1. With whom we share your data
We use third party services (data processors) on our websites. The extent to which your data is shared with these providers depends on the use of our services and we refer to them specifically (with links to their privacy policies) in the following sections.
Each third party service we use has been audited by our security team to ensure that their privacy policies and practices meet or exceed the same levels of compliance and standards we follow. Whenever is necessary and available, we maintain additional signed privacy agreements with these companies as an additional level of accountability to ensure that your data is secure.
We disclose potentially identifiable information and personal identities only to our employees, contractors and affiliates who (i) must be aware of this information in order to process it on our behalf or to provide services; and (ii) have agreed, in writing, to secure them. Some of these employees, contractors and affiliates may be located outside your country of origin, using our sites and services, you consent to the transfer of this information to them. We will not rent or sell potentially personally identifiable and personally identifiable information to anyone.
We may be required to disclose a person’s personal information in response to a lawful request from public authorities, including to meet national security or law enforcement requirements.
If we ever transfer your data to third parties for a purpose other than that which was originally collected or subsequently approved by you, we will give you the opt-out option to limit the use and disclosure of your personal data.
If you leave a comment on our site, you can choose to save your name, email address and site to cookies. These are for your convenience, so you do not have to fill in your details again when leaving another comment. These cookies last for one year.
If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal information and is discarded when you close your browser.
When you log in, we will also create various cookies to store your login information and display options. Input cookies last for two days and on-screen cookie cookies last for one year. If you select “Remember me”, your connection will last for two weeks. If you log out of your account, login cookies will be removed.
3. What personal data do we collect and why do we collect it
Email / Contact Form
Customers who email us or use the contact forms on our sites will have the email address, IP address and data provided in the contact form or email stored in our G Suite files as well as in the integrated business resource management program that we use.
We retain indefinitely all the communication you make via email as well as through the contact forms, so that we can provide ongoing support and improve our services. You can request copies of any previously saved mail with us at any time.
Hosting and backups
CloudFlare is a web traffic optimization and distribution service provided by CloudFlare Inc.
4. What rights do you have in your data
You can ask to be “forgotten” and we will delete any personally identifiable data we have about you. Of course, this excludes the data we need for administrative or security purposes or if required by law to retain some of the data.
A person seeking access or seeking to correct, modify or delete inaccurate data should direct their inquiry to firstname.lastname@example.org. We will reply you within a reasonable time, not exceeding one month.
5. How we protect your data
The security and reliability of our services is our first priority. We invest heavily in the training of our staff and infrastructure to ensure that best practices are followed in everything we do.
Prevention is best when it comes to security, and as a first step, we implement internal review procedures as well as quality assurance procedures specifically designed to prevent potential security risks in our services.
Each employee and contractor goes through a background check and an integration process, which includes a trial period where access to customer data is only granted when they work under the supervision of another staff member.
All staff have access only to systems that are immediately required to complete their tasks. We use dual factor authentication for all critical communication systems and services. We automatically record all staff activity using internal logging tools, Google ‘G’ Suite features and Amazon Cloud Trail.
All staff (including contractors) undergo initial training to ensure a proper understanding of all safety-related procedures.
We use only third-party services, such as Amazon Web Services, which are fully audited and comply with the highest levels of privacy and security practices.
6. What data breach procedures do we apply?
In the event of an event where our customer data is lost, stolen or potentially compromised, our policy is to notify our customers by email no later than 48 hours after our team is aware of the event . We will also report this incident to the competent data protection authority.
The site is not intended for persons under the age of consent.