DCM (Digital Cloud Management)

Compliance & Legal

Structured Governance. Transparent Operations. Regulatory Alignment.

Compliance & Legal

DCM – Digital Cloud Management Ltd operates under a structured governance framework aligned with UK and applicable international regulatory expectations.

 

We maintain documented policies, defined operational procedures, and security controls to ensure responsible service delivery across all managed IT, cybersecurity, cloud, and infrastructure services.

Our compliance and governance framework is supported by clearly documented policies and statements, including:

 

• Frequently Asked Questions (Compliance & Governance)
• Privacy Policy
• Cookie Policy
• Terms of Service
• Acceptable Use Policy
• Refund Policy
• Complaints Procedure
• Information Security Statement
• Incident Response Policy
• Recruitment Privacy Notice
• Modern Slavery Statement

• Assessibility Statement

 

Together, these documents provide clarity, accountability, and structured operational standards for our clients, partners, regulators, and financial institutions.

 

This governance structure demonstrates our commitment to regulatory alignment, responsible data handling, operational transparency, and long-term business integrity.

 
Our compliance structure is designed to support:

 

Privacy Policy

 


Privacy Policy

DCM – Digital Cloud Management Ltd

Last Updated: Friday, 20 February 2026


1. Introduction

DCM – Digital Cloud Management Ltd (“DCM”, “we”, “us”, “our”) is committed to protecting and respecting your privacy.

This Privacy Policy explains how we collect, use, disclose, and safeguard personal data when you:

  • Visit our website

  • Use our Managed IT, Cybersecurity, Cloud, Network, Backup, CCTV, or Digital Services

  • Contact us

  • Apply for employment

  • Engage with us as a client, partner, or supplier

We process personal data in accordance with:

  • UK General Data Protection Regulation (UK GDPR)

  • Data Protection Act 2018

  • Applicable EU GDPR (where relevant)


2. Who We Are

Company Name: Digital Cloud Management Ltd
Trading Name: DCM
Registered in: England & Wales
Registered Office: 981 Great West Road, Brentford, TW8 9DN, United Kingdom
Contact Email: compliance@office.dcmhub.com

For the purposes of data protection legislation, DCM acts as:

  • A Data Controller when determining how personal data is processed

  • A Data Processor when delivering services on behalf of clients


3. What Personal Data We Collect

We may collect and process the following categories of personal data:

3.1 Identity Information
  • Full name

  • Job title

  • Company name

3.2 Contact Information
  • Email address

  • Telephone number

  • Business address

3.3 Technical Information
  • IP address

  • Browser type & version

  • Device information

  • Login data

  • Usage data

3.4 Service Data
  • Support tickets

  • Communication records

  • Account management records

3.5 Recruitment Data
  • CV information

  • Employment history

  • Qualification details

We do not knowingly collect special category data unless required for lawful business purposes.


4. How We Collect Data

We collect data through:

  • Website forms

  • Service agreements

  • Email communications

  • Support ticket systems

  • Monitoring tools (for managed services)

  • Recruitment submissions

  • Cookies and analytics tools


5. Lawful Basis for Processing

We process personal data under one or more of the following lawful bases:

  • Contractual necessity

  • Legitimate interests

  • Legal obligations

  • Consent (where applicable)


6. How We Use Personal Data

We use personal data to:

  • Deliver Managed IT and Cybersecurity services

  • Provide 24/7 support and monitoring

  • Manage service contracts

  • Improve service quality

  • Respond to enquiries

  • Conduct recruitment

  • Maintain security controls

  • Comply with legal obligations

We do not sell personal data.


7. Data Retention

We retain personal data only for as long as necessary to:

  • Fulfil contractual obligations

  • Meet legal requirements

  • Resolve disputes

  • Enforce agreements

Retention periods vary depending on service type and regulatory requirements.


8. Data Security

DCM implements appropriate technical and organisational measures to protect personal data, including:

  • Role-based access controls

  • Encrypted communications

  • Firewall & endpoint protection

  • Patch management

  • 24/7 monitoring systems

  • Secure backup & disaster recovery

We continuously review our security controls to mitigate risk.


9. Data Sharing

We may share personal data with:

  • Authorised employees and contractors

  • Trusted technology partners (e.g., Microsoft, Bitdefender, WatchGuard)

  • Cloud service providers

  • Professional advisors

  • Regulatory authorities (where legally required)

All third-party processors are subject to appropriate data protection safeguards.


10. International Transfers

Where data is transferred outside the UK, we ensure:

  • Adequate safeguards are in place

  • Standard Contractual Clauses (SCCs) are applied where required

  • Transfer mechanisms comply with UK GDPR requirements


11. Your Rights

Under UK GDPR, you have the right to:

  • Access your personal data

  • Request correction of inaccurate data

  • Request erasure (where lawful)

  • Restrict processing

  • Object to processing

  • Data portability

  • Withdraw consent (where applicable)

Requests can be submitted to: compliance@office.dcmhub.com


12. Cookies & Tracking

Our website uses cookies for:

  • Essential functionality

  • Security

  • Analytics

  • Performance monitoring

You can manage cookie preferences through your browser or our cookie consent banner.

For more details, see our Cookie Policy.


13. Children’s Data

Our services are not directed at children under 16 without appropriate consent. Where educational institutions are clients, data handling is governed by client agreements and safeguarding policies.


14. Complaints

If you have concerns about how we handle personal data, you may contact us directly.

You also have the right to lodge a complaint with the UK Information Commissioner’s Office (ICO).


15. Changes to This Policy

We may update this Privacy Policy periodically to reflect legal, regulatory, or operational changes. The updated version will be published on our website with the revision date.


16. Contact Information

For privacy-related enquiries:

Digital Cloud Management Ltd
981 Great West Road
Brentford
TW8 9DN
United Kingdom

Email: compliance@office.dcmhub.com


 

Cookie Policy

Digital Cloud Management Ltd (DCM)
Last Updated: Friday 20 February 2026


1. Introduction

This Cookie Policy explains how Digital Cloud Management Ltd (“DCM”, “we”, “us”, “our”) uses cookies and similar technologies on our website.

This policy should be read alongside our Privacy Policy.

We use cookies in accordance with:

• UK GDPR
• Data Protection Act 2018
• UK PECR (Privacy and Electronic Communications Regulations)
• Applicable EU regulations (where relevant)


2. What Are Cookies?

Cookies are small text files stored on your device (computer, mobile phone, or tablet) when you visit a website.

They help websites:

• Function properly
• Remember preferences
• Improve performance
• Enhance security
• Analyse usage


3. Types of Cookies We Use
1️⃣ Strictly Necessary Cookies

These cookies are essential for website functionality and cannot be disabled.

They enable:

• Secure login sessions
• Page navigation
• Security protection
• Form submission handling

Without these cookies, certain features will not function properly.


2️⃣ Performance & Analytics Cookies

These cookies help us understand:

• How visitors use our website
• Which pages are visited most
• User interaction behaviour
• Performance issues

Examples may include analytics tools (e.g., Google Analytics).

These cookies collect anonymised data where possible.


3️⃣ Functional Cookies

These allow the website to remember:

• User preferences
• Language selection
• Display settings

They improve user experience but are not essential.


4️⃣ Security Cookies

Used to:

• Detect suspicious activity
• Prevent fraud
• Protect against malicious traffic
• Secure sessions

These support cybersecurity controls.


4. Third-Party Cookies

We may use trusted third-party services, including:

• Analytics providers
• Security monitoring tools
• Content delivery networks
• Cloud hosting platforms

These providers may set cookies in accordance with their own privacy policies.


5. How Long Cookies Are Stored

Cookies may be:

• Session Cookies (deleted when browser closes)
• Persistent Cookies (remain for defined period)

Retention varies depending on cookie type and purpose.


6. Managing Cookies

You can manage or disable cookies by:

• Adjusting browser settings
• Using website cookie consent tools
• Clearing browser cookies

Please note:

Disabling certain cookies may affect website functionality.


7. Cookie Consent

Upon visiting our website, you may be presented with a cookie consent banner allowing you to:

• Accept all cookies
• Reject non-essential cookies
• Manage cookie preferences

Consent can be withdrawn at any time.


8. Data Protection & Cookies

Where cookies collect personal data (e.g., IP addresses), such data is processed in accordance with our Privacy Policy.


9. Updates to This Policy

We may update this Cookie Policy to reflect:

• Regulatory changes
• Technology updates
• Operational improvements

Revisions will be published on our website.


10. Contact Information

For cookie-related enquiries:

Digital Cloud Management Ltd
981 Great West Road
Brentford
TW8 9DN
United Kingdom

Email: compliance@office.dcmhub.com

Terms of Service

DCM – Digital Cloud Management Ltd

Last Updated: Friday 20 February 2026


1. Introduction

These Terms of Service (“Terms”) govern the provision of services by Digital Cloud Management Ltd (“DCM”, “we”, “us”, “our”) to clients (“Client”, “you”, “your”).

By engaging DCM for any Managed IT, Cybersecurity, Cloud, Network, Backup, CCTV, or Digital Services, you agree to be bound by these Terms.


2. Company Information

Company Name: Digital Cloud Management Ltd
Registered in: England & Wales
Registered Office: 981 Great West Road, Brentford, TW8 9DN, United Kingdom


3. Scope of Services

DCM provides structured technology services including, but not limited to:

  • Managed IT Support (MSP)

  • Cybersecurity Services

  • Microsoft 365 & Cloud Services

  • Network, WiFi & Internet Services

  • Cloud Backup & Disaster Recovery

  • CCTV & Physical Security

  • Web Development & Digital Solutions

Service scope is defined in individual Service Agreements or Statements of Work (SOW).


4. Service Delivery Framework

DCM operates under a structured service model that may include:

  • 24/7 remote monitoring

  • Remote and onsite support

  • Ticket-based helpdesk support

  • Escalation procedures

  • SLA-backed response standards

Specific service levels are defined in your selected plan.


5. Free Trial Terms

Where DCM offers a 30-day free trial:

  • The trial is limited to agreed scope

  • Hardware, third-party licenses, and infrastructure costs may not be included

  • No long-term contract is required to exit

  • DCM reserves the right to refuse trial requests

  • Trial services are subject to fair usage limits


6. Client Responsibilities

Clients agree to:

  • Provide accurate information

  • Maintain secure credentials

  • Notify DCM of system changes

  • Cooperate during incident investigations

  • Ensure lawful use of services

  • Maintain adequate internal data governance

Failure to meet these responsibilities may impact service delivery.


7. Payment Terms

For paid services:

  • Fees are defined in your service agreement

  • Payment terms are typically 3 or 30 days unless otherwise agreed

  • Late payments may incur service suspension

  • Pricing may vary based on scope, user count, and infrastructure size


8. Acceptable Use

Clients must not use DCM services for:

  • Illegal activity

  • Distribution of malware

  • Network intrusion

  • Intellectual property violations

  • Fraudulent activity

  • Abusive or harmful conduct

DCM reserves the right to suspend services where unlawful activity is identified.


9. Service Level Agreements (SLA)

Where SLA-backed plans apply:

  • Response times are defined per severity level

  • Resolution times may vary depending on complexity

  • Onsite support eligibility depends on selected plan

  • Scheduled maintenance windows may apply

SLAs do not guarantee uninterrupted service.


10. Data Protection & Confidentiality

DCM processes personal data in accordance with UK GDPR and applicable regulations.

Both parties agree to maintain confidentiality regarding:

  • Business information

  • Security configurations

  • Client data

  • System access credentials

Confidentiality obligations survive termination.


11. Limitation of Liability

To the fullest extent permitted by law:

  • DCM shall not be liable for indirect or consequential loss

  • DCM is not responsible for third-party service failures (e.g., ISP outages)

  • DCM’s total liability is limited to fees paid within a defined period

Nothing in these Terms excludes liability for fraud or death caused by negligence.


12. Third-Party Services

DCM may integrate third-party providers such as:

  • Microsoft

  • Bitdefender

  • WatchGuard

  • Cloud hosting providers

  • Internet service providers

DCM is not responsible for outages or failures beyond its reasonable control.


13. Termination

Either party may terminate services in accordance with:

  • Contractual notice period

  • Material breach

  • Insolvency

  • Legal requirement

Upon termination:

  • Access credentials will be revoked

  • Outstanding invoices remain payable

  • Data transfer assistance may be provided under separate agreement


14. Force Majeure

DCM is not liable for failure to perform due to circumstances beyond reasonable control, including:

  • Natural disasters

  • Government restrictions

  • Infrastructure failures

  • Widespread cyber incidents


15. Intellectual Property

All DCM methodologies, frameworks, and documentation remain the intellectual property of DCM unless otherwise agreed in writing.

Clients retain ownership of their own data.


16. Amendments

DCM reserves the right to update these Terms periodically. Updated Terms will be published on our website.

Continued use of services constitutes acceptance of updated Terms.


17. Governing Law

These Terms are governed by the laws of England & Wales.

Any disputes shall be subject to the exclusive jurisdiction of the courts of England & Wales.


18. Contact Information

For contractual enquiries:

Digital Cloud Management Ltd
981 Great West Road
Brentford
TW8 9DN
United Kingdom

Email: compliance@office.dcmhub.com

Acceptable Use Policy (AUP)

Digital Cloud Management Ltd (DCM)
Last Updated: Friday 20 February 2026


1. Purpose

This Acceptable Use Policy (“Policy”) sets out the rules governing the use of services provided by Digital Cloud Management Ltd (“DCM”, “we”, “us”, “our”).

This Policy applies to all clients, users, employees, contractors, and third parties who access or use DCM-managed systems, networks, cloud environments, hosting platforms, monitoring services, or associated infrastructure.

Its purpose is to:

  • Protect service integrity

  • Prevent misuse

  • Ensure legal compliance

  • Maintain operational stability

  • Safeguard data and systems


2. Scope of Services Covered

This Policy applies to all DCM services, including but not limited to:

  • Managed IT Support (MSP)

  • Cybersecurity Services

  • Microsoft 365 & Cloud Services

  • Network & Internet Services

  • Backup & Disaster Recovery

  • CCTV & Physical Security

  • Web Hosting & Digital Solutions


3. General Acceptable Use Principles

Users must:

• Use DCM services lawfully
• Comply with applicable UK and international laws
• Respect intellectual property rights
• Maintain security of access credentials
• Cooperate during security investigations
• Avoid actions that compromise system stability


4. Prohibited Activities

The following activities are strictly prohibited:

4.1 Illegal Activities

Users may not use DCM services to:

• Conduct unlawful activity
• Distribute illegal content
• Commit fraud
• Facilitate financial crime
• Violate sanctions regulations
• Distribute prohibited materials


4.2 Security Violations

Users must not:

• Attempt unauthorised access to systems
• Bypass authentication mechanisms
• Circumvent firewall or monitoring controls
• Perform penetration testing without written consent
• Interfere with network traffic
• Deploy malware or harmful software


4.3 Abuse of Services

Users may not:

• Overload infrastructure intentionally
• Generate excessive automated traffic
• Conduct denial-of-service attacks
• Host malicious scripts
• Abuse ticketing or support systems


4.4 Email & Communication Abuse

Users may not:

• Send unsolicited bulk email (spam)
• Conduct phishing campaigns without approval
• Distribute malicious attachments
• Impersonate individuals or organisations
• Use services for harassment


4.5 Intellectual Property Violations

Users must not:

• Infringe copyright
• Distribute pirated software
• Share unauthorised licensed materials
• Violate trademark rights


4.6 Misuse of CCTV & Physical Security Systems

Users may not:

• Tamper with installed CCTV systems
• Access surveillance footage without authorisation
• Share recorded footage unlawfully
• Use surveillance systems for non-legitimate purposes


5. Client Responsibilities

Clients are responsible for:

• Securing internal devices
• Protecting login credentials
• Maintaining lawful content
• Training staff appropriately
• Reporting security incidents promptly
• Complying with internal HR policies

DCM is not responsible for misuse caused by client negligence.


6. Monitoring & Enforcement

DCM reserves the right to:

• Monitor system activity for security purposes
• Investigate suspected misuse
• Suspend services where misuse is detected
• Restrict access during investigation
• Report unlawful activity to authorities

Monitoring is conducted in accordance with applicable data protection regulations.


7. Security Testing & Penetration Testing

Clients wishing to conduct penetration testing, vulnerability scanning, or security audits must obtain prior written approval from DCM.

Unauthorised testing is considered a violation of this Policy.


8. Data Protection Compliance

Users must:

• Process personal data lawfully
• Follow data protection obligations
• Maintain confidentiality
• Avoid unauthorised data disclosure

Misuse involving personal data may result in immediate suspension and regulatory reporting where required.


9. Third-Party Services

Where DCM integrates third-party services (e.g., Microsoft, Bitdefender, WatchGuard, ISPs):

• Users must comply with the third-party provider’s acceptable use terms
• Breach of third-party policies may result in service suspension


10. Reporting Violations

Suspected violations of this Policy should be reported to:

[Insert Official Email Address]

All reports will be investigated promptly.


11. Consequences of Violation

Violations may result in:

• Temporary service suspension
• Immediate termination of service
• Legal action
• Financial liability for damages
• Reporting to regulatory authorities

DCM reserves the right to act proportionately based on severity.


12. Amendments

DCM may update this Acceptable Use Policy periodically to reflect operational, legal, or regulatory changes.

Updated versions will be published on our website.


13. Governing Law

This Policy is governed by the laws of England & Wales.

Refund Policy

Digital Cloud Management Ltd (DCM)
Last Updated: 20 February 2026


1. Introduction

This Refund Policy outlines the terms under which refunds may be issued for services provided by Digital Cloud Management Ltd (“DCM”, “we”, “us”, “our”).

This policy applies to all Managed IT, Cybersecurity, Cloud, Network, Backup, CCTV, and Digital services provided under contractual agreement.


2. General Policy Position

Due to the nature of professional technology services, which involve labour, configuration, monitoring, infrastructure deployment, and third-party licensing, services are generally non-refundable once delivered or commenced.

Refund eligibility depends on the type of service purchased.


3. 30-Day Free Trial

Where DCM offers a complimentary 30-day trial:

• No payment is required during the trial period
• No long-term contract is required to exit
• Clients may discontinue at any time before trial completion
• Any third-party licensing costs may be excluded from refund eligibility
• Trial services are subject to fair usage limits

No refund applies as no charge is made during the trial period.


4. Subscription-Based Managed Services

For monthly or annual subscription services:

• Refunds are not provided for partial months of service
• Clients must provide written notice in accordance with contract terms
• Services remain active until the end of the paid billing period
• Early termination clauses may apply depending on agreement

Refunds are not provided for dissatisfaction unless service obligations were materially breached.


5. Project-Based & Once-Off Services

For fixed-scope or project-based engagements:

• Payments made for completed work are non-refundable
• Work already commenced is billable
• Deposits may be non-refundable once project initiation begins
• Refund requests will be assessed on a case-by-case basis


6. Third-Party Licensing & Subscriptions

Where services involve third-party products (e.g., Microsoft 365, security software, hosting services):

• Refunds are subject to third-party provider policies
• DCM cannot guarantee refunds for licenses already activated
• License billing cycles may be non-reversible


7. Hardware & Equipment

Hardware purchases (where applicable):

• May be subject to manufacturer warranty terms
• Are not refundable once opened or installed
• Returns may be accepted only if defective and within supplier policy


8. Service Credits

Where service performance falls below agreed Service Level Agreements (SLA):

• Service credits may apply
• Credits do not constitute cash refunds
• Credits apply only as defined in contractual SLA terms


9. Exceptional Circumstances

Refunds may be considered in exceptional circumstances including:

• Duplicate payment errors
• Billing miscalculations
• Failure to deliver agreed scope
• Regulatory requirement

All such requests must be submitted in writing and will be reviewed by management.


10. How to Request a Refund Review

Refund review requests must be submitted to:

refund@office.dcmhub.com

Include:

• Company name
• Invoice number
• Service details
• Reason for request

Responses will typically be issued within 14 business days.


11. Governing Law

This Refund Policy is governed by the laws of England & Wales.

Complaints Procedure

Digital Cloud Management Ltd (DCM)
Last Updated: Friday 20 February 2026


1. Purpose

DCM is committed to delivering structured, professional, and accountable services. We recognise that, on occasion, concerns may arise.

This Complaints Procedure outlines how clients, partners, or third parties may raise concerns and how DCM will address them transparently and fairly.


2. Scope

This procedure applies to complaints relating to:

• Managed IT Support
• Cybersecurity Services
• Cloud & Infrastructure Services
• Network & Internet Services
• CCTV & Physical Security
• Web & Digital Solutions
• Billing or contractual matters
• Service quality or response times


3. How to Submit a Complaint

Complaints must be submitted in writing to:

Email:  complaints@office.dcmhub.com
Company: Digital Cloud Management Ltd
Registered Office: 981 Great West Road, Brentford, TW8 9DN, United Kingdom

Please include:

• Company name
• Contact details
• Description of the issue
• Relevant dates
• Supporting documentation (if applicable)


4. Complaint Handling Process
Step 1 – Acknowledgement

We will acknowledge receipt of your complaint within 2 business days.


Step 2 – Investigation

A structured internal review will be conducted, which may include:

• Reviewing service logs
• Reviewing ticket history
• Consulting relevant engineers
• Reviewing contractual obligations
• Assessing SLA performance


Step 3 – Response

A formal written response will be provided within 14 business days, outlining:

• Findings
• Proposed resolution (if applicable)
• Corrective measures (if required)

If further investigation is required, we will provide progress updates.


5. Escalation

If you are not satisfied with the initial resolution:

• You may request escalation to senior management
• The matter will undergo secondary review
• A final written decision will be issued


6. Resolution Options

Where appropriate, DCM may offer:

• Service correction
• Service credit (as per SLA terms)
• Contract clarification
• Operational improvement measures

Resolutions are assessed proportionately and in accordance with contractual agreements.


7. Confidentiality

All complaints are handled confidentially and in accordance with data protection regulations.


8. Regulatory Complaints

If a complaint relates to data protection, individuals may also contact the UK Information Commissioner’s Office (ICO).


9. Continuous Improvement

Complaints are logged and reviewed as part of our quality assurance and governance process to improve service standards.

Information Security Statement

Digital Cloud Management Ltd (DCM)
Last Updated: Friday 20 February 2026


1. Purpose

Digital Cloud Management Ltd (“DCM”) is committed to maintaining the confidentiality, integrity, and availability of information entrusted to us.

This Information Security Statement outlines the principles, controls, and governance framework under which we manage information security across all services.


2. Security Governance Framework

DCM operates under a structured information security framework aligned with recognised best practices.

Our framework is built upon:

• Risk identification and mitigation
• Role-based access control
• Continuous monitoring
• Structured incident response
• Data protection compliance
• Security awareness training

Security is integrated into every layer of our Managed IT, Cybersecurity, Cloud, Network, and Physical Security services.


3. Core Security Principles
Confidentiality

Information is accessible only to authorised individuals.

Integrity

Information is protected from unauthorised modification.

Availability

Systems and data remain accessible and operational when required.


4. Access Control & Authentication

DCM enforces strict access control measures including:

• Role-based access management
• Least-privilege principle
• Multi-Factor Authentication (MFA)
• Secure password policies
• Session control mechanisms
• Administrative access restrictions

Access rights are reviewed periodically and adjusted based on role changes.


5. Network & Infrastructure Security

We implement structured network protection controls:

• Enterprise firewall configuration
• Network segmentation
• Secure VPN access
• Intrusion detection & prevention systems
• Secure WiFi deployment
• Perimeter monitoring

These measures protect against external and internal threats.


6. Endpoint & Device Security

All managed devices operate under defined security standards:

• Endpoint Detection & Response (EDR)
• Anti-malware protection
• Patch management enforcement
• Device encryption (where applicable)
• Device lifecycle management
• Remote monitoring integration


7. Cloud Security Controls

For Microsoft 365 and cloud services, we implement:

• Conditional access policies
• Advanced threat protection
• Data Loss Prevention (DLP)
• Secure configuration baselines
• Access governance
• Audit logging

Cloud environments are configured using secure-by-design principles.


8. Backup & Disaster Recovery

We maintain structured data protection controls:

• Encrypted cloud backups
• Backup validation monitoring
• Disaster recovery planning
• Recovery testing
• Retention policy configuration

Business continuity is treated as a core security function.


9. Monitoring & Threat Detection

DCM operates a 24/7 monitoring model incorporating:

• Log aggregation
• Security event monitoring (SIEM)
• Real-time alerting
• Escalation procedures
• Remote response capability

Alerts are reviewed by real IT professionals.


10. Incident Management

We maintain a structured Incident Response framework that includes:

• Threat containment
• Root cause analysis
• Recovery planning
• Reporting & documentation
• Post-incident review

Our goal is to minimise disruption and reduce long-term risk.


11. Vendor & Partner Management

We integrate security technologies from trusted partners such as:

• Microsoft
• Bitdefender
• WatchGuard
• Enterprise hosting providers

Third-party vendors are evaluated for security posture and compliance alignment.


12. Staff Security Awareness

All personnel are expected to adhere to internal security policies and undergo appropriate training to:

• Recognise phishing attempts
• Protect sensitive information
• Follow secure handling procedures
• Maintain confidentiality

Human awareness is an essential part of our defence model.


13. Physical Security Controls

DCM implements physical security measures including:

• Controlled facility access
• CCTV integration (where applicable)
• Secure hardware storage
• Visitor logging


14. Continuous Improvement

Security controls are reviewed periodically to address:

• Emerging threats
• Regulatory changes
• Operational risk
• Technology updates

We remain committed to ongoing improvement of our security posture.


15. Compliance Alignment

Our security framework supports alignment with:

• UK GDPR
• Data Protection Act 2018
• Applicable EU GDPR standards
• Industry best practices


16. Contact Information

Security-related enquiries may be directed to:

cyber@office.dcmhub.com

Incident Response Policy

Digital Cloud Management Ltd (DCM)
Last Updated: Friday 20 February 2026


1. Purpose

Digital Cloud Management Ltd (“DCM”) maintains a structured Incident Response Policy to ensure timely identification, containment, investigation, and resolution of security incidents.

The purpose of this policy is to:

• Minimise operational disruption
• Protect client data
• Maintain service continuity
• Meet regulatory obligations
• Ensure accountability


2. Scope

This policy applies to:

• Managed IT environments
• Cybersecurity services
• Cloud platforms (e.g., Microsoft 365)
• Network & firewall systems
• Backup & disaster recovery systems
• CCTV & physical security infrastructure
• Internal DCM systems


3. Definition of a Security Incident

A security incident may include, but is not limited to:

• Malware or ransomware detection
• Unauthorised system access
• Suspicious login activity
• Data breach or suspected data compromise
• Firewall intrusion alerts
• Service outage caused by cyber activity
• Phishing campaign compromise
• Insider misuse


4. Incident Response Framework

DCM follows a structured 6-stage response model:

1️⃣ Identification

Detection through monitoring systems, alerts, or user reporting.

2️⃣ Classification

Assessment of severity, impact, and risk level.

3️⃣ Containment

Immediate action to isolate affected systems and prevent spread.

4️⃣ Investigation

Root cause analysis, log review, and forensic evaluation.

5️⃣ Remediation

Removal of threat, system restoration, and security hardening.

6️⃣ Post-Incident Review

Documentation, reporting, and prevention planning.


5. Detection & Monitoring

Incidents may be identified via:

• 24/7 system monitoring
• SIEM alerting
• Endpoint Detection & Response (EDR)
• Firewall event monitoring
• Backup anomaly alerts
• Client-reported anomalies

All alerts are reviewed by real IT professionals.


6. Escalation Procedures

Incident severity levels determine escalation pathway:

Low Severity

Minor threat, limited impact.

Medium Severity

Operational disruption possible.

High Severity

Active compromise or system failure.

Critical Severity

Data breach or widespread disruption.

Escalation may include:

• Senior engineer review
• Client notification
• Third-party vendor coordination
• Legal consultation (where required)


7. Client Notification

Where incidents materially affect client systems:

• Clients are notified promptly
• Impact scope is explained
• Remediation steps are outlined
• Recovery timeline is communicated

Where legally required (e.g., data breach), notification follows UK GDPR guidelines.


8. Regulatory Compliance

If an incident involves personal data:

• Assessment is conducted immediately
• Legal obligations under UK GDPR are reviewed
• Notification to relevant authorities occurs where required
• Documentation is retained


9. Data Breach Response

In the event of confirmed data compromise:

• Systems are isolated
• Access credentials are reset
• Logs are preserved
• Recovery procedures initiated
• Impact assessment conducted

DCM cooperates with affected clients and relevant authorities.


10. Recovery & Restoration

Recovery may involve:

• Restoring from backup
• Rebuilding compromised systems
• Patch implementation
• Security configuration hardening
• Firewall policy revision

Recovery speed is aligned with defined service levels.


11. Documentation & Reporting

Each incident is:

• Logged
• Documented
• Reviewed
• Assessed for systemic improvements

Where applicable, clients receive incident reports.


12. Preventative Improvements

Following resolution:

• Vulnerabilities are addressed
• Monitoring thresholds are adjusted
• Staff training reinforced
• Policy improvements implemented

Continuous improvement is embedded into the framework.


13. Roles & Responsibilities

DCM Responsibilities:

• Detect incidents
• Contain threats
• Notify affected parties
• Restore services
• Document findings

Client Responsibilities:

• Report anomalies
• Maintain credential security
• Cooperate in remediation
• Maintain internal governance controls


14. Third-Party Coordination

Where incidents involve:

• Microsoft services
• Bitdefender security tools
• WatchGuard firewalls
• Internet service providers

DCM coordinates with relevant vendors.


15. Continuous Review

This policy is reviewed periodically to address:

• Emerging cyber threats
• Regulatory updates
• Operational improvements


16. Contact for Security Incidents

Security concerns may be reported to:

cyber@office.dcmhub.com

Recruitment Privacy Notice

Digital Cloud Management Ltd (DCM)
Last Updated: Friday 20 February 2026


1. Introduction

Digital Cloud Management Ltd (“DCM”, “we”, “us”, “our”) is committed to protecting the privacy and personal data of individuals who apply for employment or engagement with our organisation.

This Recruitment Privacy Notice explains how we collect, use, store, and protect personal data during the recruitment process.

This notice applies to:

• Job applicants
• Contractors
• Temporary staff
• Internship applicants
• Recruitment agency submissions

We process personal data in accordance with:

• UK GDPR
• Data Protection Act 2018
• Applicable employment legislation


2. Who We Are

Company Name: Digital Cloud Management Ltd
Registered in: England & Wales
Registered Office: 981 Great West Road, Brentford, TW8 9DN, United Kingdom

For recruitment purposes, DCM acts as the Data Controller.


3. What Information We Collect

During recruitment, we may collect:

3.1 Identity Information

• Full name
• Address
• Date of birth
• Nationality (where required for right-to-work checks)


3.2 Contact Information

• Email address
• Phone number


3.3 Employment Information

• CV / Resume
• Employment history
• Qualifications
• Professional certifications
• Skills & references


3.4 Assessment Data

• Interview notes
• Skills test results
• Technical assessment outcomes
• Background check results (where applicable)


3.5 Right to Work Information

• Passport or ID documents
• Visa status
• Immigration documentation (where applicable)


4. How We Collect Information

We collect information through:

• Direct applications via our website or external website
• Email submissions
• Recruitment agencies
• Interview processes
• Professional networking platforms


5. Lawful Basis for Processing

We process recruitment data based on:

• Legitimate interest (assessing suitability for employment)
• Contractual necessity (where employment is offered)
• Legal obligation (right-to-work verification)
• Consent (where required)


6. How We Use Recruitment Data

We use applicant data to:

• Assess suitability for a role
• Conduct interviews
• Perform background checks (where relevant)
• Verify qualifications
• Conduct right-to-work checks
• Maintain internal recruitment records

We do not use recruitment data for marketing purposes.


7. Data Retention

If your application is unsuccessful:

• We may retain your details for up to 12 months for future opportunities (unless you request deletion)

If successful:

• Your data will become part of your employment record and retained in accordance with employment data policies.


8. Data Sharing

We may share recruitment data with:

• Internal hiring managers
• Recruitment agencies (where applicable)
• Background verification providers
• Legal or regulatory authorities (if required)

We do not sell applicant data.


9. International Transfers

Applicant data is primarily processed within the United Kingdom. If transferred internationally, appropriate safeguards will be applied.


10. Data Security

We implement technical and organisational safeguards including:

• Restricted access controls
• Secure data storage
• Encrypted communication channels
• Confidential handling procedures


11. Applicant Rights

Under UK GDPR, applicants have the right to:

• Access their personal data
• Request correction
• Request deletion
• Restrict processing
• Object to processing
• Withdraw consent (where applicable)

Requests may be sent to:
hr@office.dcmhub.com


12. Equal Opportunity & Non-Discrimination

DCM is committed to fair and lawful recruitment practices and does not discriminate based on:

• Age
• Gender
• Race
• Religion
• Disability
• Sexual orientation
• National origin

Recruitment decisions are based solely on merit and suitability.


13. Withdrawal of Application

Applicants may withdraw their application at any time by notifying us in writing.


14. Complaints

If you have concerns regarding how your recruitment data is handled, you may contact us directly or lodge a complaint with the UK Information Commissioner’s Office (ICO).


15. Policy Updates

This Recruitment Privacy Notice may be updated periodically to reflect legal or operational changes.

Modern Slavery Statement

Digital Cloud Management Ltd (DCM)
In accordance with the UK Modern Slavery Act 2015
Last Updated: Friday 20 February 2026


1. Introduction

Digital Cloud Management Ltd (“DCM”, “we”, “us”, “our”) is committed to operating ethically and with integrity in all aspects of our business.

We recognise our responsibility to prevent modern slavery, human trafficking, forced labour, and exploitation within our operations and supply chains.

This statement is made pursuant to Section 54 of the UK Modern Slavery Act 2015 and outlines the steps DCM takes to ensure modern slavery does not occur within our business or supply chain.


2. Our Organisation

DCM is a UK-registered company providing:

• Managed IT Support
• Cybersecurity Services
• Microsoft 365 & Cloud Services
• Network & Internet Services
• Backup & Disaster Recovery
• CCTV & Physical Security
• Web & Digital Solutions

We operate primarily within the United Kingdom and serve clients across selected international markets.


3. Our Commitment

We are committed to:

• Upholding human rights
• Preventing exploitation
• Ensuring fair employment practices
• Promoting ethical business conduct
• Maintaining transparency in supply chains

Modern slavery is incompatible with our values and governance framework.


4. Risk Assessment

As a technology services provider, DCM considers the risk of modern slavery within our direct operations to be low.

However, we acknowledge potential risk areas in:

• Third-party technology vendors
• Hardware supply chains
• Hosting providers
• Infrastructure suppliers
• International service partners

We conduct reasonable due diligence when engaging third-party providers.


5. Supplier Standards

DCM expects suppliers and partners to:

• Comply with applicable labour laws
• Prohibit forced or compulsory labour
• Prohibit child labour
• Ensure safe working conditions
• Operate with ethical recruitment practices

Where appropriate, we may request confirmation of compliance from suppliers.


6. Internal Policies

DCM maintains internal governance policies including:

• Acceptable Use Policy
• Information Security Statement
• Recruitment Privacy Notice
• Complaints Procedure
• Code of Professional Conduct

These policies promote lawful and ethical conduct.


7. Recruitment Practices

DCM ensures that:

• All staff are employed voluntarily
• Employment terms are clear and transparent
• Right-to-work checks are conducted
• No recruitment fees are charged to employees
• Employees may leave employment freely

We do not tolerate forced labour in any form.


8. Training & Awareness

While operating in a low-risk sector, DCM promotes awareness of ethical standards and encourages staff to report concerns through structured channels.


9. Reporting Concerns

If concerns regarding modern slavery or unethical conduct arise, they may be reported to:

compliance@office.dcmhub.com

All reports are reviewed and investigated appropriately.


10. Governance & Review

This statement is reviewed periodically to ensure it remains aligned with:

• UK legal requirements
• Operational changes
• Risk assessments


11. Approval

This statement has been approved by the management of Digital Cloud Management Ltd.

Signed on behalf of DCM:

Name: JEFFREY SAM 
Title: Director
Date: 20/02/2026 

Accessibility Statement

Digital Cloud Management Ltd (DCM)
Last Updated: Friday 20 February 2026


1. Commitment to Accessibility

Digital Cloud Management Ltd (“DCM”, “we”, “us”, “our”) is committed to ensuring digital accessibility for all users, including individuals with disabilities.

We strive to provide a website and digital services experience that is inclusive, accessible, and aligned with recognised accessibility standards.

Accessibility is an integral part of our governance and operational framework.


2. Accessibility Standards

We aim to align our website and digital platforms with:

• Web Content Accessibility Guidelines (WCAG) 2.1 Level AA (where reasonably practicable)
• UK Equality Act 2010 principles
• International accessibility best practices

We recognise that accessibility is an ongoing process and are committed to continuous improvement.


3. Accessibility Features

Our website incorporates accessibility-focused features, including:

• Clear navigation structure
• Readable typography and sufficient contrast
• Logical heading hierarchy
• Keyboard navigation support
• Alternative text for meaningful images
• Structured content layout
• Consistent design patterns
• Accessible form fields
• Error identification guidance

We aim to ensure content remains perceivable, operable, understandable, and robust.


4. Known Limitations

While we aim for full accessibility compliance, some limitations may exist, including:

• Third-party embedded content
• External partner platforms
• Legacy downloadable documents

We actively review and improve these areas where possible.


5. Ongoing Monitoring & Improvement

Accessibility is reviewed periodically as part of our website maintenance and governance procedures.

Our improvement process includes:

• Periodic accessibility audits
• Content structure reviews
• Code validation
• Feedback-based improvements

Accessibility is integrated into our digital governance framework.


6. Feedback & Assistance

If you encounter accessibility barriers while using our website, please contact us.

We are committed to responding promptly and working toward resolution.

Contact:

Digital Cloud Management Ltd
981 Great West Road
Brentford
TW8 9DN
United Kingdom

Email: compliance@office.dcmhub.com

Please include:

• Description of the issue
• Page URL (if applicable)
• Device and browser information


7. Alternative Formats

Where required and reasonably practicable, we may provide information in alternative formats upon request.


8. Third-Party Content Disclaimer

Certain areas of our website may link to or integrate third-party services (e.g., Microsoft platforms, partner tools). Accessibility of those platforms is governed by their respective providers.


9. Regulatory Alignment

This Accessibility Statement demonstrates our commitment to:

• Digital inclusion
• Equal access principles
• Responsible governance
• Regulatory transparency
• Ethical service delivery


10. Policy Review

This statement will be reviewed periodically to ensure ongoing alignment with evolving accessibility standards and best practices.

1 Is DCM a legally registered UK company?

Yes. Digital Cloud Management Ltd is registered in England & Wales and operates under UK corporate and regulatory law. All services are delivered under formal contractual agreements.

2 Do you operate under UK GDPR?

Yes. Where DCM acts as a data processor, we provide structured Data Processing Addendum (DPA) documentation outlining processing responsibilities, safeguards, and legal alignment.

3 Do you provide Data Processing Agreements (DPA)?

Yes. Where DCM acts as a data processor, we provide structured Data Processing Addendum (DPA) documentation outlining processing responsibilities, safeguards, and legal alignment.

4 Where is client data stored?

Data storage depends on the selected cloud provider (e.g., Microsoft 365). We align configurations with UK/EU data residency requirements where applicable and ensure secure processing controls.

5 Do you offer Service Level Agreements (SLA)?

Yes. Our structured plans include clearly defined SLAs outlining response times, escalation procedures, support coverage, and accountability standards.

6 How do you handle cybersecurity incidents?

DCM follows a documented Incident Response framework that includes detection, containment, investigation, remediation, and reporting, supported by 24/7 monitoring oversight.

7 Do you operate 24/7?

Yes. Our Managed IT and Cybersecurity services include continuous monitoring and structured escalation procedures. Remote support is available 24/7, with onsite coordination based on service tier.

8 Do you integrate trusted security partners?

Yes. We integrate recognised enterprise security platforms (e.g., Bitdefender, WatchGuard, Microsoft) into our service framework to deliver layered protection.

9 How do you ensure confidentiality?

We enforce role-based access controls, secure configurations, encryption standards, and documented internal policies to protect client information.

10 Do you operate under one unified service contract?

Yes. DCM consolidates Managed IT, Cybersecurity, Cloud, Network, Backup, and Physical Security services under one structured and accountable agreement reducing vendor fragmentation and improving governance.

11 Do you offer a free trial?

Yes. We offer a structured 30-day Premium Trial allowing clients to evaluate our 24/7 Managed IT and Cybersecurity framework before committing.

12 How do you handle complaints?

We maintain a documented Complaints Procedure ensuring timely acknowledgement, investigation, and structured resolution in accordance with UK commercial standards.

13 Are your policies documented and accessible?

Yes. DCM maintains publicly available policies including:

• Privacy Policy
• Cookie Policy
• Terms of Service
• Acceptable Use Policy
• Refund Policy
• Complaints Procedure
• Information Security Statement
• Incident Response Policy
• Recruitment Privacy Notice
• Modern Slavery Statement

14 Do you support banking and financial onboarding requirements?

Yes. Our structured governance framework, documented policies, and operational transparency support financial institution and payment processor compliance checks.

15 Do you provide documentation for regulatory review?

Yes. Upon request, DCM can provide relevant governance documentation to support compliance reviews and onboarding processes.


    icon Official Technology Partners & Certified Solution Providers icon