PRIVACY


The Data Protection Act requires Lloyds Banking Group companies to manage personal information in accordance with the Data Protection Principles. In particular, our Group of companies is required to process your personal information fairly and lawfully. This means that you are entitled to know how we intend to use any information you provide. All our employees are personally responsible for maintaining information confidentiality. We provide training and education to all employees to remind them about their obligations. In addition, our policies and procedures are regularly audited and reviewed.


Your information will be held by Lloyds Banking Group.


More information on the Group can be found at www.lloydsbankinggroup.com.


Your personal information will be held securely in Lloyds Banking Group systems so that we and any other companies in our Group that you have dealings with, either now or in the future, can manage your relationship with us.


We will not retain your personal information for longer than is necessary for the maintenance of your account, or for legal or regulatory requirements.


We may share the personal information we hold about you across the Lloyds Banking Group for the following administrative activities:

(a) facilitating the secure access to online platforms;

(b) undertaking transactional analysis;

(c) crime detection, prevention, and prosecution;


Your data may also be used for other purposes for which you give your specific permission, or, in very limited circumstances, when required by law or where permitted under the terms of the Data Protection Act 1998.

We will treat your personal information as private and confidential, but may share it with each other and disclose it outside the Lloyds Banking Group if:

(a) allowed by this agreement;

(b) you consent;

(c) the law, regulatory bodies, or the public interest permits or requires it;

(d) required by us or others to investigate or prevent crime;


We will always ensure your information remains safe and secure.


When we may monitor your activity

We will monitor/record file transfer metadata and messages which may include unopened, encrypted and secure messages.


There may be situations where it is necessary for the Group to instigate covert monitoring, for example:

a) it is considered the business is at serious risk

b) a colleague is suspected of criminal activity or malpractice and that notifying colleagues of the monitoring would influence its prevention and detection