I do a newsletter only when I feel I have got something to say, and which I feel maybe of genuine interest to others. That generally works out at one or two a month. With each newsletter you also have free entry to win an origional painting.
I look forward to your sign up
Example of a previous prize
I am the sole owner of the information collected on this site. I will not sell, share, or rent this information to third parties. You can also unsubscribe from the newsletters at any time, and your contact information will be deleted.
I use Campaign Monitor to send my emails, and I have provided their security features below.
The Campaign Monitor
We are committed to securing our customers’ data to the highest degree. Campaign Monitor provides a service to over 200,000 companies across 180 countries. Our customers include healthcare providers, educational institutes, financial services, and governmental agencies; small and medium sized businesses who trust us with some of their most sensitive information. That’s why trust is the foundation of our privacy and data security promise to our customers.
Our adaptive, forward-looking measures are our promise to you.
Dedicated security team
We have a dedicated information security team, responsible for securing the application, identifying vulnerabilities and responding to security events.
Data storage and processing locations
We store data in a US-based data center. In addition, we use multiple data processing locations including USA, Australia and Germany. We also use Fastly as an external content delivery network, which is used for content caching. Fastly’s locations are available here: https://www.fastly.com/network-map.
We have a suite of security guidelines with supporting procedures, which have been aligned with the ISO 27001 standard. Our security documentation is frequently reviewed and updated to reflect changes to our processes made in response to newly identified threats, as well as our commitment to continuous improvement.
We use the NIST Cyber Security Framework to measure our ability to identify, protect, detect, respond and recover from security events.
Awareness and training
All staff and contractors go through a vetting process where they are subject to background checks and confidentiality agreements.
We provide an ongoing program of security awareness training designed to keep all members of staff informed and vigilant of security risks. This includes regular assessment of comprehension to measure the program’s effectiveness.
We implement physical controls designed to prevent unauthorized access to, or disclosure of, customer data.
Data center controls
We only use state of the art data centers and cloud providers. Our data centers are monitored 24×7 for all aspects of operational security and performance. They are also equipped with state-of-the-art security such as biometrics, sensors for intrusion detection, keycards, and around-the-clock interior and exterior surveillance.
In addition, access is limited to authorized data center personnel; no one can enter the production area without prior clearance and an appropriate escort. Every data center employee undergoes background security checks.
Data center compliance
Our data center provider is certified to the following compliance standards: HIPAA, PCI-DSS, SOC 1 Type 2, SOC 2 Type 2, ISO 27001 and FISMA/NIST.
Our cloud provider has the following certifications: PCI-DSS, ISO 27001, SOC 1 / 2 / 3, IRAP, ISO 27018 and ISO 9001.