Information that is gathered from visitors
In common with other websites, log files are stored on the web server saving details such as the visitor’s IP address, browser type, referring page and time of visit. Cookies may be used to remember visitor preferences when interacting with the website.
Where registration is required, the visitor’s email and a username will be stored on the server.
How the Information is used
The information is used to enhance the visitor’s experience when using the website to display personalised content and possibly advertising. E-mail addresses will not be sold, rented or leased to third parties. E-mail may be sent to inform you of news of our services or offers by us or our affiliates.
If you have subscribed to one of our services, you may unsubscribe by following the instructions which are included in e-mail that you receive.
You may be able to block cookies via your browser settings but this may prevent you from access to certain features of the website.
General Data Protection Regulation (GDPR) Compliance
We use Google Analytics to record visitors and pages visited on the website. Data recorded includes:
URL – the URL of the page the user is viewing
Title – the title of the page the user is viewing
Browser name – the browser the user is using
Viewport or Viewing pane – the size of the browser window
Screen resolution – the resolution of the user’s screen
Java enabled – whether or not the user has Java enabled
Location – this is derived from the IP address where the hit originated. The IP address itself is not available in Google Analytics as it is personally identifiable information (PII) which violates the terms of Google Analytics.
Language – derived from the language settings of the browser
We use Secure Sockets Layer (SSL). SSL provides a secure communication channel between your device’s browser and our web server. This turns a website’s address from HTTP to HTTPS, the ‘S’ standing for ‘secure’. This is particularly important when submitting your details via out contact form. Anyone intercepting this communication will not be able to decrypt the data between the two devices.