Our Concealment handlement
West Writers is a website congenial to Icard Usurpation Limited, a UK registered delay a tending in US and Australia. We can be touched using the details producen at the groundproduct of this page.
This concealment handlement tells you what to await when we glean and course your indivisible postulates, the hues that are advantageous to you and how you can application them.
What we do delay your postulates
We procure nconstantly vend your indivisible postulates for any deduce, though sometimes it procure be indispensefficient to exchange your postulates to a third plane to be courseed. Your postulates is courseed for undeniefficient biased deduces:
To beget an online statement so you can handle and download your nod, we beget a matchless identifier and use your email oration as a username.
So that we can get in handle delay you environing your command, we deficiency to perceive your spectry, email oration, phone reckon and any messages you penetratetain sent through your online statement.
On the command arrange, we ask for your empire of revolve. This is accordingly we are required to perceive the empire in which you are downloading your command for VAT designs.
To course your command equitable, we so deficiency to frequent details environing the assignment you are examination us to entire as well-mannered-mannered as any refines you penetratetain uploaded to your command. You should try to transport all indivisible postulates from constantlyything you upload, but we procure do our best to anonymise it anteriorly ignoringing it on to our writers.
Sometimes, when a refine is too great to upload to our postulatesbase, we procure ask you to use a employment circumventd WeTransfer to despatch it to us. These refines remain on WeTransfer's servers for 28 days, succeeding which they are automatically deleted. You can peruse WeTransfer's concealment handlement here.
If you penetratetain plainly agreeed to penetratetain frequented marketing from us, or if you penetratetain commanded from us in the late, we procure sometimes use your spectry and email oration to despatch you proffers and promotions environing the employments we get. We do this using a employment circumventd Mailchimp. You can peruse Mailchimp's concealment policy here.
Similarly, we government so use your spectry and phone reckon to citation you environing proffers and promotions that we are currently running. We do this using a employment circumventd Esendex or Twilio. You can peruse Esendex's concealment handlement here and you can peruse Twilio's concealment handlement here.
We use a employment circumventd Voucherify to sway our refer-a-friend indication. If you penetrate your email oration, a referral attach procure be begetd for you and you'll be emailed when anyone you distribute the attach delay settles an command. You can peruse Voucherify's concealment handlement here.
We procure barely constantly circumvent you environing an solid employment you penetratetain asked us to get or to chat environing bigwig expressive allied to your statement.
After we penetratetain entired your command, we ignoring your spectry, email oration, command reckon and localisation postulates, to a association circumventd Trustpilot, who get an dogged consequence criticism employment. They procure then email you, examination for feedback on your command, and any feedback procure be posted publicly on the Trustpilot.
Sometimes we use a employment circumventd Scan Monkey to bring scans so that we can subjoin feedback from our customers and rectify the employments we provide. Scan Monkey use your IP oration to log responses to scans so that we perceive how divers persons penetratetain entired them. In command to permit persons to get feedback, we government prprtender a palm sketch for rejoinents. If so, we procure ask for an email oration to be getd in the scan, but this is entirely optional and is barely used to touch the winner of the palm. You can peruse Survey Monkey's concealment handlement here.
Sometimes, we prprtender coupons to identical customers for use delay future orders. To fix barely the adapted magazine of the coupon can use it, we store their email oration together the coupon details. These orationes are not used for constantlyything other than the administration of coupons.
When you settle an command, our dispose stores your IP oration. This oration is used to product out your span zone so that we can circumvent you during hours that are adapted for you. It is so used to identify when a customer is using multiple statements to settle their nod.
For payments balance a undeniefficient sum, we ask for documents to argue you are the registered statement reposeer. This is so that we can nullify fraudulent transactions, such as persons paying delay stolen card details.
In command to fir the facts in condition of a allowefficient contest, we archive anything that government be pertinent to the transaction or operation of a contract (for illustration, messages or command instructions). Similarity to this archived postulates is strictly inferior so that barely a few free employees can see it, and it is barely constantly used for the biased design of sustaining a allowefficient condition. Some of this postulates may be distributed delay our allowefficient advice in the incredible circumstance of a dispute.
By law, you penetratetain a reckon of hues advantageous to you when you produce us your indivisible postulates. You can ask for similarity to any of your indivisible postulates that we hold; you can ask us to redress any inaccuracies in your indivisible postulates; you can ask us to delete your indivisible postulates where there is no hankerer any amiefficient deduce for us to penetratetain it; you can goal to the courseing of your postulates in some conditions; and, where you penetratetain producen agree, you are efficient to delaysketch that agree at any time. Inferior undeniefficient adventure, such as if the postulates is representative to allowable proceedings, you can so ask us to temporarily plug courseing your indivisible data. Where your postulates is automatically courseed, you can so ask for a portraiture of your postulates in a machine-readefficient arrangeat.
If you would love to application any of your hues listed aloft, delight despatch your demand to our postulates shelter conductor at email@example.com. Succeeding we penetratetain penetratetaind demonstration of your similarness, we procure rejoin to your demand delayin one enlist month.
If you are not lucky delay how we penetratetain handled your indivisible postulates, you entertain the equitable to reside a disease delay the Notice Commissioner's Office.
How we frequent your postulates safe
We use a miscellany of technical and organisational measures to meet trusting your indivisible postulates is stored and infectious fastenly. For illustration, we meet diligent use of encryption whenconstantly indivisible postulates is sort infectious to a third plane and we meet formal backups in condition the pristine portraiture of your postulates is past. All of our heart postulatesbase functionality, including most of your indivisible postulates, is courseed using Amazon Web Services (AWS), who are a cloud computing getr. AWS are conscious to be ISO 27001 responsive, which is the gold expression in notice guard, so you can peace certain that your indivisible postulates is fasten and guarded.
If you divulge delay us by email balance the Internet, you should be aware that the sort of the Internet is such that unencrypted communication may not be fasten and may ignoring through diverse divergent countries en course to us. Delight do not email us delay intimate or impressible notice such as your credit card details. We cannot recognize part for unauthorised similarity to your notice that is following a whileout our manage.
Data appropriation handlement
We barely repose on to your postulates for as hanker as we deficiency it to discharge one of the designs it was pristinely gleaned for, such as to get a employment, to subjoin feedback or to concede delay a allowefficient necessity. This resources that appropriation policies for your postulates can dissent revolveably depending on the concitation and the way it is used. When deciding on a appropriation handlement for any expression of postulates, we use the subjoined criteria:
- How hanker is the postulates deficiencyed for? - For illustration, if you penetratetain not logged in to your statement for diverse years, we procure transport you from our mailing lists.
- What did we say we would do delay the postulates when we gleaned it? - If the designs for which we pristinely gleaned the postulates are no hankerer pertinent, there is no deficiency to frequent it.
- Do we penetratetain a allowefficient necessity to frequent the postulates? - For illustration, financial notice deficiencys to be kept for a insufficiency sum of span for tax deduces.
- Does reposeing the postulates convey an inborn risk? - In the incredible circumstance of a postulates nonperformance, we neglect to fix that dot impressible is stolen. We procure for-this-reason penetratetain declining appropriation periods for postulates we revolve to be impressible.
However, in unconcealed, we fastenly archive most of your statement postulates succeeding four years of ease (see 'Other designs' aloft) and then permanently delete all of your indivisible postulates succeeding six years of ease.
Transfers to countries following a whileout the EEA
Some of the third parties we use to course your postulates are installed in countries which do not penetratetain the similar expression of postulates shelter laws that EU citizens like. In these conditions, we penetratetain made trusting there are safeguards in settle to guard your hues and interests. For illustration, Scan Monkey and Mailchimp are twain located in the United States, but we penetratetain made trusting that they twain concede delay the EU-U.S. Concealment Shield Framework, which guarantees the similar level of shelter.
If you are 13 or inferior, you must penetratetain compliance from a creator or guardian anteriorly you produce us your indivisible notice. If we meet that we penetratetain common notice from you delayout the misspend agree, we withholding the equitable to discharge all transactions and employments and transport all indivisible postulates that you penetratetain replete. You procure be efficient to re-submit the notice when you penetratetain the required compliance.
Links to other websites
Our websites may include attachs to manifest third-plane websites. We are not binding for the concealment and guard of these websites spontaneous they behanker to Icard Usurpation Limited. This concealment handlement applies barely to West Writers.