedures where necessary
- Maintaining awareness of emerging cybersecurity risks
The aim is to maintain an appropriate level of protection for data handled during service delivery.
- Third-Party Service Providers
Digital marketing services may involve the use of third-party providers.
These providers may include:
- Website hosting companies
- Analytics platforms
- Advertising networks
- Marketing software providers
These services operate under their own security frameworks and data protection policies.
We recommend reviewing the security and privacy policies of any third-party services used.
- Data Breach Response
In the unlikely event of a security incident or data breach affecting client data, appropriate steps will be taken to investigate and manage the situation.
This may include:
- Identifying the nature and scope of the issue
- Securing systems to prevent further exposure
- Notifying affected parties where appropriate
- Taking corrective measures to prevent recurrence
Clients will be informed if a breach directly impacts their systems or data.
- Staff Awareness and Responsibility
Individuals involved in delivering services are expected to follow security best practices.
This includes:
- Protecting login credentials
- Maintaining confidentiality of client data
- Using secure systems and devices
- Reporting any suspected security concerns
Security awareness plays an important role in maintaining a secure environment.
- Policy Updates
This Data Security Policy may be updated periodically to reflect changes in:
- Security technologies
- Industry best practices
- Legal or regulatory requirements
- Internal operational procedures
Any updates will be published on this page with a revised update date.
- Contact
If you have any questions regarding this Data Security Policy, please contact us via the website:
