1. DATA COLLECTED
DATA STORAGE LOCATION
If you register on our website, we store your email address and any additional personal information added to your user profile. You can see, edit, or delete your personal information at any time. Website administrators can also see and edit this information.
The data that you provide is kept strictly confidential and we will not provide your details to anyone outside the NI-CDB.
We will keep all of your data private. All data use is strictly within the terms of the General Data Protection Regulation (GDPR 2018).
These submissions are only kept for customer service purposes they are never used for marketing purposes or shared with third parties.
We use Google Analytics on our site for anonymous reporting of site usage. So, no personalized data is stored. If you would like to opt-out of Google Analytics monitoring your behavior on our website please use this link: Google Analytics Opt-out.
2. WHO HAS ACCESS TO YOUR DATA
If you are not a registered user for our site, there is no personal information we can retain or view regarding yourself.
If you are a participant with a registered account, your personal information can be accessed by:
- Our system administrators.
- Ulster University NICDB research team
The NICDB operates under Ulster University’s Human Tissue Licence (Licensing Number 12064) and is fully compliant with the guiding principles applicable to the management and operation of a human biosample resource/bank in the ethical and legal framework of the Health Research Authority (HRA) of the UK.
3. HOW LONG WE RETAIN YOUR DATATO YOUR DATA
If you register on our website, we also store the personal information you provide in your user profile. You can see, edit, or delete your personal information at any time (except changing your username). Website administrators can also see and edit that information.
4. SECURITY MEASURES
We use the SSL/HTTPS protocol throughout our site. This encrypts our user communications with the servers so that personal identifiable information is not captured/hijacked by third parties without authorization.
In case of a data breach, system administrators will immediately take all needed steps to ensure system integrity, will contact affected users and will attempt to reset passwords if needed.