Some of the services on this website allow you to send us an email. We will use the information you provide, such as email address or phone number, only to respond to your inquiry. Keep in mind that email transmissions are not encrypted by default, so we suggest you do not send sensitive information such as credit card numbers, or bank account information via such contact forms.
If such information is required, it will be via a web page that clearly states the page and its transmission of information is secure and encrypted. All electronic messages received from visitors are deleted when no longer needed.
Personal Data shall be processed and stored for as long as required by the purpose they have been collected for.
Personal Data collected for purposes related to the performance of a contract between the Owner and the User shall be retained until such contract has been fully performed.
Personal Data collected for the purposes of the Owner’s legitimate interests shall be retained as long as needed to full fill such purposes. Users may find specific information regarding the legitimate interests pursued by the Owner within the relevant sections of this document or by contacting the Owner.
The Owner may be allowed to retain Personal Data for a longer period whenever the User has given consent to such processing, as long as such consent is not withdrawn. Furthermore, the Owner may be obliged to retain Personal Data for a longer period whenever required to do so for the performance of a legal obligation or upon order of an authority.
Once the retention period expires, Personal Data shall be deleted. Therefore, the right to access, the right to erasure, the right to rectification and the right to data portability cannot be enforced after expiration of the retention period.
Black Diamond Weddings takes the security of your personal information very seriously. We take many precautions to ensure that the information we collect is secure and inaccessible by anyone outside of our organisation. These precautions include advanced access controls to limit access to that information to only internal personnel who require access to that information. We also use numerous security technologies to protect all data stored on our servers and related systems. Our security measures are regularly upgraded and tested to ensure they are effective.
We take the following specific steps to protect your information:
(1) Use internal access controls so only limited personnel have access to your information.
(2) Anyone with access to user information is trained on all relevant security and compliance policies.
(3) Servers that store visitor information are regularly backed up to protect against loss.
(4) All information is secured through modern security technologies like secure socket layer (SSL), encryption, firewalls, and secure passwords.
All access safeguards described above are in place to prevent unauthorised access by outsiders to information stored on or transmitted by our systems.
You can do the following at any time by contacting us via the email address or phone number given on our website:
(1) Ask for a list of personal information we have about you, if any.
(2) Request a change, correction, or deletion of your personal information.