We are Walker & Munns IT Consultants Limited.  We’re a company registered in England and Wales with company number 14650016.  In this privacy notice we will refer to ourselves as ‘we’, ‘us’ or ‘our’.


We take the privacy, including the security, of personal information we hold about you seriously.  This privacy notice is designed to inform you about how we collect personal information about you and how we use that personal information.  You should read this privacy notice carefully so that you know and can understand why and how we use the personal information we collect and hold about you.


We acknowledge and agree that any personal data of yours that we handle will be processed in accordance with all applicable data protection laws in force from time to time in particular the UK and EU General Data Protection Regulations (“GDPR”) and the Data Protection Act 2018.


We do not have a Data Protection Officer, but if you have any questions about this privacy notice or issues arising from it then you should contact, for matters relating to data protection at our organisation, including any matters in this privacy notice.


We may issue you with other privacy notices from time to time, including when we collect personal information from you.  This privacy notice is intended to supplement these and does not override them.


We may update this privacy notice from time to time.  This version was last updated on 20th March 2023.


A cookie is a file containing an identifier (a string of letters and numbers) that is sent by a web server to a web browser and is stored by the browser. The identifier is then sent back to the server each time the browser requests a page from the server.


Cookies may be either “persistent” cookies or “session” cookies: a persistent cookie will be stored by a web browser and will remain valid until its set expiry date, unless deleted by the user before the expiry date; a session cookie, on the other hand, will expire at the end of the user session, when the web browser is closed.


We use cookies on our website. Insofar as those cookies are not strictly necessary for the provision of our services, we will ask you to consent to our use of cookies when you first visit our website.


Cookies may not contain any information that personally identifies a user, but personal data that we store about you may be linked to the information stored in and obtained from cookies.


In this section, we have set out the general categories of personal data that we process (and, in the case of personal data that we did not obtain directly from you, information about the source and specific categories of that data).


We may process data enabling us to get in touch with you “contact data”. The contact data may include your name, email address, telephone number, postal address and/or social media account identifiers. The source of the contact data is you and/or your employer.


We may process communication data“, information contained in or relating to any communication that you send to us or that we send to you . The communication data may include the communication content and metadata associated with the communication. Our website will generate the metadata associated with communications made using the website contact forms.


We may process usage data“, data about your use of our website and services. The usage data may include your IP address, geographical location, browser type and version, operating system, referral source, length of visit, page views and website navigation paths, as well as information about the timing, frequency and pattern of your service use.

Purposes of processing and legal bases

In this section, we have set out the purposes for which we may process personal data and the legal bases of the processing.



We may process your personal data for the purposes of operating our website, the processing and fulfilment of orders, providing our services, supplying our goods, generating invoices, bills and other payment-related documentation, and credit control. The legal basis for this processing is our legitimate interests, namely the proper administration of our website, services and business.


Relationships and communications

We may process contact data, and/or communication data for the purposes of managing our relationships, communicating with you (excluding communicating for the purposes of direct marketing) by email, SMS, post, and/or telephone, providing support services and complaint handling. The legal basis for this processing is our legitimate interests, namely communications with our website visitors, service clients, individual customers and customer personnel, the maintenance of relationships, and the proper administration of our website, services and business.


Direct marketing

We may process contact data,  for the purposes of creating, targeting and sending direct marketing communications by email, SMS, post and/or contact by telephone for marketing-related purposes. The legal basis for this processing is our legitimate interests, namely promoting our business and communicating marketing messages and offers to our website visitors and service users.


Research and analysis

We may process usage data for the purposes of researching and analysing the use of our website and services, as well as researching and analysing other interactions with our business. The legal basis for this processing is our legitimate interests, namely monitoring, supporting, improving and securing our website, services and business generally.



We may process your personal data for the purposes of security and the prevention of fraud and other criminal activity. The legal basis of this processing is our legitimate interests, namely the protection of our website, services and business, and the protection of others.


Insurance and risk management

We may process your personal data where necessary for the purposes of obtaining or maintaining insurance coverage, managing risks and/or obtaining professional advice. The legal basis for this processing is our legitimate interests, namely the proper protection of our business against risks.


Legal claims

We may process your personal data where necessary for the establishment, exercise or defence of legal claims, whether in court proceedings or in an administrative or out-of-court procedure. The legal basis for this processing is our legitimate interests, namely the protection and assertion of our legal rights, your legal rights and the legal rights of others.


Legal compliance and vital interests

We may also process your personal data where such processing is necessary for compliance with a legal obligation to which we are subject or in order to protect your vital interests or the vital interests of another natural person.

Providing your personal data to others

We will never sell your data.


We may disclose your personal data to our insurers and/or professional advisers insofar as reasonably necessary for the purposes of obtaining or maintaining insurance coverage, managing risks, obtaining professional advice.


Your personal data held in our website database.


We may disclose personal data to our suppliers or subcontractors insofar as reasonably necessary for fulfilling requests or queries.

Retaining and deleting personal data

This section sets out our data retention policies and procedures, which are designed to help ensure that we comply with our legal obligations in relation to the retention and deletion of personal data.


Personal data that we process for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.


All personal data will be retained for a minimum period of 6-months following the date of the most recent contact between you and us, and for a maximum period of 12-months following that date.


Notwithstanding the other provisions of this Section 7, we may retain your personal data where such retention is necessary for compliance with a legal obligation to which we are subject, or in order to protect your vital interests or the vital interests of another natural person.

What rights you have over your data

In this section , we have listed the rights that you have under data protection law.

Your principal rights under data protection law are:

  1. the right to access – you can ask for copies of your personal data;
  2. the right to rectification – you can ask us to rectify inaccurate personal data and to complete incomplete personal data;
  3. the right to erasure – you can ask us to erase your personal data;
  4. the right to restrict processing – you can ask us to restrict the processing of your personal data;
  5. the right to object to processing – you can object to the processing of your personal data;
  6. the right to data portability – you can ask that we transfer your personal data to another organisation or to you;
  7. the right to complain to a supervisory authority – you can complain about our processing of your personal data; and
  8. the right to withdraw consent – to the extent that the legal basis of our processing of your personal data is consent, you can withdraw that consent.

These rights are subject to certain limitations and exceptions. You can learn more about the rights of data subjects by visiting [ and].


You may exercise any of your rights in relation to your personal data by written notice to us, using the contact details provided at the beginning of the privacy policy.

An intimate service where we learn your business inside and out, in order to provide a holistic overview of your business’s IT Operations.From here; we analyse, suggest improvements, show the resolve through gap analysis, and build a roadmap including all improvements.
With the continuous rise of technology and the need for businesses to establish an online presence, the best web hosting services have become an essential aspect of the digital world.Cloud hosting is a service where a website or application is hosted on a network of interconnected servers, known as the cloud, instead of being hosted on a single physical server. Walker & Munns manages the cloud infrastructure, which enables you to have access to a range of computing resources, such as CPU, RAM, storage, and bandwidth.
Your own dedicated IT Engineer for maintenance and support on an agreed number of days with a direct advisory line to Ricky and Dennis.*Exclusive to existing Walker & Munns customers
Primarily productivity & collaboration will entail Microsoft 365 or Google Workspace.Though likely your business will have multiple other tools to enhance user productivity.We have worked with a multitude of solutions over the years, therefore; we can advise on the best functionality and cost value for the business.
Cloud architecture refers to how various cloud technology components, such as hardware, virtual resources, software capabilities, and virtual network systems interact and connect to create cloud computing environments.We blueprint your IT Infrastructure in an easy to understand display.Examples of Cloud Architecture include Microsoft Azure / 365, Google Workspace, and Amazon Web Services.
Is your critical business data backed-up? Is your data secured with ransomware protection?Ensure your business data is always accessible, and defend it with built-in ransomware protection.This solution will be strongly advised for your Business Disaster Recovery (BDR) and Continuity Plan (BCP).
We provide genuine diagnosis & advice to help your business make the right decisions, through schedules sessions.We're always happy to provide a second opinion, so get in touch if you want to run something by us - for free.
Unfortunately, for a lot of businesses IT is seen as a persistent cost.And yes there is often a monetary exchange for important solutions, though it can also assist with revenue increases, if the correct workflows and automations are in place.We know all about keeping the right solution costs down and where better to use that saved capital.
IT Leadership
Subscription based consultancy for your business.We'll be available by email and phone to provide diagnosis and advice to operation-wide problems or growth endeavours, with momentum meetings to ensure the IT always supports the company's ambitions.30-day rolling contract with 5% off all Walker & Munns services.
We can manage your licences to consolidate billing or we can assist with a implementing a licence management solution to manage yourself.
Previously known as Mobile Device Management (MDM), mobile and external devices are no longer an extension of the business, but rather it's core, especially for the hybrid operating business.This calls for modern solutions for the present and the future.
Getting your first office or moving offices?We'll work with you to advise and implement your IT needs, from internet to desk layout.
Simply put, provision of the IT professional services required to achieve a goal.- Deployments - Implementations - Installations - Migrations
RMM can also be referred to by other names such as remote IT management or network management.The solution allows your business's IT Support to manage more devices, more efficiently.Through remote monitoring and management, technicians can remotely support users, remotely install software and updates, administer patches, and more.
Effective communication is essential in any business. It aids decision making, builds relationships with customers and suppliers and allows employees from different departments to interact with each other.Implement cloud communication software including phone systems, video conferencing and collaborative messaging to manage your business comms.
From 1:1 tutoring in Service Management and ITIL concepts to company-wide security training.Enquire about the variety of training and tutoring we can provide.
Boardroom to boardroom meetings, team meetings or individual catch ups, video-conferencing, also known as web-conferencing, is a way for people in your organization to communicate through a video-supported platform on a computer, smart device.
Create virtual desktops in seconds. Scale to what you need. Pay for what you use.With Virtual Desktop Infrastructure (VDI) you can build a virtual desktop for a specific team or task and distribute efficiently, removing the strain of supporting, and reducing the cost of devices/depreciating assets.It is super easy to for your users to use, simply clicking the Remote Desktop Services (RDS) application on their device.
The presence of viruses and other malware on the internet is always changing. Hackers are constantly developing new forms of software for any number of purposes.There are three main functions of anti-virus software: proactively blocking viruses from infecting your devices from the internet, reactively mitigating threats, and protecting your devices from human error.
Emails are still the most targeted business application by cyber criminals.Whether it be spoofing or phishing, or simply reducing spam, it is important to have measures in place to protect your users and your business, as it can lead to loss of brand reputation or ransomware attacks which are extremely costly if the business is not prepared against them.We can provide a free email security check to help identity improvements.
Control the access people have to your business resources, whether that be permanent employees, contractors, or 3rd party support.A good IT infrastructure will ensure access is centralised and utilising Single Sign-On (SS0) & Multi-Factor Authentication (MFA), where possible.
Penetration testing is a method of testing, measuring and enhancing established security measures on information systems and support areas.It identifies weak points and threats to the business, encouraging improvements and listing known vulnerabilities.This is a requirement for some certifications, especially when in app development and hosting.
Recent studies show that the average individual has 100 user accounts.Implementing a password manager will help educate your users in using stronger passwords, remove the inconvenience of remembering/forgetting numerous credentials, and prevent users from reusing the same passwords.
The primary business benefits of a VPN solution today are security focused.If your business is operating a hybrid model, a VPN would be considered a must-have due to the number of unfiltered Wi-Fi connections your users could be using.The three common benefits today are: - Heightened security - Remote access to business resources - Geo-independence
As the business grows it is difficult to keep track of assets, leading to financial and security problems.We ensure the correct tools and procedures are in place to ensure your business knows who is using the asset, why, when, what for, and where it is.
A proactive and efficient ITIL component focusing on improvements to ensure the business grows and adapts to ever changing technologies.This is done by listing all IT improvements with intention to resolve.
Change management is an IT Service Management discipline to improve service delivery to the business by the effective and prompt introduction of changes into the IT environments with minimal disruption of service.This is achieved by ensuring that all changes are tracked, managed and reviewed so that they are properly prioritised.
Incident management is the practice of restoring services as quickly as possible after unplanned events.The process aims to identify and correct problems while maintaining normal service, whilst minimising impact to end users.
Whether it is business as usual, for an audit or certification, it is important to have the correct controls in place.We can assist in writing Policies (why we do things) and processes (made up of procedures) to ensure your business runs optimally.
Whereas Incident Management looks to resolve issues as quickly as possible to reduce downtime, Problem Management is a diagnosis and resolution of the source issue.This could be implementing a new solution, a new process or simply clarifying a workflow, to reduce problems causing multiple issues.Problem Management often requires good Change Management to prevent causing another Incident.
It's not uncommon for IT services or business operations to have a lot of delicate moving parts.Communication is almost always the culprit in poor service delivery. We ensure communication with all relevant parties as dictated by RACI.
How best to reduce time, gathering information and data, designing a presentation, organising a meeting, and finally presenting?Have the correct tools in place for automation.
A Service Catalogue is the store front or directory of services available to a user or customers. This includes setting expectations (what you get, when, how, at what cost) and proper measurement of those expectations to determine if they have been met or exceeded.Many businesses have fantastic products, but forget to service it correctly. We're lucky to combine our IT skills with quality customer service, and we can assist you with yours too.
Delivering a service is easy. Delivering a good service with 100% satisfaction... not so much.Fortunately we have a ton of project and support experience to help us deliver the best services to you and to help you deliver the best services to your own business & customers.
How to ensure the framework's disciplines are smooth?Implement a strong Service Desk. The core of Service Management.From managing simple support requests to organising a Managed Service Provider's (MSP) 24/7 IT Support, we can assist in ensuring service operations run smoothly.
Often its not until the audit for Cyber Essentials or ISO27001 does a company identify gaps in their IT infrastructure, which leads to time lost and dismay trying to implement and re-write policies.We are experienced in such security certifications and work with trusted governing bodies to help you certify efficiently.