effective as of 4th of October 2018
1.3 Dorothy Powell d/b/a Devices For Home has a position of a ‘Controller’ as defined in EU GDPR and he shall be responsible for, and be able to demonstrate compliance with, the principles relating to processing of personal data. We can be contacted by sending an e-mail to [email protected]
2.1 We may obtain some of your personal Information in order to provide our Services. The Information we collect is necessary to provide our Services, and we shall not collect any Information which is not required by the nature of our Services. We may collect some of the following personal Information:
2.2 We will collect your email address on a basis of your consent and in the interest of providing the Services. We will collect your email address in the following cases:
– When you contact us. We will collect your email address whenever you contact us through our email [email protected] Whenever we collect your email address this way, we will only use it in order to respond to your inquiry.
2.3 We integrate security systems on our Site to prevent malicious attempts and exploits of the Site. We scan IP address and ban IP addresses that show malicious signs such as too many password failures, seeking exploits and similar. We process this information in the interest of protecting the integrity of the Site and of the databases connected with it, including database of Information obtained from Users. We use your IP address on a basis of a legitimate interest to maintain the integrity and safety of our databases.
2.4 Some Services will not be available to you if you do not provide requested Information. We may keep records of any questions, complaints or compliments made by you and the response if any. Whenever you contact us, we shall collect any information which you chose to provide. We shall store and use this information only for the purpose of responding to your inquiries. Information contained within the inquiry, free from any personally identifiable Information, will be stored on our servers for the purpose of improving our Services and providing the best customer support possible.
2.6 We have implemented security procedures and measures in order to ensure appropriate protection of the Information we process, against any misuse, unauthorized access, disclosure or modification. We will remove any Information about you upon your request no later than twenty four (24) hours after the request has been made.
2.7 We acknowledge that the safety of your Information is one of the highest priorities and therefore only authorized processors have access to your information. Although we take all appropriate measures in respect to keeping your information secure, you understand that no data security measures in the world can offer 100% protection. If we ever find or suspect a personal data breach we will without delay, within seventy-two (72) hours after becoming aware of it, notify the appropriate supervisory authority about the breach and Users where necessary.
2.8 The processing of the information is being performed automatically, without human intervention. However, whenever you contact us through email, the Information within the email will be handled and processed by a real human in order to provide you with the answer to the email.
2.9 Users may request access to, modification and erasure of personal Information and the exercise of the right to object. Such requests are submitted to [email protected]
3.1 The Site collects a series of general data and information when a User or automated system calls up the Site. This general data and information are stored in the server log files. Collected may be (1) the software types and versions used, (2) the operating system used by the accessing system, (3) the date and time of access to the Services, (4) the Internet service provider of the accessing system, and (5) any other similar data and information that may be used in the event of attacks on our information technology systems.
3.2 We collect this information for breach investigation purposes. When using this information, we do not draw any conclusions about the User. Rather, this information is needed to (1) deliver the content of our Site correctly, (2) optimize the content of our Site as well as its advertisement, (3) ensure the long-term viability of our information technology systems and website technology, and (4) provide law enforcement authorities with the information necessary for criminal prosecution in case of a cyber-attack. The anonymous data of the server log files are stored separately from all personal data provided by a data subject.
4.1 Information will be stored on our secure servers located in the USA. Hosted servers are controlled and maintained in accordance with sufficient privacy safeguards. We may store or transfer Information to servers located in countries deemed adequate by the European Commission, or in countries which European Commission has not deemed inadequate, provided that such countries implement appropriate and suitable safeguards regarding the security of personal information.
4.2 Information is stored on the servers only for the duration necessary for providing the Services and maintaining the integrity of our databases. We will maintain records of processing activities for the purpose of demonstrating compliance with EU GDPR.
6.1 The Site or e-mails may contain links to other external websites that do not fall under our domain. We are not responsible for the privacy practices or the content of such external websites. If you choose to follow such links to external websites, you do so at your risk.
6.2 We may use third party services like Google Analytics and others. Cookies from such services are used to collect data for statistical reports.
7.1 If you subscribe to receive emails from us we will store your Information until you unsubscribe or retract your consent.
8.1 You may request to:
8.2 These rights might be limited if they are subject to Follow’s own legitimate interests and regulatory requirements.
9.2 The Site may include social media features in the form of widgets (‘like’, ‘share’, ‘tweet’ buttons and similar) which function like separate programs working within the Site. Your interaction with these widgets is governed by policies of a third-party providing them.