What personal data we collect and why we collect it
Should you get in touch with us through the website, e.g. when you become a member, we will retain this information on our servers until the user’s account is removed from our records or a data deletion request is made by the user.
Embedded content from other websites
We use analytics to help us provide the best content we can to the audience. We are using Google Analytics to help us do so. Besides Analytics we are also using Hotjar to help us improve placements of elements on the website and make sure we can offer you the best browsing experience.
How long we retain your data
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see or edit their personal information at any time (except they cannot change their username). You can also request the data we hold on you or request an account deletion if you wish to delete your data. Website administrators can also see and edit that information except passwords.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Your contact information
You can get in touch with us by phone or email. The details can be found at the footer of every page.
How we protect your data
We try our best to make sure your data is securely stored on our servers. Every bit of sensitive information is stored in encrypted form on our servers. Software, as well as hardware is kept up to date to ensure further security. We aim to stay on top of security to ensure you are having a safe and secure browsing experience using our services.
What data breach procedures we have in place
Should we encounter a data breach within our servers, we will try to locate the origin, close the possible breach, assess the situation and let the users know what data may have been breached.
In case of a breach, the attackers would only get encrypted data which is useless since we have several encryption mechanisms implemented to make sure your data is stored securely.