This website uses your information in two places – 1/ when you enter the website (in the form of cookies) and 2/ through Google Analytics.
We do not hold any personal information or data offline about you.
Right to be informed
Right to be forgotten
In order for our website to ‘forget’ your visit, you will need to delete the cookies we have installed. Please refer to your browser help files for information on how to action this. In Chrome, for example, go to settings > advanced > clear browsing data and remove all cookies related to our website.
We use Google Analytics to help us build a better website. In it’s most basic form, Google Analytics gives website owners insight in to those pages and posts that perform and those that do not. Google Analytics collect visitor numbers, geographic locations and pages visited. We consider this non-identifiable personal information crucial to our website’s operability and as such, if you agree to visit and use our website, you agree to the GA terms and conditions.
What personal information do we collect from the people that visit our blog, website or app?
When ordering or registering on our site, as appropriate, you may be asked to enter your email address or other details to help you with your experience.
When do we collect information?
We collect information when you enter information on our site.
How do we use your information?
We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
How do we protect your information?
Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.
We use regular Malware Scanning.
Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential.
We implement a variety of security measures when a user enters, submits, or accesses their information to maintain the safety of your personal information.
All transactions are processed through a gateway provider and are not stored or processed on our servers.
Do we use ‘cookies’?
• Understand and save user’s preferences for future visits.
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since all browsers are a little different, look at your browser’s Help Menu to learn the correct way to modify your cookies.
If you turn cookies off, the only user experience to be affected is our newsletter popup; in that it will continue to pop up even if you close it. To avoid this, please enable cookies, which will allow us to recognise who you are (not personally, just the fact that your computer once visited our website), when you decided to close the popup (or what action you took otherwise), and therefore how long until it pops up again. Without cookies, we cannot control this, and your user experience will be diminished.
We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information.
At our discretion we may include or offer third-party products or services on our website. These third-party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites. Examples of third-party products or sites are almost exclusively other author websites for cross-promotions.
Icon / image use & attribution
All commercial images used are property of their respective owners and have been used on this website for editorial purposes only. If you feel we have infringed copyright in any way please get in touch with us and we will investigate.
Slot machine icon designed by Nikita Golubev from www.flaticon.com.
Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users.
We have not enabled Google AdSense on our site.
California Online Privacy Protection Act
According to CalOPPA, we agree to the following:
Users can visit our site anonymously, please just disable cookies.
• Via pop up.
How does our site handle Do Not Track signals?
We honor Do Not Track signals and Do Not Track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
Does our site allow third-party behavioral tracking?
We do not allow third-party behavioral tracking.
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under the age of 13 years old, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States’ consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
We do not specifically market to children under the age of 13 years old.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify you via email – Within 7 business days
We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.