Data Protection Declaration
TLDR (too long didn’t read):
- We store the data we need to provide you with the products and services you have asked us for – ask and you shall receive!
- Glitter Goddess’ team has access to your data, in addition to trusted IT good boys.
- We keep your data as long as you are subscribes to My newsletter or until you ask us to forget you. 🙁
- You have the right to manage your communications, change any info we have, request what we have and ask for it to be limited or deleted.
- Do you have to give us your information? If you would like to interact with Glitter Goddess, yes!
- We don’t do automatic profiling
- We don’t talk and tell, what information you share with us, stays with us.
- We store your data in cloud systems for safekeeping
- We protect your diamonds (oops data) by making our staff sign NDAs and training them in what Data Protection actually means.
The Fine Print:
WHAT DATA DO WE STORE?
We store all of the data that we need in order to maintain our relationships with you. This data ranges from records including e-mail address to more extensive records if you have given us any.
We may store your shipping address, for product delivery.
WHY DO WE STORE YOUR DATA?
We store your data in order to provide the services that we offer for free and to fulfill our contractual undertakings with customers and clients.
Personal data is stored to be able to send you information, free samples, products and keep you updated about Glitter Goddess’ offerings.
No recordings or calls are stored.
WHO HAS ACCESS TO YOUR DATA?
Glitter Goddess’ team has access to your data to be able to fulfill our contractual agreements with our customers and clients. The team may include communications and administrative staff.
In addition, outsourcing work on specialist tasks within IT, for example, sometimes requires us to grant consultants access to your data whenever and wherever this is required to fulfill our legal obligations towards official authorities or to develop and improve our services.
HOW LONG IS THE DATA STORED?
We keep the data stored as long as…
– We have a relationship with you as a good boy, customer, client or interested party
– until you unsubscribe or ask me to delete your information
WHAT DATA PROTECTION RIGHTS DO YOU HAVE AS A CUSTOMER?
As a customer, you have the right to…
– manage your e-mail or paid subscription
– correct any and all information I have stored
– request details of the data I have stored regarding you
– request deletion or limitation of your stored data.
If you would like to update, change or amend your data, please let us know by contacting me at this e-mail address: email@example.com
If you would like to be deleted from our database, please contact us here: firstname.lastname@example.org
ARE CUSTOMERS OBLIGED TO PROVIDE THEIR DATA?
Yes, as a customer or client, you must provide the data we need to be able to fulfill our contractual obligations within the various services we offer.
Depending on what you are requesting from us, we will ask you to provide information that may range from your full name, e-mail address and country to more extensive details including full name, telephone number, e-mail address, home and work address.
COOKIES, PROFILING AND AUTOMATION
We do not perform any form of automated profiling. Sometimes we will check what topics a client may be interested in based on his/her previous choices of classes or products.
We do not share your data or sell it to any external agencies. Checks on prerequisites for advanced classes are processed automatically.
WHERE DO WE STORE YOUR DATA?
We use multiple systems for storing your data to fulfill our contractual agreements with customers and clients.
In general, information is stored in cloud services and on computers in the country of my residence, the United States of America.
HOW DO WE PROTECT YOUR DATA?
Glitter Goddess and Glitter Goddess’ staff, contractors and the external agencies with whom we work have all signed NDAs (Non-Disclosure Agreements). They have also been trained in data protection.
The stored data can only be accessed through security-protected entry points by users with permission to access the information.