Terms & Conditions
Protection of data is our priority
What information we collect and how we use it
Among other reasons, the publisher collects and retains information for the purposes of conducting market research, surveys and advertisement mailings. Examples of information collected by the publisher are: Contact information (such as name, address, electricity bill amount, e-mail address and telephone number in a business capacity)
How we protect your information
The publisher makes all commercially reasonable efforts to ensure that information collected from you is protected against loss and unauthorized access. Access to your information is restricted to selected employees or representatives. In addition, the publisher employs generally accepted information security techniques, such as firewalls, access control procedures and cryptography, to protect information against loss and unauthorized access. Client records are regarded as confidential and therefore will not be divulged to any third party, other than supplier(s) and] if legally required to do so to the appropriate authorities.
Personal data covers all types of information which can be used to identify a person, including, but not limited to, first and last name, age, gender, private address or other physical address, mobile phone number, e-mail address or other contact information, regardless of whether they relate to the person’s private residence or work place. We process data about you to provide a better service.
Retention of your information
The publisher retains your information for as long as necessary to fulfill the purpose for which it was collected, to comply with applicable laws and for the duration and extent of our business practice.
We are committed to protecting your privacy. Authorized employees within the company on a need-to-know basis only use any information collected from individual customers. We constantly review our systems and data to ensure the best possible service to our customers. The applicable law has created specific offences for unauthorized actions against computer systems and data. We will investigate any such actions with a view to prosecuting and/or taking civil proceedings to recover damages against those responsible