Foodable Network Logo
  • Main page
  • Cookie Policy
  • Privacy Policy
  • Refund & Payment Policy
  • Security Policy
  • Terms of Use

Security Policy

Effective Date: March 3, 2026
Last Updated: March 3, 2026

This Security Policy describes the security principles, organisational measures, technical controls, and operational practices applied by Code Flick Ltd (“Code Flick”, the “Company”, “we”, “our”, or “us”) in connection with the website https://codeflick.eu/ (the “Website”), our digital business activities, and the software-related, information technology, telecommunications-related, analytical, and business support services that we make available to clients, prospective clients, business contacts, and authorised users. The purpose of this Policy is to explain, in a formal and transparent manner, how we seek to protect systems, data, communications, and service environments against unauthorised access, misuse, accidental loss, unlawful disclosure, alteration, disruption, or destruction.

1. Data Protection and Security Measures

We take the protection of business information, personal data, service-related materials, technical records, and system credentials seriously and seek to implement reasonable technical and organisational measures designed to preserve confidentiality, integrity, availability, and resilience. The specific controls applied may vary depending on the nature of the service, the sensitivity of the information involved, the architecture of the relevant system, the operational context, and our legal or contractual obligations.

Our security measures may include, where appropriate and proportionate, the use of encrypted communications, controlled administrative access, authentication requirements, restricted permissions, system monitoring, segmentation of roles and responsibilities, secure configuration standards, vendor oversight, backup practices, logging, anti-malware protections, anti-spam controls, and procedural safeguards intended to reduce the likelihood and impact of security incidents.

  • Encryption and secure transmission controls may be used to protect data in transit and, where applicable, sensitive data at rest.
  • Access to systems, accounts, and data may be restricted to authorised personnel or service providers with a legitimate business need.
  • Authentication controls, including multi-factor authentication for relevant administrative or sensitive access, may be implemented where appropriate.
  • Data minimisation, role separation, and least-privilege principles may be used to reduce unnecessary exposure of information.

2. Infrastructure Security

We seek to maintain infrastructure that is appropriately secured, monitored, and administered to support the stable and secure operation of the Website and related digital services. Depending on the relevant environment, this may involve internally managed systems, third-party hosting providers, cloud infrastructure, managed platforms, telecommunications-related service components, or combinations of these arrangements.

Infrastructure-level safeguards may include network protection measures, logical access controls, service hardening, environment segregation, secure backup arrangements, resilience planning, system health checks, logging, and configuration management.

  • Firewalling, network filtering, or comparable access-restriction mechanisms may be used to protect service environments.
  • Hosting and infrastructure providers may be selected based on operational reliability, security controls, and suitability for digital service delivery.
  • Security reviews, vulnerability checks, and maintenance activities may be performed periodically or when operationally necessary.

3. Application Security

We seek to apply security-minded practices to the development, configuration, maintenance, and deployment of software, interfaces, digital workflows, and related technical materials used in our operations. This includes reasonable efforts to reduce avoidable vulnerabilities, support stable service delivery, and address known security issues in a timely and proportionate manner.

  • Testing, validation, and review may be carried out before production release or major configuration changes.
  • Security patches and updates may be applied in line with operational need, vendor guidance, and risk prioritisation.
  • Administrative interfaces, credentials, and deployment processes may be restricted and monitored where appropriate.

4. Data Privacy Compliance

We recognise that information security and data protection are closely connected. Where personal data is processed in connection with the Website, client communications, business operations, software-related services, or information technology support, we seek to process such data lawfully, fairly, and transparently in accordance with applicable data protection requirements.

  • Access, correction, deletion, or other privacy-related requests may be handled in accordance with our Privacy Policy and applicable law.
  • Personal data is intended to be retained only for as long as reasonably necessary for the relevant purpose or legal obligation.
  • Where reportable breaches occur, notifications may be made to regulators or affected persons in line with applicable requirements.

5. Employee Training and Awareness

People are an important part of maintaining an effective security posture. We therefore seek to promote appropriate awareness among personnel involved in our operations regarding confidentiality, secure communications, account protection, phishing awareness, responsible handling of information, and escalation of suspected incidents or irregularities.

  • Personnel may be expected to follow internal rules on confidentiality, access control, and safe system use.
  • Awareness efforts may cover phishing, password hygiene, suspicious activity reporting, and secure handling of business information.
  • Access rights may be reviewed or limited based on role, business need, onboarding status, or operational change.

6. Third-Party Service Providers

We may rely on third-party service providers in connection with hosting, infrastructure, communications, analytics, anti-spam protections, support tools, payment processing, document management, monitoring, telecommunications-related services, or other operational functions.

  • Service providers may be selected or retained with regard to security, reliability, contractual suitability, and operational fit.
  • Where appropriate, contractual terms may include confidentiality, data handling, and security-related obligations.
  • Provider oversight may include periodic review, incident coordination, or reassessment where operationally relevant.

7. Incident Response and Reporting

We seek to maintain procedures for identifying, assessing, containing, documenting, and responding to security incidents that may affect our systems, business operations, or the confidentiality, integrity, or availability of information.

  • Systems or provider services may be monitored for indicators of misuse, compromise, malfunction, or suspicious activity.
  • Containment and recovery actions may be implemented to reduce impact and restore normal operation where practicable.
  • Relevant incidents may be documented and reviewed to support remediation, lessons learned, and future risk reduction.

8. User Responsibilities

While we seek to implement reasonable measures to protect the Website and related services, users also play an important role in helping maintain security. Individuals and organisations should take reasonable steps to protect their own devices, credentials, networks, and communications.

  • Users should maintain secure passwords or other authentication credentials and avoid sharing them with unauthorised persons.
  • Users should keep their systems, browsers, and relevant software reasonably up to date.
  • Suspected misuse, phishing, fraud, or unauthorised access relating to our services should be reported promptly.

9. Security Updates

Security practices, tools, and procedures may be revised over time in response to changes in our services, infrastructure, suppliers, threat landscape, legal obligations, or internal risk assessments.

10. Changes to This Security Policy

We may amend, revise, supplement, or otherwise update this Security Policy from time to time in order to reflect changes in law, regulatory guidance, business operations, infrastructure, service providers, technical architecture, security practices, or internal compliance requirements.

11. Contact Information

If you have any questions about this Security Policy, or if you wish to report a security concern, suspected misuse, suspicious communication, or another issue related to the security of our Website or services, please contact:

Code Flick Ltd
Registered Office: Office 8368 321-323 High Road, Chadwell Heath, Essex, United Kingdom, RM6 6AX
Email: admin@codeflick.eu

Foodable Network Logo

Analytical platform for restaurant industry professionals.

admin@codeflick.eu +44 738 629 1258

Navigation

Home About Us Services Pricing Contact Us

Legal

Privacy Policy Terms of Use Cookie Policy Security Policy Refund & Payment

© 2026 Code Flick LTD. All rights reserved.

Office 8368, 321-323 High Road, Chadwell Heath, Essex, RM6 6AX, UK