Nuts & Bolts Ltd

Detailed terms of sale

Seller logo

The seller is located at Weston-super-Mare, United Kingdom

What the seller has to say

We are a family based firm enjoying steady growth since our launch in 1990. With a shared experience of over 100 years in fixings and powertools for the construction and engineering industry, our independent team of specialists offer excellent knowledge and an extensive product range at competitive prices. To expand our trade counter, we expanded into the online market place in 2010 and opened our Powertool-Supplies website concentrating on the Festool brand. In 2014 we started to use EBay and Amazon to help reinforce our sales platforms. This devotion has propelled us to be one of the top three Festool suppliers in the UK, and also allowed us to branch out into other brands, including Makita, Metabo, Bosch, Trend and Dewalt

Detailed terms of sale

Free Standard Shipping.

Your delivery method is chosen based on the value, weight, location and size of your total order

1. If the person discovering the incident is a member of the management team, they will proceed to step 3. 2. If the person discovering the incident is not a member of the management team, they will call a member of the management team. 3. The management team member who receives the call (or discovered the incident) will refer to their contact list for the incident response (Nuts & Bolts and Evolvit) members to be contacted. The staff member will call those designated on the list. The staff member will log: • The nature of the incident. • What equipment or persons were involved? • Location of equipment or persons involved. • How the incident was detected. • Is the equipment affected business critical? • What is the severity of the potential impact? • Name of system being targeted, along with operating system, IP address, and location. • IP address and any information about the origin of the attack. 4. Contacted members of the response team will meet or discuss the situation over the telephone and determine a response strategy. a. Is the incident real or perceived? b. Is the incident still in progress? c. What data or property is threatened and how critical is it? d. What is the impact on the business should the attack succeed? • Minimal • Serious • Critical e. What system or systems are targeted, where are they located physically and on the network? f. Is the incident inside the trusted network? g. Is the response urgent? h. Can the incident be quickly contained? i. Will the response alert the attacker and do we care? j. What type of incident is this? • Virus • Worm • Intrusion • Abuse • Damage • Other 5. An incident ticket will be created. The incident will be categorized into the highest applicable level of one of the following categories: a. Category one - A threat to public safety or life. b. Category two - A threat to sensitive data c. Category three - A threat to computer systems d. Category four - A disruption of services 6. Team members will establish and follow one of the following procedures basing their response on the incident assessment: a. Worm response procedure b. Virus response procedure c. System failure procedure d. Active intrusion response procedure - Is critical data at risk? e. Inactive Intrusion response procedure f. System abuse procedure g. Property theft response procedure h. Website denial of service response procedure i. Database or file denial of service response procedure j. Spyware response procedure. The team may create additional procedures which are not foreseen in this document. If there is no applicable procedure in place, the team must document what was done and later establish a procedure for the incident. 7. Team members will use forensic techniques, including reviewing system logs, looking for gaps in logs, reviewing intrusion detection logs, and interviewing witnesses and the incident victim to determine how the incident was caused. 8. Evidence Preservation - make copies of logs, email, and other communication. Keep lists of witnesses. Keep evidence as long as necessary to complete prosecution and beyond in case of an appeal. 9. Team members will recommend changes to prevent the occurrence from happening again or infecting other systems. 10. Upon management approval, the changes will be implemented. 11. Team members will restore the affected system(s) to the uninfected state. They may do any or more of the following: a. Re-install the affected system(s) from scratch and restore data from backups if necessary. Preserve evidence before doing this. b. Make users change passwords (Mandatory). c. Be sure the system has been hardened by turning off or uninstalling unused services/packages. d. Be sure the system is fully patched. e. Be sure real time virus protection and intrusion detection is running. f. Be sure the system is logging the correct events and to the proper level. 12. Documentation—the following shall be documented: a. How the incident was discovered. b. The category of the incident. c. How the incident occurred: • Email • Firewall • Other - Detail d. Where the attack came from, such as IP addresses and other related information about the attacker. e. What the response plan was. f. What was done in response? g. Whether the response was effective. 13. Notify proper external agencies - notify the police and other appropriate agencies if prosecution of the intruder is possible. 14. Where a security breach has been identified contact all relevant PII API suppliers/host. i.e. • Amazon • Ebay • ManoMano 15. Assess damage and cost - assess the damage to the organization and estimate both the damage cost and the cost of the containment efforts. 16. Review response and update policies - plan and take preventative steps so the intrusion can't happen again. a. Consider whether an additional policy could have prevented the intrusion. b. Consider whether a procedure or policy was not followed which allowed the intrusion, and then consider what could be changed to ensure that the procedure or policy is followed in the future. c. Was the incident response appropriate? How could it be improved? d. Was every appropriate party informed in a timely manner? e. Were the incident-response procedures detailed and did they cover the entire situation? How can they be improved? f. Have changes been made to prevent a re-infection? Have all systems been patched, systems locked down, passwords changed, anti-virus updated, email policies set, etc.? g. Have changes been made to prevent a new and similar infection? h. Should any security policies be updated? i. What lessons have been learned from this experience?

If you change your mind
You have 14 days to change your mind. The return costs will be at your charge. You'll be refunded no more than 14 days after the seller has received your decision to withdraw. Please note the seller may withhold the refund until they've received the products or until they've received evidence that the products have been sent back, whichever is the earliest (unless the seller has offered to collect the goods.) Please return the products in their original packaging where possible.

How can I return a product?
It's easy: go to "My order" and click on "Return my product" to receive the return instructions.

Nuts & Bolts Ltd Sunnyside Road North Weston super Mare North Somerset BS23 3PZ

  • Millions of products

  • Delivery to your home or click & collect

  • Hundreds of dedicated experts online