Data Protection Policy

Policy became operational on:  3 March 2024

Next review date:  3 March 2025


ID Analyzer operated by Evith Technology Ltd. needs to gather and use certain information about individuals. This policy governs the data submitted to our company during the use of our service ID Analyzer, for website and cookie related privacy policy please refer to this page instead.

These can include customers, third-party personal information submitted by our customers in relation to using our services, business contacts, employees and other people the organisation has a relationship with or may need to contact.

This policy describes how this personal data must be collected, handled and stored to meet the company’s data protection standards — and to comply with the law.

Why this policy exists

ID Analyzer is a service provided by Evith Technology that processes highly sensitive personal data on-behalf of our customers, this data protection policy ensures that the company Evith Technology:

  • Complies with data protection law and follow good practice
  • Protects the rights of staff, customers, and partners
  • Is open about how it stores and processes individuals’ data
  • Protects itself from the risks of a data breach

Data protection law

The General Data Protection Regulation 2016/679 describes how organisations — including Evith Technology — must collect, handle and store personal information.

These rules apply regardless of whether data is stored electronically, on paper or on other materials.

To comply with the law, personal information must be collected and used fairly, stored safely and not disclosed unlawfully.

The General Data Protection Regulation is underpinned by eight important principles. These say that personal data must:

  1. Be processed fairly and lawfully
  2. Be obtained only for specific, lawful purposes
  3. Be adequate, relevant and not excessive
  4. Be accurate and kept up to date
  5. Not be held for any longer than necessary
  6. Processed in accordance with the rights of data subjects
  7. Be protected in appropriate ways
  8. Not be transferred outside the EU, unless that country or territory also ensures an adequate level of protection

People, risks and responsibilities

Policy scope

This policy applies to:

  • The head office of Evith Technology
  • All branches of Evith Technology
  • All staff and volunteers of Evith Technology
  • All contractors, suppliers and other people working on behalf of Evith Technology

It applies to all data that the company holds relating to living individuals, even if that information technically falls outside of the General Data Protection Regulation 2016/679. This can include:

  • Names of individuals
  • Postal addresses
  • Email addresses
  • Telephone numbers
  • …plus any other information relating directly or indirectly to individuals

Data Protection Risks

This policy helps to protect Evith Technology from some very real data security risks, including:

  • Breaches of confidentiality. For instance, information being given out inappropriately.
  • Failing to offer choice. For instance, all individuals should be free to choose how the company uses data relating to them.
  • Reputational damage. For instance, the company could suffer if hackers successfully gained access to sensitive data.


Everyone who works for or with Evith Technology has some responsibility for ensuring data is collected, stored and handled appropriately.

Each team that handles personal data must ensure that it is handled and processed in line with this policy and data protection principles.

General staff guidelines

  • The only people able to access data covered by this policy should be those who need it for their work.
  • Data should not be shared informally. When access to confidential information is required, employees can request it from their line managers.
  • Evith Technology will provide training to all employees to help them understand their responsibilities when handling data.
  • Employees should keep all data secure, by taking sensible precautions and following the guidelines below.
  • In particular, strong passwords must be used and they should never be shared.
  • Personal data should not be disclosed to unauthorised people, either within the company or externally.
  • Data should be regularly reviewed and updated if it is found to be out of date. If no longer required, it should be deleted and disposed of.
  • Employees should request help from their line manager or the data protection officer if they are unsure about any aspect of data protection.
  • Employees should not carry any physical storage device to work that is capable of saving any personal data. Nor should any employee utilize internet or other communication method to share any personal data with third-party.

Data Storage

We understand that entrusting sensitive personal information through ID Analyzer can be a major privacy concern for your business. However, we are committed to safeguarding the privacy of our customers and their users through our highly secured systems.

Customers have full control over data storage. You can choose to disable data storage during API transactions. In this case, all personal information, including uploaded images, request parameters, and response results, will be permanently deleted from our servers upon completion of your request.

When data storage is disabled, the only information we retain is an anonymized record in our HTTP logs. This record excludes personal details and only includes your server's IP address, the user agent header, and a timestamp.

This level of control and transparency allows you to use ID Analyzer with confidence, knowing that your data privacy is prioritized. 

In case where data storage is enabled, document submitted to our system will be stored in our secured database system, which is made available only to you under your Web Portal, or through transaction query APIs.

These rules describe how and where data should be safely stored.

  • Data should be protected by strong passwords that are changed regularly and never shared between employees.
  • Data should only be stored on designated drives and servers, and should only be uploaded to an approved cloud computing services.
  • Servers containing personal data should be sited in a secure location, away from general office space.
  • Data should be backed up frequently. Those backups should be tested regularly, in line with the company’s standard backup procedures.
  • Data should never be saved directly to laptops or other mobile devices like tablets or smart phones.
  • All servers and computers containing data should be protected by approved security software and a firewall.
  • All servers that stores data should reside in a country that is deemed to have adequate level of protection by the European Commission.

Data Retention

Unless otherwise specified, when a customer chooses to enable data storage during ID Analyzer API usage, all submitted personal information is securely stored and retrievable for a minimum of 5 years. However, stored personal information can be deleted fully or partially under the following circumstances:

  • Upon written request from the customer
  • Initiated by the customer through the API or web portal
  • Customer account becomes inactive for more than 24 months
  • Customer has outstanding unpaid invoices
  • At the request of individuals seeking to erase their information from the system (Right to erasure)
  • In the event of ID Analyzer ceasing operations

Data Use

For us to improve ID Analyzer service and provide support to our customers, it is necessary for our company to work with customers' data, we do so under an environment governed by strict guidelines. We understand when personal data is accessed and used that it can be at the greatest risk of loss, corruption or theft:

  • When working with personal data, employees should ensure the screens of their computers are always locked when left unattended.
  • Personal data should not be shared informally. In particular, it should never be sent by email, as this form of communication is not secure.
  • Data must be encrypted before being transferred electronically. The IT manager can explain how to send data to authorised external contacts.
  • Personal data should never be transferred outside of the company’s local area network, unless requested by a verified customer.
  • Employees should not save copies of personal data to their own computers. Always access and update the central copy of any data.

Data Accuracy

The law requires Evith Technology to take reasonable steps to ensure data is kept accurate and up to date.

The more important it is that the personal data is accurate, the greater the effort Evith Technology should put into ensuring its accuracy.

It is the responsibility of all employees who work with data to take reasonable steps to ensure it is kept as accurate and up to date as possible.

  • Data will be held in as few places as necessary. Staff should not create any unnecessary additional data sets.
  • Staff should take every opportunity to ensure data is updated. For instance, by confirming a customer’s details when they call.
  • Evith Technology will make it easy for data subjects to update the information Evith Technology holds about them. For instance, via the company website.
  • Data should be updated as inaccuracies are discovered. For instance, if a customer can no longer be reached on their stored telephone number, it should be removed from the database.
  • It is the marketing manager’s responsibility to ensure marketing databases are checked against industry suppression files every six months.

Data Owners (Customers) Rights and Responsibilities

  • Responsible for providing accurate and lawful data to ID Analyzer.
  • Have the right to access, correct, and delete their data stored by ID Analyzer.
  • Should inform ID Analyzer of any changes or updates to their data promptly.
  • Specify their preferences regarding data storage and processing.
  • Retain control over the data and its usage throughout the processing.
  • Have the right to receive clear information on how their data is being processed, including purposes, categories, and recipients of data.

Data Processors (ID Analyzer) Rights and Responsibilities

  • Process data on behalf of data owners in a fair and lawful manner.
  • Implement security measures to protect data during processing.
  • Provide necessary tools and processes for data owners to manage their data.
  • Comply with data owners' preferences and instructions regarding data processing.
  • Maintain a record of data processing activities and security measures implemented.
  • Notify data owners promptly in case of data breaches or unauthorized access.

Subject Access Requests

All individuals who are the subject of personal data held by Evith Technology are entitled to:

  • Ask what information the company holds about them and why.
  • Ask how to gain access to it.
  • Be informed how to keep it up to date.
  • Be informed how the company is meeting its data protection obligations.

If an individual contacts the company requesting this information, this is called a subject access request.

Subject access requests from individuals should be made by email, addressed to the data controller at [email protected]. The data controller can supply a standard request form, although individuals do not have to use this.

Individuals cannot be charged to honour a subject access request. The data controller will aim to provide the relevant data within 30 days.

The data controller will always verify the identity of anyone making a subject access request before handing over any information.

Disclosing Data for Other Reasons

In certain circumstances, the General Data Protection Regulation allows personal data to be disclosed to law enforcement agencies without the consent of the data subject.

Under these circumstances, Evith Technology will disclose requested data. However, the data controller will ensure the request is legitimate, seeking assistance from the board and from the company’s legal advisers where necessary.

Providing Information

Evith Technology aims to ensure that individuals are aware that their data is being processed, and that they understand:

  • How the data is being used
  • How to exercise their rights

To these ends, the company has a privacy statement, setting out how data relating to individuals is used by the company.