top of page

The Event policies

Privacy Policy

  1. Our Privacy Principles

If you read nothing else, please read this:

The most fundamental privacy principle 3T Logistics Ltd (“we”, “3T”, “us” and “our”) follow is that by default, anything you add to 3T’s EVENT control Platform is private to your Company. That is, files shared, orders added within a specific EVENT control application requires authentication as a member of that team.

3T is the custodian of data on behalf of the companies that use the EVENT control Platform. We don’t own EVENT user data. EVENT users own their data. They like it that way and so do we.

At 3T we believe that more transparency is better than less. We try to make our product easy to use, with settings and options that are easy to find and understand. This is good for privacy, good for the product, and good for 3T customers and users.

Privacy goes hand in glove with security and confidentiality. We see these things being the three legs that keep the stool balanced and upright. Each is as important as the other and if one is missing the stool won’t stand. They are all very important to us and we take them very seriously.

For the purposes of the applicable data protection laws, legislation and regulations, the data controller is 3T Logistics Ltd. We are registered in England and Wales under company number 03973355 and have our registered office at 5 Smith Way, Grove Park, Enderby, Leicester, LE19 1SX.


    2. Information we collect and receive

We collect different kinds of information. Some of it is personally identifiable and some is non-identifying or aggregated. Here are the types of information we collect or receive:

  • Information you give us

  • This is information about you that you give us by filling in forms on our site or by corresponding with us by phone, e-mail or otherwise, it includes information you provide when you register to use our site, subscribe to our service and when you report a problem with our site. The information you give us may include your name, address, e-mail address and phone number and financial and credit card information.

  • Any information you add to your profile is visible to other people on your team depending on their level of permission.

  • Log data.

  • When you use EVENT control, our server’s automatically record information, including information that your browser sends whenever you visit a website or your mobile app sends when you’re using it. This log data may include your Internet Protocol address, your browser type and settings, the date and time of your request, information about your browser configuration and plug-ins, language preferences, and cookie data. Log data does not contain message content and is not routinely deleted.

  • Device information.

  • In addition to log data, we may also collect information about the device you’re using EVENT application on, including what type of device it is, what operating system you’re using, device settings, unique device identifiers, and crash data. Whether we collect some or all of this information often depends on what type of device you’re using and its settings.

  • Geo-location information.

  • Precise GPS from mobile devices is collected only with your permission. WiFi and IP addresses received from your browser or device may be used to determine approximate location.


    3. Cookies

  • About Cookies

When you use or access the EVENT control Platform, we may use small text files containing a string of alphanumeric characters called cookies to improve the overall experience, among other things. A cookie is a piece of data stored on the user's hard drive or browser containing information about the user. Information from cookies alone generally do not provide us with information to personally identify you. 3T may use both session cookies and persistent cookies. A session cookie generally disappears after you close your browser. A persistent cookie remains after you close your browser and may be used by your browser on subsequent visits to the EVENT control Platform or other web sites. Persistent cookies can generally be removed by you. Please review your web browser "Help" file to learn the proper way to modify your cookie settings and to remove cookies.


  • Cookies that we use

We use cookies for the following purposes:

     (a) Authentication – we use cookies to identify you when you visit our website and as you   

          navigate our website.

     (b) Status – we use cookies to help us to determine if you are logged into our website.

     (c) Personalisation – we use cookies to store information about your preferences and to

          personalise the website for you.

     (d) Security – we use cookies as an element of the security measures used to protect user

          accounts, including preventing fraudulent use of login credentials, and to protect our

          website and services generally.


  • Cookies used by our service providers


     (a) Our service providers use cookies and those cookies may be stored on your computer

          when you visit our website.

     (b) We use Google Analytics to analyse the use of our website. Google Analytics gathers

           information about website use by means of cookies.  The information gathered relating

           to our website is used to create reports about the use of our website.  Google’s privacy

           policy is available at: https:/

  • Managing Cookies

Most browsers allow you to refuse to accept cookies and to delete cookies.The methods for doing so vary from browser to browser, and from version to version. You can however obtain up to date information about blocking and deleting cookies via these links:

     (a) ;


          (Firefox) ;


     (d) -internet-explorer-delete- 

          manage-cookies (internet Explorer);       

     (e) (Safari); and

     (f) /windows-10-microsoft-edge-and-privacy (Edge).


Blocking all cookies will have a negative impact upon the usability of many websites.

If you block cookies, you will not be able to use all the features on our website.

    4. How we use your information

We use your information for the following

  • Providing the EVENT service.

  • We use information you provide to carry out our obligations arising from any contracts entered into between you and us and to provide you with the information, products and services that you request from us.

  • To authenticate you.

  • Understanding and improving our products.

  • To make the product better we have to understand how users are using it, we call this solo.COMMUNITY. We have a fair bit of data about usage and we intend to use it many different ways to improve our products, including research. This policy is not intended to place any limits on what we do with usage data that is aggregated or de-identified so it is no longer tied to an EVENT user.

  • Investigating and preventing bad stuff from happening.

  • We work hard to keep EVENT secure and to prevent abuse and fraud.

  • Communicating with you

  • Solving your problems and responding to your requests. If you contact us with a problem or question, we will use your information to respond to that request and address your problems or concerns.

  • Email messages. We may send you service and administrative emails. We may also contact you to inform you about changes in our services, or our service offerings. These messages are considered part of the service and you may not opt-out of them. In addition, we sometimes send emails to EVENT users about new product features or other news about EVENT or 3T. You can opt-out of these at any time by contacting us at

Personal data that we process for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.

    5. Disclosure of your Information

You agree that we have the right to share your personal information with:

  • Any member of our group, which means our subsidiaries, our ultimate holding company and its subsidiaries, as defined in section 1159 of the UK Companies Act 2006. [HS1] 

  • Our payment service providers. We will share transaction data with our payment services providers only to the extent necessary for the purposes of processing your payments, refunding such payments and dealing with complaints and queries relating to such payments and refunds.  You can find information about the payment services providers’ privacy policies and practices at [URLs].


    6. Security

3T takes reasonable steps to protect information you provide to us as part of your use of the 3T service from loss, misuse, and unauthorized access or disclosure. When you enter sensitive information (such as sign-in credentials) we encrypt the transmission of that information using secure socket layer technology (SSL). We follow generally accepted standards to protect the personal data submitted to us, both during transmission and once we receive it. However, no electronic or email transmission or digital storage mechanism is ever fully secure or error free.


To learn more about current practices and policies regarding security and confidentiality, please see our Security Practices; we keep that document updated as these practices evolve over time.

    7. Your Rights

  • If the data you provide to us is personal data you have principal rights under data protection law which include:

          - the right to access;

          - the right to reflection;

          - the right to erasure;

          - the right to restrict processing;

          - the right to object to processing;

          - the right to data portability;

          - the right to complain to a supervisory authority; and

          - the right to withdraw consent.

  • You have the right to confirmation as to whether or not we process your personal data and, where we do, access to the personal data, together with certain additional information.  That additional information includes details of the purposes of the processing, the categories of personal data concerned and the recipients of the personal data.  Providing the rights and freedoms of others are not affected, we will supply to you a copy of your personal data.  The first copy will be provided free of charge, but additional copies may be subject to a reasonable fee.

  • You have the right to have any inaccurate personal data about you rectified and, taking into account the purposes of the processing, to have any incomplete personal data about you completed.

  • In some circumstances you have the right to the erasure of your personal data without undue delay.  Those circumstances include: the personal data are no longer necessary in relation to the purposes for which they were collected or otherwise processed; you withdraw consent to consent-based processing; the processing is for direct marketing purposes; and the personal data have been unlawfully processed.  However, there are certain general exclusions of the right to erasure.  Those general exclusions include where processing is necessary: for exercising the right of freedom of expression and information; for compliance with a legal obligation; or for the establishment, exercise or defence of legal claims.

  • In some circumstances you have the right to restrict the processing of your personal data.  Those circumstances are: you contest the accuracy of the personal data; processing is unlawful but you oppose erasure; we no longer need the personal data for the purposes of our processing, but you require personal data for the establishment, exercise or defence of legal claims; and you have objected to processing, pending the verification of that objection.  Where processing has been restricted on this basis, we may continue to store your personal data. However, we will only otherwise process it: with your consent; for the establishment, exercise or defence of legal claims; for the protection of the rights of another natural or legal person; or for reasons of important public interest.

  • If you consider that our processing of your personal information infringes data protection laws, you have a legal right to lodge a complaint with a supervisory authority responsible for data protection.  You may do so in the EU member state of your habitual residence, your place of work or the place of the alleged infringement.

  • To the extent that the legal basis for our processing of your personal information is consent, you have the right to withdraw that consent at any time.  Withdrawal will not affect the lawfulness of processing before the withdrawal.

  • You may exercise any of your rights in relation to your personal data by written notice to us.

    8. Changes to this Privacy Policy


We may change this policy from time to time, and if we do we’ll post any changes on this page. If you continue to use EVENT after those changes are in effect, you agree to the revised policy. If the changes are material, we may provide more prominent notice or seek your consent to the new policy.

    9. Contacting us

You can contact us:

     (a) by post, using the postal address

              3T Logisitcs Ltd 

              Grove Park,

              5 Smith Way,



              LE19 1SX

     (b) using our website contact form

     (c) by telephone: +44 (0) 116 240 5940

     (d) by email, using


Privacy Policy

Security Policy


Each Owner and each User (as defined in our Terms of Service) using EVENT control applications expect their data to be secure, confidential, and private. We understand how important this is to our customers and work to the best of our abilities to ensure all three expectations are met. Please review the information below regarding our current policies and practices, along with our Privacy Policy and Terms of Service. This is a living document and we will update it as our service evolves and industry practices change.

   1. Security

As a company, we use the  service for nearly all of our communication. Ensuring that the Event service remains secure is vital to protecting our own data. The security of your information is required for our success as a business. Below are some details on our security practices.


   2. Encrypted Traffic by Default, in Both Directions

Event uses 256-bit AES, supports TLS 1.2 for all of your messages, and uses the ECDHE_RSA Key Exchange Algorithm. We monitor the security community's output closely and work promptly to upgrade the service to respond to new vulnerabilities as they are discovered.


   3. External Security Audits

We contract with respected, external security firms who perform regular audits of Event to verify that our security practices are sound and to monitor the service in light of new vulnerabilities discovered by the security research community.


   4. Secure Physical Location

Our servers are located in Microsoft Azures data centers. They've devoted an entire portion of their site to explaining their security measures, which you can find here:


   5. Experienced Team

Even before EVENT control, we (as 3T) have been providing services on the internet for a long time. We're good at it. Our engineering, quality assurance and technical operations team members are experienced and keep their skills up to date as industry best practices evolve. We’ve coded, tested and administered services running on thousands of physical servers in data centers around the world and we bring the collective wisdom that comes with many decades of secure practice to the operation of the 3T service.


   6. Security Features for Team Members & Administrators

The highest security risk to any system is usually the behaviour of its users. We want to provide you with the tools you need to protect your own data. For example, we log every time your account is signed in to, noting the device used and location of the connection, and make these access logs available to you.

Account administrators can review consolidated access logs for the whole team. We also make it easy for each user to remotely close all Event connections and sign out all devices authenticated with their Event credentials at any time (so if you or one of your teammates lose your phone or laptop, you don't have as much to worry about).

We will continue to roll out additional features which afford you more control over the security of your own Event environment. We will also be adding more options for Account administrators to set internal security policies, such as establishing password strength requirements or requiring use of PIN-lock functionality for Event’s mobile apps.


   7. Availability

We understand that you rely on EVENT control to work. We're committed to making EVENT control a highly-available, ultra-reliable service that you can always count on. We build systems that tolerate the failure of individual computers or whole data centers, keep many copies of your data online for redundancy, practice disaster-recovery measures often, and always have staff on-call to quickly resolve unexpected incidents.


   8. Confidentiality

We regard the information you share within your EVENT control users as private and confidential. We place strict controls over our employees’ access to internal data and are committed to ensuring that your data is never seen by anyone who should not see it.

While the operation of the EVENT control service would not be possible unless there were some technical employees with sufficient system permissions to enable them to access and control software that stores and indexes the content you add to your EVENT control application, this team is kept purposefully small and are prohibited from using these permissions to view customer data unless it is necessary to do so.

All of our employees and contractors are bound to our policies regarding customer data and we treat these issues as matters of the highest importance within our company. If, in order to diagnose a problem you are having with the service, we would need to do something that would expose your personal company data to one of our employees in a readable form, we will ask for your consent prior to taking action. Our platform will automatically generate an audit entry of any such access.

There are limited circumstances when we ever share customer content without first obtaining permission. These are outlined in our Privacy Policy.

Security Policy
bottom of page