Privacy Policy of our UK wide services

Our Privacy Policy

Information Collected

We are committed to safeguarding the privacy of our website visitors, this policy sets out what data we may capture and how we will treat that data including any personal information you may give us.

We will not disclose any information you provide about yourself to any third parties, unless we have to do so in the ordinary course of our commercial relationship with you (including, without limitation, for marketing purposes) or to the administer of this Website. We are aware of and we will comply with our obligations under current data protection legislation in the UK and Europe. If you have any questions about our use of your personal details then please contact us by email at

Log Files

Like most other web sites we make use of server log files. The information inside log files can tell us information about your computer including your IP address, operating system, geographical location, browser type and version. Log files also store information regarding your use of this website such as the referral source, length of visit, page views, website navigation etc.

Personal Data We Collect

When filling in our contact form or setting up an account, you are asked to supply your name and contact details. We ask you for this so we can answer any email inquires and set up account details for you. All information we received is stored on secure facilities until it is no longer required, then permanently erased.


We may disclose your personal information to any of our 'employees, officers and agents,' insofar as reasonably necessary for the purposes of those 'employees, officers and agents,' being able to carry out their assignments.

Surveillance key to our services

Our Services

  • Defendant Personal Injury.
  • Spurious Insurance Claims.
  • Intellectual Property Fraud.
  • Cable theft.
  • Fuel theft.
  • Assist protection.
  • Human Resources - (long term sickness).
  • Theft.
  • Covert Surveillance.
  • Undercover Operatives (work in placements as employees).
  • Tracing.
  • Overt Surveillance.
  • Counter-Surveillance.
  • Due Diligence / Risk Assessments.
  • Covert Camera Installations
  • Vehicle Tracking Devices and Systems.
  • T.S.C.M - Technical Surveillance Counter Measures (Bug Sweeps).


to Top