Information collection, use and sharing
We are the sole owners of the information collected on this Site. We will not sell or rent this information to anyone.
We may also process your personal information if we believe we have a genuine and legitimate reason to do so and we are not harming any of your rights and interests. This means we may use the data you provide to us, or source your data through other means, for our legitimate business interests to carry out our work. Before doing this, we will also carefully consider and balance any potential impact on you and your rights.
As data processors, we use your data to inform profiling, segmentation and dynamic content to improve your experience.
You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via email@example.com or clicking on the ‘Unsubscribe’ link located in the footer of any marketing emails you may have received from us.
At any time, you have the right to:
We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline.
We will always follow strict security procedures in storing, using and sharing the information you give us, in order to prevent unauthorised access to it. These security procedures may mean that proof of your identity may sometimes be required before information can be disclosed to you.
Wherever we collect sensitive information that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a closed lock icon at the bottom of your web browser, or by looking for "https" at the beginning of the address of the web page.
While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.