Privacy Policy

We have created this privacy statement in order to demonstrate our firm commitment to privacy. The following discloses the information gathering and dissemination practices for this web site.

Information Automatically Logged

This site uses your IP address to help diagnose problems with our server and to administer our site.

The site uses page referrer data – that is, information about the page that linked you to this page – to determine to what extent our page is referenced by other resources on the Web.

This data may be used to preserve the integrity of our computing resources.

Personal Information

This site collects, your name, address, telephone numbers and email address.

This information is used to place an order

We do not share any personal information with any third parties nor do we use any personal information for any purposes beyond those stated here.

Data Protection Act

Every time consumers respond to an offer in a magazine, use a loyalty card, surf the internet, or obtain government services electronically, they are laying down a trail of information that can be sold to others, or used for marketing.

Why does data protection matter?

Personal information is one of the most valuable commodities in society today. Government and public service providers gather a wealth of information from taxpayers, car owners, benefit recipients, patients, clients, customers and voters. Businesses too are intent on developing ever more sophisticated ways of capturing and using data about individuals.

Consumers have much to gain from these developments. But whenever personal data is collected and stored, it may also be abused. Wrong information may be passed on to third parties, privacy invaded or individuals besieged by marketers. Trust is hard-won and necessarily fragile. If the information age is to develop on secure foundations, it is vital that those who collect and use personal data maintain the confidence of those who are ased to provide it.

What legislation exists to protect consumers

In July 1998, a new Data Protection Act replaced the 1984 Act. It covers most information held in written files, as well as on computers.

Eight Principles

There are eight data protection principles in the Act that define the duties of people who collect and provide personal data. Data controllers make decisions about what data is held, how and why it is held and who has access to it. Those who act on behalf of data controllers are called data processors. Data controllers and data processors can be an individual, a group of individuals or organisation depending on its size. The principles also define the rights of people who own the information about themselves – data subjects.

The principles dictate that:

  • Personal data must be processed fairly and lawfully, and usually only with the subject’s consent. Consent should be given freely if pertinent information is insufficient and not while under duress
  • Data should only be processed for specified and lawful purposes
  • Data must not be excessive to the purpose(s) for which it is processed
  • Data must be accurate and kept up to date
  • Data must not be kept longer than the purpose requires;
  • The data subject’s rights must be protected (these rights are detailed within sections 7 to 14 of the Act)
  • Data must be safeguarded against misuse or accidental loss
  • Data must not be transferred outside the European Economic Area with the assurance of adequate protection (this issue has led the ‘safe harbour’ agreement).


This site uses cookies for session management. See the Session Management section and our Cookies Policy for more information about how cookies are used.

Session Management

This site uses cookies to store a session ID which can be read by the site on any page within or any other DSY Pest Control or Derbyshire Mole Control sister site or subdomain.

The session information used by this site is deleted when your browser is closed


This site has security measures in place to protect the loss, misuse, and alteration of the information under our control. Log file access is restricted to system administrators while stored on the server. Log files are rotated regularly and archived in a secure location.

Note: User and password information is not encrypted before it is transmitted across the network. and all related domains complies with all statutory and legal requirements with respect to access to information.

Contact Information

If you have any questions about this privacy statement, the practices of this site, or your dealings with this site, you can contact us.