Skip to content

Privacy Policy

What is our privacy policy and why it is important

An image showing a computer protected from attack by a security lock


  • Explanation of what a privacy policy is and why it is important
  • A commitment that the website takes the privacy of its users seriously
  • Disclaimer that the policy may change over time
  • What information is collected


The Type of Information Collected

  1. Personal identification information: This may include name, email address, phone number, and other information that can be used to identify a specific person.

  2. Contact information: This may include email address, mailing address, and phone number, which may be used to contact the user for various purposes (e.g. to send newsletters, to respond to customer service inquiries).

  3. Demographic information: This may include information about the user's age, gender, location, and other demographic characteristics, which may be used to tailor the website's content and services to the user's interests and needs.

  4. Payment information: This may include credit card or other payment information, which may be used to process transactions or subscriptions.

  5. IP address: This is a numerical label assigned to every device connected to the internet, which can be used to identify the location of the device.

  6. Cookies and other tracking technologies: These are small files that are stored on the user's device and contain information about the user's browsing activity. They may be used to track the user's activity on the website and personalize the user's experience.

an image of  the information stored on a computer protected by a padlock
An image of a padlock representing the uage of private data by a website and a computer

The Purpose of collecting Information

There are various purposes for which this website may use the collected information. Some examples include:

  1. To provide services: This website may use the collected information to provide the services that it offers to its users. For example, an online store may use the collected information to process orders and deliver products, or a social media platform may use the collected information to allow users to create profiles and connect with others.

  2. To improve the website: This website may use the collected information to analyze user behaviour and improve the website. This may include analyzing user data to understand how the website is being used, identifying problems or issues with the website, and testing new features.

  3. To send newsletters: This website may use the collected information to send newsletters or other communications to its users. This may include promotional material, updates about the website, or other information that the website believes will be of interest to the user.

  4. To show targeted ads: This website may use the collected information to show targeted ads to its users. This may involve using the collected information to understand the user's interests and show ads that are relevant to those interests.

  5. To fulfil legal obligations: This website may use the collected information to fulfil its legal obligations, such as responding to a legal request or complying with a court order.

Protecting the data

There are various measures that the website takes to protect the security of the collected information:

  1. Encryption: Encryption is a technique that is used to scramble data so that it is unreadable to anyone who does not have the proper decryption key. This website uses encryption to protect the collected information when it is transmitted over the internet or stored on servers.

  2. Secure servers: This website uses secure servers to store the collected information. These servers are protected by physical and technical security measures, such as firewalls, intrusion detection systems, and access controls.

  3. Secure Sockets Layer (SSL) or Transport Layer Security (TLS): These are cryptographic protocols that are used to secure communications over the internet. The website uses SSL to encrypt the collected information when it is transmitted between the website and the user's device.

  4. Two-factor authentication: This is a security measure that requires users to provide two forms of authentication (e.g. a password and a code sent to a phone) in order to access their accounts. This Website uses two-factor authentication to help protect against unauthorized access.

  5. Regular security updates: This website regularly update its security measures to protect against new threats and vulnerabilities. This may include installing software patches, updating security protocols, and training employees on security best practices.

Company news

Lean more about the really important issues facing the world today