RIN Network Services System and Infrastructure Policy

This document outlines the acceptable access of the RIN network infrastructure, what is acceptable, what is not and other items such as what we monitor or store and for what reason. By accessing any resources defined as a RIN network resource, you are agreeing to this.  

Systems Defined as an RIN Resource

The following systems are part of the RIN Network and are governed by this document. This is not a comprehensive list and is subject to change at any time:
  • Active Directory systems under the rhyshudson.co.uk or rinservices.co.uk domain e.g. INTERNAL.RHYSHUDSON.CO.UK
  • Network access systems under the internal network including but not limited to; SSTP VPN, IPSEC, BGP and Microsoft Routing and Remote Access systems.
  • Guest wireless networks such as RIN-WiFi.
  • Group collaboration and communication systems including but not limited to; TeamSpeak (ts.rhyshudson.co.uk)
  • Web Based control systems including but not limited to; cPanel, WHM, OwnCloud, PFSense, Squid, Dansguardian, Sophos UTM.
  • Data storage systems including but not limited to; SMB shares, Windows based file sharing on the INTERNAL network, SharePoint, OneDrive, all Office365 accounts and data tied to rhyshudson.co.uk.
  • Content management systems used by RIN systems.
  • Backup systems run under the RIN Network.

Non-Disclosure of Privileged or System Information

This states that any information that you have access to or can gather from any RIN system must NOT be disclosed to any individual unless authorised by the system manager or the owner of the information in question. This can also include information or conversations which take place on RIN communication platforms. System plans or the architecture in which systems under the RIN system is configured or laid out must also not be disclosed. This includes information such as software used, providers used, security used, and encryption methods or algorithms used. Account login information should not be disclosed to any individual under any circumstances. If an account is thought to have become compromised on any RIN system please email support@rinservices.co.uk immediately with as much information as possible.  

Acceptable Use of RIN Resources

All RIN resources and systems are subject to an acceptable use which governs how a specific system is used. For example, a wireless network system must not be used for illegal or unauthorised activity such as, illegal downloading/streaming. Other restrictions may also be placed on certain systems for certain reasons to maintain security, integrity and reliability of systems. Such as, all network traffic which travels through the RIN networks is subject to monitoring and filtering as deemed necessary. Access may also be revoked for a certain user if deemed necessary. Reason for such revocation is not a requirement.  

What we Monitor

For the purpose of system security and reliability as well as metric analysis, we collect certain information which occurs on the RIN system and may act upon such information collected. Below is a list of some of the data we may collect and some actions we may carry out based on information we collect. This list does not guarantee that we collect this information but is just an indicator on the type of information we may collect at some stage.
  • Web traffic monitoring and filtering on all network access systems such as Wireless Networks, VPN access, fixed network access and proxy connections.
  • Internet trend monitoring.
  • IP connection logging on all RIN systems.
  • Connection attempts.
  • Network scan attempts.
  • Types of data stored.
  • Connection activity and bandwidth logging.
  • Any other monitoring which is deemed necessary on RIN systems at a given time.

RIN Network Services Privacy Policy (Including websites powered by)

This privacy policy has been compiled to better serve those who are concerned with how their 'Personally identifiable information' (PII) is being used online. PII, as used in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.

What personal information do we collect from the people that visit our blog, website or app?

When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, mailing address, phone number or other details to help you with your experience.

When do we collect information?

We collect information from you when you register on our site, place an order, subscribe to a newsletter, respond to a survey, fill out a form or enter information on our site.

How do we use your information?

We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
  • To personalize user's experience and to allow us to deliver the type of content and product offerings in which you are most interested.
  • To allow us to better service you in responding to your customer service requests.
  • To administer a contest, promotion, survey or other site feature.
  • To quickly process your transactions.

How do we protect visitor information?

We do not use vulnerability scanning and/or scanning to PCI standards.  We use regular Malware Scanning.    Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.    We implement a variety of security measures when a user places an order enters, submits, or accesses their information to maintain the safety of your personal information.    All transactions are processed through a gateway provider and are not stored or processed on our servers. 

Do we use 'cookies'?

Yes. Cookies are small files that a site or its service provider transfers to your computer's hard drive through your Web browser (if you allow) that enables the site's or service provider's systems to recognize your browser and capture and remember certain information. For instance, we use cookies to help us remember and process the items in your shopping cart. They are also used to help us understand your preferences based on previous or current site activity, which enables us to provide you with improved services. We also use cookies to help us compile aggregate data about site traffic and site interaction so that we can offer better site experiences and tools in the future.

We use cookies to:

  • Help remember and process the items in the shopping cart.
  • Understand and save user's preferences for future visits.
  • Compile aggregate data about site traffic and site interactions in order to offer better site experiences and tools in the future. We may also use trusted third-party services that track this information on our behalf.
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser (like Internet Explorer) settings. Each browser is a little different, so look at your browser's Help menu to learn the correct way to modify your cookies.    If you disable cookies off, some features will be disabled It won't affect the user's experience that make your site experience more efficient and some of our services will not function properly.    However, you can still place orders.

Third-party disclosure

We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information unless we provide users with advance notice. This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or serving our users, so long as those parties agree to keep this information confidential. We may also release information when it's release is appropriate to comply with the law, enforce our site policies, or protect ours or others' rights, property, or safety.     However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses. 

Third-party links

Occasionally, at our discretion, we may include or offer third-party products or services on our website. These third-party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites.


Google's advertising requirements can be summed up by Google's Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en     We have not enabled Google AdSense on our site but we may do so in the future.

California Online Privacy Protection Act

CalOPPA is the first state law in the nation to require commercial websites and online services to post a privacy policy. The law's reach stretches well beyond California to require a person or company in the United States (and conceivably the world) that operates websites collecting personally identifiable information from California consumers to post a conspicuous privacy policy on its website stating exactly the information being collected and those individuals with whom it is being shared, and to comply with this policy. - See more at: http://consumercal.org/california-online-privacy-protection-act-caloppa/#sthash.0FdRbT51.dpuf

According to CalOPPA we agree to the following:

Users can visit our site anonymously.  Once this privacy policy is created, we will add a link to it on our home page or as a minimum on the first significant page after entering our website.  Our Privacy Policy link includes the word 'Privacy' and can be easily be found on the page specified above.    Users will be notified of any privacy policy changes: 
  • On our Privacy Policy Page
Users are able to change their personal information:
  • By emailing us
  • By logging in to their account

How does our site handle do not track signals?

We honor do not track signals and do not track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.

Does our site allow third-party behavioral tracking?

It's also important to note that we do not allow third-party behavioral tracking

COPPA (Children Online Privacy Protection Act)

When it comes to the collection of personal information from children under 13, the Children's Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation's consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.    We do not specifically market to children under 13.

Fair Information Practices

The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.

In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:

We will notify the users via email
  • Within 7 business days
  • We will notify the users via in-site notification
    • Within 7 business days
      We also agree to the Individual Redress Principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.

    CAN SPAM Act

    The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.    If at any time you would like to unsubscribe from receiving future emails, you can email us at support@rinservices.co.uk.

    Websites Powered By RIN Network Services

    Websites powered by RIN Network Services or that hold the "Powered by RIN Network Services" logo must adhere to this policy and are regularly checked. In the instance that the website does not adhere to this policy for the reason of non-compliance, it will be removed from this policy. In the instance where a more in depth policy is required, such as where payment processing is required, a separate privacy policy will exist for that website. For further information on this please email support@rinservices.co.uk referring to this policy document.  If there are any questions regarding this privacy policy you may contact us using the information below.

    Policy Contact Details:

    Email: support@rinservices.co.uk.

    Further Information

    For further information on the information what is discussed and any inquiry on the RIN System and security, please contact support@rinservices.co.uk.