loading

Loading...

Privacy Policy

Who we are

This website is known as THEVIVIDCONSULTANCY.COM The domain and web site is owned and operated by Caroline Rawlinson.

What personal data we collect and why we collect it

Contact forms

If you contact us through an email address or a form on the website, we may if required, reply to you using the email you provide. We may also save the details of your enquiry for further correspondence if required or keep it on file for ongoing reference for work.

Photographs and Testimonials

All photographs and testimonials pertaining to my work have been uploaded and displayed with the express permission of the individuals. Permission is granted for the use of public display on this website only THEVIVIDCONSULTANCY.COM. We do not grant the reuse, redistribution or refactoring of this content without permission from the website administrators, or the original suppliers of this content.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracing your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

We use cookies to track website statistics, such as number of visitors, the type of operating system and of the web browser used to browse the website, time spent on the website, visited sub-pages, etc. For this purpose we use Google Analytics. In this regard, collected information is completely anonymous and does not allow your identification. For this purpose, Google LLC cookies are used for the Google Analytics service.

The use of Google Analytics services involves the implementation of the tracking code provided by Google into our website’s code This code is based on cookies but may also use other tracking technologies.

Details related to the use of information collected by Google as part of our use of Google Analytics as part of our site can be found here: https://policies.google.com/privacy

Your consent to accepting cookies, may show an option to remove third party tracking such as google analytics if it is used.

Who we share your data with

We do not share any data with other third parties without your explicit consent. The only exception to this may be if required under UK law to hand over data for the purpose of criminal investigation.

How long we retain your data

If you leave a comment, the comment and its meta-data are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

What rights you have over your data

If you have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

All data entered on this website is stored on a server located within the UK and as such is covered by UK and European law, rights and privacy controls. Visitor comments may be checked through an automated spam detection service.

Your contact information

Any identifiable information we keep about you, such as name, email address or telephone numbers are kept only on our office computers. We do not distribute this information through our network. We do not share, sell exchange or in any way reveal this data to any third parties.

Additional information

Any additional information you supply us is fully under your control. You have the right to withhold all data that you deem unsuitable for electronic transfer, either by phone, email, text, video, sound file or other means.

How we protect your data

All local computers and network devices are protected behind a firewall, anti virus software and regular software updates. We use strong multi character password encryption to access any data held on file. Similarly all websites administration areas are accessed through strong multi character usernames and passwords.

What data breach procedures we have in place

In the event of a data breach, we will inform the appropriate authorities both legal  and technical in order to locate and limit potential damages. If usernames and passwords have been compromised we will automatically generate new strings and implement them immediately.

Industry regulatory disclosure requirements

We will adhere as closely as possible to all obligatory industry disclosure requirements.

 

Last updated November, 2018