What personal data we collect and why we collect it
We take security and privacy seriously. We will endeavour to take all reasonable steps to keep your personal and financial data secure once it has been transferred to our systems. We adopt appropriate, industry standard data collection, storage and processing practices and security measures to protect against unauthorised access, alteration, disclosure or destruction.
We collect and use your personal data for a variety of reasons. We need some data to enter into and perform our sales obligations with you. If you fail to provide such data we will be unable to provide our service to you.
Other information we collect because we have legitimate business interests, for example, in:
– Ensuring that we can onboard you as a customer and manage your account
– Understanding how our customers use our products, services and website
– Understanding and responding to customer feedback
– Researching and analysing the services our customers want
– Improving our product
– In some circumstances we may process your personal data because it is required for compliance with a legal or regulatory obligation
We utilise data processors such as Klaviyo CRM as communication distribution tool. The data stored in this apps is fully secured and never shared with any other businesses or individuals outside of the company.
What are your rights?
Right to access your personal data: You can ask us to confirm if we are processing your personal data and you may request a copy of your personal data by contacting us (firstname.lastname@example.org).
Right to change or withdraw your consent: Where you have given us consent to make use of your personal data for any of the purposes outlined in this policy, you may withdraw that consent by contacting us using the details located at the bottom of this policy. If you wish to change your contact preferences or no longer wish to be contacted for marketing purposes, get in touch (email@example.com).
Right to Rectification: You may ask us to update out of date or inaccurate information we hold about you. To do so, please get in touch (firstname.lastname@example.org).
Right to Erasure: In certain circumstances you may ask us to erase your Personal Data. If you would like us to erase the personal data we hold about you, please get in touch (email@example.com), specifying why you would like us to do so.
Right to Data Portability: In certain circumstances you may ask us to provide you with the personal data that we hold about you in a structured, commonly used, machine readable form, or ask for us to send such personal data to another data controller. Contact us (firstname.lastname@example.org) and explain your request and we will carry out the request in a timely manner.
Right to object: In certain circumstances you may object to our processing of your personal data. Please get in touch (email@example.com).
Right to restrict processing: You can ask us to restrict the processing of personal data we hold about you in certain circumstances. Please get in touch (firstname.lastname@example.org).
Make a complaint: You may make a complaint about our data processing activities to a supervisory authority. In the UK this is the Information Commissioner’s Office (ICO). Further details can be found on their website at https://ico.org.uk
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
All contact form submissions are stored on a secure server and the contents of the contact messaged are not shared with any company or person outside of Daxx & Roxane.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
We use the ‘Facebook Pixel’ and ‘Google Analytics’ to understand the ways in which customers and site visitors move and use our website. This information is never shared with anyone or any business outside Daxx & Roxane except for Facebook and Google Services.
Who we share your data with
We do not share your personal information with any third parties. Your personal information is only used strictly for the business pursuits of Daxx & Roxane.
How long we retain your data
We only store your data for as long as necessary for the purposes of processing set out in this policy. When the business to customer relationship ends we will hold on to any business records for the appropriate amount of time for us fulfil our legal obligation to do so. After this time information will be destroyed and erased by secure means.
If you are signed up to marketing communications and would like to unsubscribe, please email email@example.com
To ensure the integrity of our systems and your data, we utilise various technologies to continually take secure, encrypted backups. Data remains archived within these backups until legally obligated to be deleted.
You can request a copy of your data at any time.
You can also ask us for a copy of your personal data that we hold by contacting firstname.lastname@example.org
What rights you have over your data
You can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
How we protect your data
We take every step to protect your data. We use trusted software and app, secure server systems and industry standard security software. No information is ever shared to external devices such as USB keys or portable drives. We never share your information with any third parties for any reason.
What data breach procedures we have in place
If a data breach occurs we will officially inform the ICO via the formal channels, and we shall inform every customer that the breach has potentially affected as soon as the breach is found. Steps will be made instantly to ascertain the cause of the breach and how it is to be remedied.