top of page
  • 1. Consent

    At Snooze Technologies, we value your privacy and want to be transparent about how we collect, use, and protect your personal data. This Privacy Policy explains how we do this when you visit our website, use our services, or interact with us in other ways. By accessing and using our website and services, you’re agreeing to the terms in this policy.

    2. Who we are

    We are Snooze Technologies UK LTD, a tech company based in the UK, company registration number 15881043, registered office address First Floor Office, 3 Hornton Place, W8 4LZ, London, United Kingdom.

    Under the Data Protection Act and the EU General Data Protection Regulation (GDPR), we’re the “"Data Controller" of your personal information, which means we’re responsible for how it’s used and protected.

    If you have any questions or concerns about your data, or if you’d like to exercise any of your rights under the GDPR, please feel free to get in touch with us via email at info@snoozetech.com.

    3. What information we collect

    We collect a few types of information from you in order to provide and improve our services:

    • Information you provide directly: This includes any personal data you share with us, such as when you fill out forms on our website, email us, or apply for a job with us.

    • Information we collect automatically: Every time you visit our website, we automatically collect certain technical details like your IP address, browser type, and other usage data to help us understand how you use our site.

    • Information from other sources: Sometimes, we may receive additional information about you from third parties like business partners or publicly available sources (e.g., Companies House) to help us offer better services or improve our website.

    We may also collect information on behalf of our clients if you visit their websites or use their services. In these cases, we act as a “Data Processor” and the client is the “Data Controller.” If this applies to you, please reach out to the relevant organisation for any questions regarding your data.

    4. How we use your information

    We use your information in a few keyways to help us run our business and provide you with the best possible experience:

    • To make sure our website works as intended and gives you a great user experience.

    • To respond to your requests or questions, whether that’s through our contact form, emails, or customer support.

    • To send you information or updates about services you’ve asked for, or that we think might be useful to you (with your consent).

    • To allow you to participate in interactive features, like surveys, chats, or job applications.

    • To notify you about any changes to our services or policies.

    5. Technical information we collect

    Whenever you visit our website, we collect certain technical details automatically. This includes things like your IP address, the browser you’re using, and the pages you visit. These help us analyse website traffic, diagnose problems, and improve your experience.

    We also use tools like Google Analytics to understand how visitors interact with our site, so we can make it better. For example, Google Analytics helps us understand things like which pages are the most popular or where visitors are coming from. All of this is anonymous and doesn’t identify you personally.

    6. Where your information is stored

    We host our website securely, and the data we collect is stored through trusted third-party services like Wix Analytics (which helps us manage customer relationships) and Google Analytics (which helps us analyse website traffic). We take great care to ensure your data is safe and protected at all times.

    Although we rely on third-party providers, we remain responsible for your data’s security. If you’d like to learn more about how these providers handle your data, you can check out their privacy policies (like Wix’s and Google’s).

    7. How we protect your data

    We take your privacy seriously and have security measures in place to protect your data from unauthorised access, loss, or theft. We restrict access to your data to employees and partners who need it to do their jobs. We also make sure our partners follow strict guidelines to protect your information.

    That said, no system is completely foolproof. While we do everything we can to keep your data safe, we can’t guarantee absolute security, especially when data is being transmitted over the internet. Any transmission of data is at your own risk.

    8. Sharing your information

    We may need to share your personal information with third parties in the following situations:

    • If we’re required to do so by law (e.g., for legal compliance, fraud prevention, or to protect our rights).

    • If we work with third-party service providers (e.g., payment processors, marketing services, analytics platforms) to help us provide our services. These partners only process your data on our behalf and in line with our instructions.

    • If we ever transfer or merge parts of our business (for example, if we sell or acquire a company), your information might be transferred to the new owners as part of the transaction.

    Rest assured, we’ll only share your personal data with third parties who are compliant with data protection laws and who treat your data with the same care that we do.

    9. Third-party links

    Our website may contain links to third-party websites. These sites have their own privacy policies, and we encourage you to review them before sharing any personal data. We’re not responsible for the content or practices of these external sites.

    10. Your rights

    You have the right to know what personal data we hold about you, and you can request access to it at any time. If you want to update or correct your data, just let us know.

    You also have the right to ask us to delete your data from our records (the “right to be forgotten”). If you want to exercise any of these rights, just send us an email at info@snoozetech.com, and we’ll take care of the rest.

    11. How long we keep your data

    We only keep your personal data for as long as we need it to fulfil the purposes for which it was collected, or as required by law. This might include keeping records for legal, tax, or accounting reasons.

    When it’s no longer necessary to keep your data, we’ll safely dispose of it or anonymise it so it can’t be traced back to you.

    12. Cookies

    Cookies are small files that are stored on your device when you visit a website. They help us improve your experience by remembering your preferences and helping us analyse how our site is used.

    We use cookies for the following purposes:

    • To make sure the website works smoothly.

    • To collect anonymous data that helps us understand how our visitors use the website (e.g., which pages are most popular).

    You can control cookies through your browser settings.

    13. Changes to this Privacy Policy

    We may update this Privacy Policy from time to time. If we do, we’ll post the updated version on this page, and if the changes are significant, we’ll notify you by email.

    It’s important that the personal data we hold about you is accurate and up to date. Please let us know if your information changes during your time with us.

  • 1. What are cookies?

    Cookies are small text files that are placed on your device when you visit a website. They store little bits of information to help the site work properly and make your browsing experience better. In this Cookie Policy, we’ll explain what cookies are, how we use them, what information they collect, and how you can manage your cookie preferences.

    2. How do we use cookies?

    Like most websites, ours uses cookies to improve the way it works and to give you a better experience. We use both first-party and third-party cookies for different purposes:

    • First-party cookies are essential for the website to function properly. They help with basic features like logging in securely and remembering your consent preferences. These cookies don't collect any personal information.

    • Third-party cookies help us understand how people use our site, which pages they visit, and how we can improve the overall experience. These cookies can also help keep the site secure and show you relevant ads based on your interests.
       

    Types of Cookies We Use.
     

    Here’s a breakdown of the different types of cookies we use on our website:

    Necessary Cookies:
These are essential for the basic operation of the site. They ensure features like secure logins and remembering your cookie preferences work correctly. These cookies don’t store personal information.

    • cookieyes-consent – Duration: 1 year
This cookie remembers your cookie consent preferences, so your choices are respected on future visits. It doesn’t collect or store any personal information.
       

    Functional Cookies:
These cookies enable certain features like sharing content on social media or collecting feedback. They make the website more functional and personalized.

    • wp-wpml_current_language – Duration: Session
This cookie stores the language setting you’ve selected on the site, ensuring you see content in your preferred language.

    Analytics Cookies
We use these cookies to gather information on how visitors use our website. They help us track metrics like the number of visitors, bounce rates, and traffic sources, allowing us to improve the site.

    • CONSENT – Duration: 2 years
This cookie is set by YouTube when you watch an embedded video on our site. It collects anonymous data to help us understand how videos are performing.
       

    Advertisement Cookies:
These cookies help us provide you with more relevant ads based on your previous interactions with our site. They also help us measure the effectiveness of our advertising campaigns.

    • YSC – Duration: Session
Set by YouTube, this cookie tracks views of embedded YouTube videos on our pages.

    • VISITOR_INFO1_LIVE – Duration: 5 months, 27 days
Another YouTube cookie, it helps measure the bandwidth of the user, determining which version of the video player to show.
       

    Uncategorised Cookies:
These are cookies that we’re still analysing and haven’t yet categorized. They may be used for other purposes as we continue to evaluate them.

    • ip2location_redirection_first_visit – Duration: 1 day
This cookie has no description available yet, but it’s used for redirecting first-time visitors.

    • VISITOR_PRIVACY_METADATA – Duration: 5 months, 27 days
No description is available at the moment.

    3. Manage your cookie preferences

    You have full control over the cookies we use. If you'd like to change your preferences, just click the cookie settings button above. This will bring up the cookie consent banner again, allowing you to adjust your preferences or withdraw your consent entirely.

    If you'd rather block or delete cookies entirely, most web browsers give you options to do so.

  • At Snooze Tech, our senior management team is dedicated to safeguarding the confidentiality, integrity, and availability of all information assets, both physical and digital, across the company. This commitment ensures that we meet legal, regulatory, and contractual requirements, while also protecting our public reputation. Our information security approach aligns with our business objectives and is supported by our Information Security Protocol, which helps facilitate secure information sharing, streamline electronic operations, and minimise risks related to information security.

    Our strategic plan and risk management framework guide how we identify, assess, and manage risks related to information security. The Risk Assessment, Statement of Applicability, and Risk Treatment Plan define the controls we have in place to manage these risks. The Chief Information Security Officer (CISO) is responsible for overseeing the implementation and ongoing maintenance of the risk treatment plan, and additional risk assessments may be conducted as needed to address emerging threats.

    Key areas covered by this policy include business continuity planning, data backup procedures, protection against viruses and hackers, access controls to systems and physical spaces, and incident reporting. Each of these areas has clearly defined objectives, which are supported by detailed policies and procedures.

    Snooze Tech aims to meet specific, measurable information security goals that are aligned with our overall business strategy. These goals are regularly reviewed and adjusted based on the results of risk assessments and any changes to the risk treatment plan.

    1. Employee and external party responsibilities

    All employees at Snooze Tech, including full-time and part-time staff, contractors, and certain external parties, are required to follow this policy and comply with the protocol. Employees will receive initial and ongoing information security training, with more specialized training provided as necessary for specific roles. Non-compliance with the policy may result in disciplinary action, as outlined in our disciplinary procedures or contractual agreements with third parties.

    2. Continuous improvements of security protocol

    We are committed to the continuous review and improvement of our protocols. Senior management provides full support for the framework, ensuring that the security policy is regularly reviewed and updated in response to changes in risk assessments or treatment plans.

    3. Confidentiality, Integrity, and Availability of Information

    At Snooze Tech, we believe in protecting three core principles of information security:

    1. Confidentiality – We ensure that information is only accessible to those who are authorised to access it. This helps prevent both accidental and deliberate breaches of privacy, protecting sensitive business data and proprietary knowledge.

    2. Integrity – We take measures to protect the accuracy and reliability of our data and systems, ensuring that information is not altered or destroyed, either intentionally or accidentally. This includes the use of backup plans, contingency procedures, and robust incident reporting.

    3. Availability – We ensure that our information and assets are accessible to authorised users when needed. This means that our IT infrastructure is designed to be resilient, and we can quickly detect and respond to incidents such as malware, cyberattacks, or system failures that could impact business operations.

    4. What are our information assets?

    Our information assets are not just the data you see on screens. They include:

    • Physical assets such as computer hardware, servers, filing systems, and paper records.

    • Electronic assets like data stored on servers, websites, mobile devices, USB drives, and any other digital storage.

    • Software that runs our systems, such as operating systems, applications, and utilities that support information processing.

    • Data transmitted electronically through emails, messages, or other digital means.

    All of these are crucial to our operations, and they must be protected from unauthorised access, loss, or damage.

    5. What is a security breach?

    A security breach occurs when there is a disruption or threat to the availability, confidentiality, or integrity of Snooze Tech’s information assets. This can happen through a variety of means, including cyberattacks, unauthorized access, or physical theft.

    6. Policy communication and review

    This policy is shared with all employees, contractors, and relevant external parties during onboarding and whenever significant changes occur within the organization. It is also available to any interested parties upon request. We review this policy at least once a year, or sooner if there are major organisational changes, to ensure it remains effective and relevant.

bottom of page