Privacy Policy

This privacy policy has been compiled to better serve those who are concerned with how their ‘Personally Identifiable Information’ (PII) is being used both offline and online. PII, as described in US and EU privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information.

What personal information do we collect from our customers and how will it be used?

We collect information that is used to secure your booking which will include your name, telephone number, contact and billing address, contact and billing email address.

This information will be used to keep you informed about your booking status but will not be passed on to third parties.

This information will be kept on file to speed up future booking requests and for auditing purposes. We will not use your email or physical address for marketing purposes without your express permission.

Your personal information is only accessible by a limited number of persons who have special access rights to all of our systems and are required to keep the information confidential.

What Personal Information Do We Collect From Our Customers

We collect information such as full name, telephone number, email address and home address.

What Personal Information Do We Collect From The People That Visit Our Website?

When filling in our contact form you will be asked to enter your name, email address or other details to help us with your enquiry.

How do we protect your information?

We only collate information regarding to your booking. We never ask for credit card numbers on this website and we use regular Malware Scanning and firewall blocking of our website.

Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems and are required to keep the information confidential.