Effective Date: 07-07-2020
Date latest review:
The protection of privacy and security of Personal Data is very important to Trustmoore. Any processing of Personal Data relating to identified or identifiable natural person will only be processed in accordance with this Policy.
|Board||Trustmoore’s highest decision-making and executive body deciding on all matters that have impact on Trustmoore.|
|Client||Natural person or company with which TM enters into a business relationship or for which a trust service is performed.|
|Controller||The natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of processing of Personal Data;|
|Consent||It is any freely given, specific, informed and unambiguous indication of the data subject by which he or she agrees with the processing of their Personal Data.|
|Data Breach||A breach exists in case of accidental or intended unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored or otherwise processed.|
|Data Protection Laws||The legislation regarding data privacy which may be applicable, based on the location of the TM service provider and of the Data Subject, such as the EU General Data Protection Regulation 2016/679 ("GDPR") or any other applicable data protection, privacy laws or privacy regulations.|
|Data Subject||A natural person who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier, account number, information about payments made from the bank account, among others.|
|Joint Controllers||Entities that jointly determine the “means and purposes” of the processing of Personal Data.|
|Personal data||Means any information relating to a Data Subject.|
|Processing of Personal Data||Personal data processing is a broad concept that encompasses everything that can be done with personal data. For example, “using”, “destroying” and “providing” are forms of processing. This Policy refers to any operation or set of operations which may be performed on Personal Data or on sets of Personal Data.|
|Processor||Processor is a natural or legal person, public authority, agency or other body which processes Personal Data on behalf of the controller.|
|Recipient||Recipient is a natural or legal person, public authority, agency or another body, to which the Personal Data are disclosed, whether a Third Party or not.|
|Sub Processor||Tthe legal or natural person appointed by the processor to process Personal Data on behalf of the Controller.|
|Third Party||An individual or a company (i.e. consultants, agents, intermediaries, representatives, subcontractors, suppliers) that performs work, provides a service or sells goods to TM.|
Terms that are capitalized, but not defined in this Policy have the same meaning as in Trustmoore Compliance Charter and Framework.
2. Background, Scope & Purpose
TM recognizes the expectations of its Clients and Employees, and the inherent risk that has the privacy, confidentiality and security of their personal data when it resides within TM.
This Personal Data Protection Policy (hereinafter referred as the “Policy") describes the privacy practice standards of TM for mitigating the risk, regarding the processing of personal data: what type of personal data TM collects, why and how TM collects, uses and stores it; the legal basis for processing it; and TM’s rights and obligations in relation to such processing.
TM globally applies this Policy as a minimum standard for protecting Personal Data of its Clients and Employees around the world. Furthermore, each TM service provider is also in charge of ensuring the application of local regulations .
3. Types of Personal Data
The Personal Data that TM collects and processes may depend on the type and scope of the services provided:
|Services||Types of personal data|
|Corporate Services||First name and family name, address, telephone, email, nationality, date of birth, place of birth, gender, Tax / Social / National identification number, compensation and benefits financials, user account details, job title, Client ID, signature, bank account details.|
|Human Resources and Payroll||First name and family name, address, telephone, email, nationality, date of birth, place of birth, gender, marital status, Tax / Social / National identification number, compensation and benefits financials, user account details, job title, employee ID, Client ID, signature, bank account details, health status related data.|
4. Mitigating measures regarding the risk of processing Personal Data:
4.1 Use of personal data
TM shall not process, transfer, modify, amend or alter the personal data or disclose or permit the disclosure of the personal data to any Third Party other than:
- As necessary to process Personal Data to provide the Services and/or otherwise in accordance with the documented instructions of the Client (e.g. contractual provisions), or
- As required to comply with Data Protection Laws or other laws (e.g. tax regulatons) to which TM is subject, in which case TM shall (to the extent permitted by law) inform the Client of that legal requirement before processing the Personal Data.
It is important to highlight that sometimes it may be necessary to conclude a contract, which includes Personal Data that must be subsequently processed by TM. The Data Subject is, for example, obliged to provide TM with specific Personal Data when our company signs a contract with him or her. The non-provision of Personal Data would have the consequence that the contract with the Data Subject could not be concluded.
However, before the Data Subject provides its Personal Data to TM, he or she may contact a TM employee in order to clarify the scope and purpose of this collection. The employee clarifies to the Data Subject whether the provision of Personal Data is required by law or is necessary for the conclusion of the contract, and also the consequences of non-provision of the personal data.
4.2 Storage of personal data
Personal data will be kept for the duration of the business relationship with Trustmoore and the years stipulated on local regulations for complying with all legal, regulatory and internal policy purposes. After expiration of this retention period, the corresponding data is routinely deleted.
Personal Data can be stored on Trustmoore systems, or third-party systems to which TM has been provided access to for the provision of Services. Personal data in hard copy files will be stored in locked cabinets, that can only be accessed if an employee of Trustmoore is present in that space.
4.3 Lawfulness of Processing
As a minimum legal standard, all processing of Personal Data must comply with the following general data quality principles, therefore Personal Data must be: (i) processed fairly and lawfully; (ii) collected for specific, explicit and legitimate purposes and not processed in a manner incompatible with those purposes; (iii) adequate, relevant and not excessive; (iv) accurate and, where necessary, up to date; (v) kept in an identifiable form for no longer than necessary; and (vi) kept secure.
Further, TM may only process Personal Data when either of the following legitimate purposes apply:
- Consent: The Data Subject has given consent to the Processing of his or her Personal Data for one or more specific purposes.
- Performance of Contract: Processing of Personal Data is necessary for the performance of a contract to which the Data Subject is party, or in order to take steps at the request of the Data Subject prior to entering into a contract;
- Legal Obligation: Processing of Personal Data is required for complying with a legal or regulatory obligation (including the laws of the financial sector, anti-money laundering and tax laws) to which TM is subject;
- Vital interest of the Data Subject: Processing of Personal Data is necessary for protecting the vital interests of the data subject or of another natural person;
- Task carried out in the public interest: Processing of Personal Data is necessary for the performance of a task carried out in the public interest or in the exercise of official authority.
- Legitimate interests: Processing of Personal Data is necessary for the purposes of the legitimate interests pursued by TM, except where such interests are overridden by the interests or fundamental rights and freedoms of the Data Subject which require protection of Personal Data, in particular where the Data Subject is a child.
It is Trustmoore’s obligation to identify the appropriate basis for processing, and to document it accordingly using the form provided in Annex II ‘Record of Processing Activities’.
TM must provide Data Subjects with a privacy notice setting out how the employees or client’s Personal Data will be processed.
TM may be required to appoint certain Third Parties to provide part of the services to its Client and Employee, or assist with providing technical support, such as I.T. service providers or other suppliers. By signing the Contract or Service Agreement, depending on the case, the Employee or the Client authorises TM to subcontract the Processing their Personal Data to Subprocessors.
Subprocessors are in each case subject to the terms and conditions laid down by TM, which are no less protective than those set out in this Policy and Contract or the Service Agreement. TM will inform the Client or Employee of the details of such Subprocessor(s) upon written request from the Data Subject. TM will inform the Client or Employee in advance of any intended changes concerning the addition or replacement of Subprocessors and thereby give the Data Subject the opportunity to object to such changes. If the Client or Employee does not object in writing within five (5) days of receipt of the notice, the Data subject is deemed to have accepted the new Subprocessor. If the Client or Employee does object in writing within five (5) days of receipt of the notice, TM and the Client or Employee will discuss possible resolutions.
4.4 Joint Controller
In case Trustmoore acts as a Director of the object company, it will act as a Joint Controller and will sign the Record of Processing Activities. Since Trustmoore determines the purpose and means of the processing of Personal Data of the object company, its role as a Joint Controller together with the Client is justified. In all other cases in which Trusmoore will provide services to the Client, it will act as a Processor, within the meaning of the Processor definition.
4.5 Rights of Data Subjects
TM takes appopriate measures to comply with Data protection laws in order to ensure Data Subjects rights. In case Data Subjects have any questions, requests or complaints regarding their rights, they are encouraged to contact TM via email@example.com. A written question, request or complaint should have a clear subject related to the rights of the Data Subjects, that are listed in the Annex IV ‘Right of Data Subjects’ of this Policy.
4.6 Personal Data Breach
A breach exists in case of accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored or otherwise processed. For the avoidance of doubt, even in cases where it is not certain whether any Personal Data was actually accessed, the existence of the (possibility to) access the data in question qualifies as a breach. This means that any possible access to encrypted devices of Trustmoore accompanied with an unauthorised disclosure of passwords will qualify as a data breach, unless there are security reasons justifying the access to encrypted devices. Below is a list of examples of Data Breaches:
- A USB drive with unencrypted documents containing personal data is left/lost/stolen in a public environment;
- A corporate email account is hacked or otherwise (presumably) accessed by anyone not granted access by the IT manager;
- (desktop) computers and/or servers containing personal data are stolen from (outside) the office.
4.7 Management of a Data Breach
All Data Breaches discovered or caused by employees of Trustmoore will be notified to the IT-Manager immediately and in any case within 24 hours. Where applicable an assessment will be made of the need to inform the local supervisory authority (please refer to Annex I Data protection authorities and legislation).
If notification is required, it must be done not later than 72 hours after having become aware of it. The notification is not required in case there is no risk to the rights and freedom of natural persons. Where the notification to the supervisory authority is not made within 72 hours, it shall be accompanied by reasons for the delay. Assessment whether in case of a Data Breach there was a risk to the rights and freedom of natural persons is to be done by Data Privacy Officer in collaboration with a Compliance Officer. The data breach notification obligation reflects a risk based approach. When assessing the impact of the breach the following must be taken into account:
- Type of breach;
- Nature, sensitivity, and volume of personal data;
- Ease of identification of individuals;
- Severity of consequences for individuals;
- Special characteristics of the individual;
- Special characteristics of the data controller;
- The number of affected individuals.
All the above factors need to be carefully assessed each one separate or in combination with the others to indicate the level of the risks to the individuals.
In cases where the Data Breach is likely to be deemed high risk to the rights and freedom of natural persons, Trustmoore shall also notify the Data Subject regarding the Data Breach without undue delay. The notification must at least describe the nature of the Data Breach, the categories and approximate number of Data Subjects and records concerned, details of the contact point, the likely consequences and the measures proposed to be taken. In case Trustmoore has taken subsequent measures which ensure that the high risk to the rights and freedoms of Data Subjects is no longer likely to materialize, no notification is required
Alternatively, whenever TM is acting as Data Processor only any Data Breach must be notified to the Data Controller - Information Security Policy.
4.7 Confidentiality and Security
TM keeps the Personal Data confidential and will ensure its staff and Sub-processors are bound by the same confidentiality obligation. TM implements appropriate technical and organisational measures to protect Personal Data; preventing unauthorized or unlawful access to it. - Information Security Policy.
4.8 Training and Awareness
Local Statutory Board supported by the CF should ensure a proper level of awareness of this Policy by means of providing trainings and awareness sessions. Each Trustmoore employee must adhere to and comply with this Policy and raise any questions and concerns with respect to this Policy to the CF.
4.9 Reporting and Escalation
Employees must report instances of non-compliance with this Policy to their line manager who reports to Local Statutory Board. Material issues must also be reported to the Global Risk and Compliance Board. Local authorities together with the regulator should be informed in accordance with local rules.
In case hierarchical reporting is not possible or appropriate, Trustmoore employees may report a (suspected) incident or a concern via the whistleblowing channel in accordance with Trustmoore Whistleblowing Policy.
6. Roles and Responsibilities
- The Board - approves this Policy and oversees its implementation on Trustmoore level.
- Local Statutory Board - responsible for the proper implementation of this Policy at the local level, proper level of awareness and for ensuring that personal data privacy is adequately addressed by means of allocating appropriate resources for the day-to-day management of Personal Data.
- Employees - responsible for ensuring personal data privacy in his/her daily work and for complying with this Policy by following the rules, attending compliance training and awareness sessions.
- Compliance Function (the “CF”) - responsible for providing an oversight, guidance and monitoring with regards to the rules and requirements of this Policy in accordance with the Compliance Charter.
- Audit Function – responsible for providing an independent review of the activities performed by the 1st and 2nd lines of defence in connection with this Policy.
This Policy is a Level I Policy that provides a global de-minimis norm that will be adopted by and implemented in all entities of the Trustmoore Group. Variations in accordance with local procedures are permitted in a Level II policy in accordance with the Group Corporate Governance Policy to the extent that they process Personal Data.
The CF is responsible for amending this Pesonal Data Protection Policy in order to remain compliant with any changes in law and/or to reflect how our business processes personal data. This version was created on 18 March 2020. The most recent version is available at TM.com, as well as on the local Trustmoore websites in each country where we operate.
 Controller, Joint Controller and Processor are terms based on the GDPR, which will be only used for Curaçao in those cases where GDPR is applicable.
 Please refer to Annex I ‘Data protection authorities and legislation’ for more information.
 For TM entities outside the EU, the Record of Processing Activities will be only mandatory in those cases where GDPR is applicable.
 For TM entities outside the EU, the application of this varies depending on their local regulation. Please refer to Annex I ‘Data protection authorities and legislation’.
ANNEX I: Data protection authorities and legislation
|Data protection authorities and legislation|
|Bulgaria||Commission for Personal Data Protection||https://www.autoriteitpersoonsgegevens.nl/||https://www.cpdp.bg/en/index.php?p=rubric&aid=2
|Curacao||Data Protection Board (College Bescherming Persoonsgegevens)-not yet appointed||https://irp-cdn.multiscreensite.com/9e98b338/files/uploaded/Landsverordening-bescherming-persoonsgegevens-Curacao-4-9-2010.pdf
|Cyprus||Office of the Commissioner for Personal Data Protection||http://www.dataprotection.gov.cy/||http://www.dataprotection.gov.cy/dataprotection/dataprotection.nsf/page3b_en/page3b_en?opendocument|
|Gibraltar||Gibraltar Regulatory Authority||https://www.gra.gi||https://www.gra.gi/data-protection/legislation|
|Hong Kong||Privacy Commissioner for Personal Data||https://www.pcpd.org.hk/||https://www.elegislation.gov.hk/hk/cap486!en-zh-Hant-HK.pdf?FROMCAPINDEX=Y|
|Ireland||Data Protection Commission (DPC)||https://www.dataprotection.ie/||https://www.dataprotection.ie/en/legal/data-protection-legislation
|Luxemburg||Commission Nationale pour la Protection des Données||https://cnpd.public.lu/en.html||https://cnpd.public.lu/en/legislation/droit-lux.html|
|Malta||Office of the Information and Data Protection Commissioner||https://idpc.org.mt/||https://idpc.org.mt/en/Pages/dp/legislation.aspx|
|United Kingdom||Information Commissioner’s Office (ICO)||https://ico.org.uk/||https://www.gov.uk/data-protection|
|Singapore||Personal Data Protection Commission Singapore||https://www.pdpc.gov.sg/||https://www.pdpc.gov.sg/Legislation-and-Guidelines/Legislation|
ANNEX II: Record of Processing Activities
[Name of the client] having its registered office at [Address, postcode, city], Chamber of Commerce number [#] hereinafter referred to as ‘the Controller’, lawfully represented by [Name of the director]
Trustmoore [full name: e.g Netherlands B.V.], having its registered office at [Address, postcode, city], Chamber of Commerce number [#], hereinafter referred to as ‘the Joint Controller’, lawfully represented by [name of the director]
- On [Date], the parties concluded an agreement with reference to the Management & Service Agreement (‘MSA’) concerning management, domiciliation, administrative and legal services, which are defined in detail in the aforementioned MSA. In performance of theagreement, Trustmoore [full name: e.g Netherlands B.V.], jointly control with [Name of the client] , and is in charge of the processing of personal data.
- Within the context of the performance of the Agreement,[Name of the client] is deemed a controller within the meaning of the GDPR; and Trustmoore [full name: e.g Netherlands B.V.], is deemed a join controller within the meaning of the GDPR.
- The parties want to treat the personal data that are or will be processed for the performance of the agreement with due care and in accordance with the GDPR and other applicable legislation and regulations concerning the processing of personal data.
- In accordance with the GDPR and other applicable legislation and regulations concerning the processing of personal data, the parties want to lay down their rights and obligations in respect of the processing of the data subjects’ personal data in writing in this processor agreement.
Record of Processing Activities – Jointly Controller
|CONTACT DETAILS OF THE CONTROLLER|
|Controller:||Name of the client:|
|Joint Controller:||Name:||e.g Trustmoore Netherlands B.V.|
|Contact details:||Prins Hendriklaan 26, 1075BD Amsterdam|
|DESCRIPTION OF THE PROCESSING|
|Processing objectives:||e.g: The information contains personal data of employees and clients of [Name of clien].. The information is necessary for internal compliance procedures and the administration and corporate secretarial services defined in detail in the MSA dated on [date].|
|The purposes of the processing:||e.g: KYC procedures: name and background screening, write here what we do for them.|
|Secondary processing:||Category:||Description of the category:|
|Profiling is defined as “any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyse or predict aspects concerning that natural person’s performance at work, economic situation, health, personal preferences, interests, reliability, behaviour, location or movements”|
|Decisions based solely on automated processing:
|Data subject category:|
|Category of personal data:||CATEGORY||DESCRIPTION|
|Basic personal information||e.g: Name, Surname, ID number, passport, date of birth, birth place|
|Special categories of personal data||E.g: personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership.|
|Personal data related to Employment||e.g: Payroll related information.|
|Personal data related to profesional and academical life.|
|Financial data||e.g: Payroll related information, bank account number.|
|Data related to transactions and services.|
|Legitimation of the processing of personal data:||ConsentContractual necessity
|Compliance with legal obligationsPublic interest
|TRANSFER OF PERSONAL DATA|
|Term of data storage|
|Transfer to Third - parties||YES NO|
|1. Recipients name:|
|Recipients contact details:|
|International transfer of personal data (outside European Union)||YES NO|
|Country or organization recipient||Description of the international transfer|
|Compliance with legal obligationsPublic interest
|Description and attached documentation of suitable safeguards|
The Data Processing Cycle: (Before the processing)
Documentation attached to the contract
|Data category||The aforementioned data categories.|
|Employees with access to the personal data :||LAM, FAM (write down the name).|
|Activity:||Server (Information in our Security Policy)Yes No|
|Data category:||The aforementioned data category|
|Employees with access||The aforementioned employees.|
|Techonologies used||Explained on the Security Policy|
|General description of the technical and organizational security measures|
|Security measures:||The controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate:1. The encryption of personal data.
2. The ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services
3. The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident
4. A process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing
|LIST OF PROCESSOR|
|Trustmoore (e.g: Netherlands B.V.)|
|LIST OF SUB - PROCESSORS|
|Write here the name and contact details|
ANNEX III: List of Subprocessors
Subject to the authorisation provided in section 5 of the Personal Data Protection Policy of TM or authorisation in the Service Agreement or Contract, TM engages Third Party companies (“Subprocessors”) listed in the table below to provide (parts of) services on its behalf, whereby Clients or Employee Personal Data is being processed by the Subprocessors in the relevant countries.
|Company name||Address||Type of Services Provided|
|e.g Compliance Wise||Compliance software|
|e.g HiBob||HR Services|
|e.g Microsoft Limited||Data storage and unified communication.|
ANNEX IV: Right of the Data Subjects
a) The right to be informed: Data Subjects have the right to be informed about the collection and use of their personal data. In case they have question, a request or a complaint regarding their rights, they are encouraged to contact TM via firstname.lastname@example.org.
b) The right of access: Data subjectswill have a right to access copies of their personal data by making a written request to the controller. The initial request is free, though a charge can be made for subsequent requests. Controllers can refuse the request if it is manifestly unfounded or excessive. The response must be provided within a month, though this can be extended by two months if the request is complex.
c) The right to rectification: Data Subjects have the right to obtain from the controller the rectification of inaccurate personal data concerning him or her.
d) The right to erasure (right to be forgotten): Data Subjectcan ask that their data be deleted in certain circumstances. However, those circumstances are relatively limited, for example where the processing is based on consent, that consent is withdrawn and there are no other grounds for processing. Even where the right does arise, there are range of exemptions, for example where there is a legal obligation to retain the data.
e) The right to restrict processing: Data Subjects have the right to request the restriction or suppression of their Personal Data in certain circumstances/
f) The right to data portability: Data subjectswill also have a right to data portability where the condition for processing Personal Data is consent or the performance of a contract. It entitles individuals to obtain any personal data they have “provided” to the controller in a machine-readable format. Individuals can also ask for the data to be transferred directly from one controller to another.
g) Right to object: A Data Subject can object to their Personal Data being processed for direct marketing purposes at any time. This includes the processing of their personal data for profiling purposes.
h) Rights in relation to automated decision making and profiling: TM can only carry out this type of decision-making where the decision is:
i. necessary for the entry into or performance of a contract;
ii. authorized by Union or Member state law applicable to the controller;
iii. or based on the individual’s explicit consent.
1. What are cookies?
A cookie is a small file of letters and numbers that is sent from a web server to your computer whenever you visit a website, and it is stored on your browser or the hard drive of your computer if you agree. They are designed only to collect information of an anonymous nature. We will not combine such anonymous information with your personal details. When you visit the website of Trustmoore, we use different types of cookies to maintain your connection to this website (www.trustmoore.com). You can at any time change or withdraw your consent from the Cookie Declaration on our website.
Further, cookies help Trustmoore to provide you with a good experience when you browse our website and also allow us to better understand how our website is used and improve our site to be as comprehensive as possible. We do not use these cookies to store any personal information about you.
Learn more about who we are, how you can contact us and how we process personal data in our Personal Data Protection Policy.
2. Types of cookies
Although there may be a variety of different cookies that perform different functions, generally, there are two main types of cookies: a) Session’ and b) ‘Persistent’ Cookies.
a) Session Cookies: ‘Session cookies’ (also known as in-memory cookies or transient cookies) allow us to track your actions during a single browsing session. They do not remain on your device afterwards: They expire (deleted from your computer or mobile device) at the end of a browser session or when you leave the website.
b) Persistent Cookies: ‘Persistent cookies’ remain on your device between sessions or for a pre-determined period of time (as determined by the site operator). We use them to authenticate you and to remember your preferences: The information from the persistent cookie is transmitted to the web server every time you visit the originating website or every time you view a resource belonging to that website. We can also use them to balance the load on our servers and improve your experience on our site.
Session and Persistent cookies can be either i. First or ii. Third party cookies.
i. A first-party cookie is set by the website being visited.
ii. A third-party cookie is set by a different website. This may be used to enable functionality of third-party services (eg. media players, Google Analytics, WebTrends, etc.) and/or provide third-parties with information. If third party services collect information, they usually do so anonymously and in the aggregate to provide information helpful to the service provider such as website trends, without identifying individual visitors.
Local Shared Objects (otherwise known as ‘Flash cookies’) is another example of a type of third party cookie used to manage basic permissions relating to the embedded service like media players (i.e. YouTube, Adobe Flash, Shockwave, etc.) and to check/monitor bandwidth or resource consumption. Flash cookies are stored on a user’s computer much the same way as cookies are, however, it may not necessarily be possible to manage them at browser level.
3. Types of cookies used by this website
The cookies used on our website are the following:
|Stores the user's cookie consent state for the current domain||Trustmoore.com|
|Collect||Pixel||Session||Used to send data to Google Analytics about the visitor's device and behaviour. Tracks the visitor across devices and marketing channels.||google-analytics.com|
|_ga||HTTP||2 years||Registers a unique ID that is used to generate statistical data on how the visitor uses the website.||google-analytics.com|
|_gat||HTTP||1 day||Used by Google Analytics to throttle request rate||google-analytics.com|
|_gid||HTTP||1 day||Registers a unique ID that is used to generate statistical data on how the visitor uses the website.||google-analytics.com|
|fr||HTTP||3 months||Used by Facebook to deliver a series of advertisement products such as real time bidding from third party advertisers.||facebook.com|
|tr||Pixel||Session||Used by Facebook to deliver a series of advertisement products such as real time bidding from third party advertisers.||facebook.com|
|_fbp||HTTP||3 months||Used by Facebook to deliver a series of advertisement products such as real time bidding from third party advertisers.||facebook.com|
All our cookies fall within the classifications Strictly Necessary, Functionality and Performance. By accessing the website or online services provided by Trustmoore you acknowledge that you have read, understand, and agree to the placement of cookies on your computer or mobile device in accordance with the terms of this policy. If you do not wish to accept cookies from our websites or services, please either disable cookies or refrain from using this website. Please note that deleting cookies, refusing or disabling their use when visiting Trustmoore website or using our online services may have an impact on the user experience as parts of the website(s) or services may no longer work.
Google Chrome: Settings> Show advanced options> Privacy (Content settings)> Cookies: https://support.google.com/chrome/answer/95647?co=GENIE.Platform%3DDesktopandhl=es
Microsoft Internet Explorer: Internet Options> Privacy> Advanced: https://support.microsoft.com/es-es/help/17442/windows-internet-explorer-delete-manage-cookies
Firefox: Options> Privacy> Cookies:
Safari, iPad and iPhone: Preferences> Privacy: https://support.apple.com/kb/ph21411?locale=es_ES
Opera: Settings> Options> Advanced> Cookies: http://help.opera.com/Windows/12.00/es-ES/cookies.html
You can also disable or delete the stored data used by technology similar to cookies, such as Local Shared Objects or Flash cookies, by managing the browser’s “add-on settings” or visiting the website of its manufacturer. For instance, to disable Flash cookies, please visit http://helpx.adobe.com/flash-player/kb/disable-local-shared-objects-flash.html.
Alternatively, you may wish to visit www.allaboutcookies.org for comprehensive information on how to disable cookies on a wide variety of browsers.
6. Contact Details
Company Name: Trustmoore Netherlands B.V
Company Address: Prins Hendriklaan 26, 1075 BD Amsterdam
Phone: +31 204712707