Secure Power Terms & conditions
- (1) “Secure Power” means Secure Power Limited, its subsidiaries and any of its subcontractors.
- (2) “Client” means the client to whom Secure Power is providing the Services.
- (3) “Services” means the services which Secure Power will perform as described in a quotation or a tender submission
- (4) “Equipment” means the products sold by Secure Power as set out in a quotation or a tender document
- (5) “Normal Working Hours” means 09:00hrs to 17:30hrs on a Working Day.
- (6) “Working Day” means Monday to Friday, excluding Bank or other Public holidays in England.
- (7) “Out of Hours” means time outside of Normal Working Hours.
- (8) “Data” means Client data to the extent that it relates to their requirements for Services or is necessary for the proper provision of the Services to the Client.
- (9) “Returns Policy” means Secure Power’s returns policy document
- (1) All contracts for the provision of Services and Equipment by Secure Power shall be deemed to incorporate these terms and conditions, which shall prevail over any other terms from the Client. Once an order has been received, if the Client wishes to cancel the order, the Client will be liable for the cancellation and postponement charges as set out in Secures Powers returns policy.
- (2) All orders are subject to acceptance and to availability to provide the Services ordered: Secure Power is entitled to refuse any order placed by the Client.
- (3) The Client undertakes that all details it provides to Secure Power for the purpose of purchasing Equipment or Services are correct.
- (1) Services and Equipment, together with VAT, are invoiced at the price as set out in a quotation or tender submission. The tender submission and quotation pricing are valid for 30 days only from the date of the tender submission or quotation, unless otherwise stated therein. (2) APC pricing is valid for 14 days.
- (2) Secure Power reserves the right to modify the prices from time to time for future orders.
- (3) Any estimates made by Secure Power for the cost of any Services and Equipment shall be estimates only. Whenever estimated prices are quoted, Secure Power shall use all reasonable efforts to perform the relevant Services at the estimated price but in no event shall such estimates constitute a fixed price or a not-to-exceed price agreement unless stated otherwise in a quotation or tender documentation.
- (4) Any prices quoted by Secure Power in a local currency may be adjusted by Secure Power due to fluctuations in GBP exchange rate.
Delivery, Ownership and Risk
- (1) Secure Power shall use reasonable endeavours to despatch Equipment by the date agreed with the Client, but does not accept liability for failure to deliver within the stated time where this is caused by circumstances beyond Secure Power’s control. This may include, but shall not be limited to such as delays caused by couriers or manufacturer lead times. If it appears a delay may be likely, Secure Power shall use all reasonable efforts to contact the Client and advise of the delay.
- (2) Secure Power does not accept liability for shortages or damage to deliveries unless the Client notifies Secure Power of the shortage or damage in writing within 48 hours of receipt of the delivery.
- (3) Clients are required to be able to accept the Equipment when they are ready for delivery within Normal Working Hours.
- (4) Ownership of the Equipment does not pass to the Client until payment is received in full by Secure Power. In any event ownership in software shall remain with the software vendor.
- (5) If the Client cannot accept delivery, Secure Power may at its option:
- (a) store and insure the Equipment at the Client’s expense and risk or
- (b) sell the Equipment at the best price reasonably obtainable and (after deducting reasonable storage insurance and selling costs) pay to the Client any excess over the sale price or charge the Client for any shortfall or
- (c) re-arrange delivery provided that Secure Power may charge the Client for the additional delivery costs incurred.
- (6) Some products supplied by Secure Power fall within the scope of the EU regulation 428/2009 and that these goods are subject to controls when transferred outside of the EU. In case of export of these products outside of the EU, Client will be responsible for obtaining the required licences from the relevant authority.
1.3 Information & Data Use
Personal information and data we hold about you will be processed as part of our fulfilment of your subscription, enquiry, project, product and service provision.
Email communications will be undertaken as part of our business process to ensure that your subscription, enquiry, project, product and service is delivered to fulfilment and within the warranties of our terms and conditions.
Marketing communications will only be undertaken on an “opted in” basis with the option for you to “opt out” at any time as stated by the requirements of GDPR. We may send communications and information to you about related services and activities at our company as part of your opted in request.
All information provided is done so willingly as part of our business operations. You will be on our website under your own will without enforcement and you can provide information to us as part of your enquiry without enforcement. Our dealings are one where you have complete choice to engage with us via our website and our enquiry systems.
1.4 Information & Data Sharing
As a business, we work in partnership with third parties to ensure the operational effectiveness of processes and our general status to fulfil our day to day functions. Third parties will include:
- - Our website hosting company(s).
- - Our email technology provider(s).
- - Our website analytics provider(s).
- - Our accountants company(s).
- - Our information technology support company(s).
- - Our website development and marketing company(s).
- - Our banking company(s). Our logistics company(s).
- - Our agent(s), supplier(s) and contractor(s).
Your information will never be sold to third parties and we do not compile information and data for that purpose. Your information and data will not be provided to third parties that are not part of our business operations. We will process information on the basis of it being required to fulfil your enquiry or a contract with you.
All website visits occur under the secure encryption HTTPS protocol. All enquiry and order forms will be processed on the website within the HTTPS protocol.
We will only share information and data with third parties as part of our normal business operations as outlined below:
- - If requested by you.
- - To fulfil your subscription, enquiry, project, product or service.
- - To appear on documentation relating to your subscription, enquiry, project, product or service as part of our business process.
1.5 Information & Data Collection
Your visit to this website is done so on a voluntarily basis. All information and data collected on this website is done so on a voluntarily basis. All information and exchanges between you and our business is done so with consent. We will keep all information and data collected to a minimum and will not seek sensitive information through our website. Sensitive information is defined as being data relating to gender, occupation, location, ethnic origin, mental state, physical state, orientations including political, religious or other points of view. If you believe that your information and data is being utilised in a manner outside of our normal business operations you should contact us using the details found on this website.
1.6 Information & Data Retention
Our business aims to keep information for a period of six years unless you notify us that you no longer want your information stored with us.
1.7 Information & Data Security
Our website is provided within the secure encryption HTTPS protocol. All subsequent forms and interactive elements contained within our website operate within the secure HTTPS encryption protocol. Your information and date will be processed on receipt at our company using secure business processes. All internal parties involved with your information and data follow an agreed security policy. Authorised internal parties are provided with your information and data with confidentiality of this information being part of our process.
Other measures are in place to protect information and data security including access controls, password policies, encryptions, pseudonymisation, practices, access restrictions, firewalls, anti-virus, anti-malware, data breach and authentication protocols.
1.8 Cookies Usage
We are committed to ensuring that your privacy is protected. Should we ask you to provide certain information by which you can be identified when using this website, then you can be assured that it will only be used in accordance with this privacy statement. This website does not deploy any third party affiliate marketing cookies. More information on cookies can be found on https://www.aboutcookies.org. All cookies deployed form part of the following:
- - Essential usage cookies to allow the website to function.
- - Non-essential cookies to allow us to track visitor numbers and related information such as popular webpage content.
- - We do not use any website cookies to track your activity in the generation of third party revenues or anything else that would be classed as intrusive to your activity on this website.
- - A cookie is a small file which asks permission to be placed on your computer’s hard drive. Once you agree, the file is added and the cookie helps analyse web traffic or lets you know when you visit a particular site. Cookies allow web applications to respond to you as an individual. The web application can tailor its operations to your needs, likes and dislikes by gathering and remembering information about your preferences.
- - We use traffic log cookies to identify which pages are being used. This helps us analyse data about web page traffic and improve our website in order to tailor it to customer needs. We only use this information for statistical analysis purposes and then the data is removed from the system.
- - Overall, cookies help us provide you with a better website, by enabling us to monitor which pages you find useful and which you do not. A cookie in no way gives us access to your computer or any information about you, other than the data you choose to share with us.
- - You can choose to accept or decline cookies. Most web browsers automatically accept cookies, but you can usually modify your browser setting to decline cookies if you prefer. This may prevent you from taking full advantage of the website.
1.9 Cookie Classifications By Intrusiveness Level
1.9.1 Intrusiveness Level:
ZERO Any cookies that have the sole purpose of making the website work. They will always be first party, and for the most part session cookies. They would usually be used solely to enable site navigation, like maintaining a persistent user session across pages. They are cookies that would fall under the ‘strictly necessary’ exemption for consent in the regulations.
1.9.2 Intrusiveness Level: LOW
These are cookies that are designed to enhance the core user experience on the site, or help with measuring site performance. Google Analytics cookies, fall into this category which is a technology that allows for the tracking of website visitor numbers and areas of the website that are utilised by visitors. This information is provided by software that is provided by Google. This category is always first party and may include both session and persistent cookies. These cookies have a longer life span than 30 days and can be cleared from your browser at any time.
This website uses Google Analytics cookies that are “Intrusively Low” to inform the website owners of traffic and visitor numbers and related information such as webpage content usage.
1.9.3 Intrusiveness Level: MEDIUM
These are cookies that might be used to store more personally identifiable information, or can be used for limited cross-site tracking. This category would also include first party cookies that track or control the user experience within a site, in a way that might not be obvious to the user or under their control. Especially if it is a persistent cookie that can do this across multiple visits. A cookie that enables a website to present content based on previous visits by that user, or based on personal information would be good examples. Cookies used by many types of social networking services, and set by sharing buttons, would fall into this category. This is because they are only able to track a user if they have previously signed in and agreed to their terms and conditions, so they don’t affect all visitors. This would also include third party cookies that enable certain types of plug-ins and widgets to be added to a site to enhance user functionality, but are not identifying visitors or tracking behaviour across other domains, unless they have otherwise opted-in or signed up directly with that provider. The Twitter Follow button is a good example of this. It can set cookies used for tracking and user profiling, but only if that user has a Twitter account.
1.9.4 Intrusiveness Level: HIGH
Any cookies that are mainly intended to track and record visitor interests, without any kind of prior consent, and to aggregate that data across sites for the benefit of third parties would fall into this category. This would include all types of cookies served by online advertising and also cookies set through the provision of embedded content that is not directly advertising related. Embedded YouTube videos, or Google Maps set and retrieve cookies which could be used to track users across sites, even if they are not used to then serve up adverts. The vast majority of third party cookies would fall into this category.
This website does not directly deploy cookies that are “Intrusively High” within its source code. We do not deploy any third party cookies that are sold or supplied directly to third parties. Any third party embed technology such as a YouTube video has been set to “enable privacy enhanced mode” which means that no intrusive cookies are deployed.
1.9.5 Changing Cookie Settings on Your Computer
- - Google Chrome Browser Software – https://www.google.com
- - Microsoft Edge Browser Software – https://www.microsoft.com
- - Mozilla Firefox Browser Software – https://www.mozilla.org
- - Apple Safari Browser Software – https://www.apple.com
1.10 Third Party Links
External links to third party websites are maintained by third parties with whom we have no control over. We offer no guarantees in respect to accuracy, intent, information and data contained in third party websites.