- Key Privacy Questions
- South African Statutes
- International Statutes & Best Practice
- Contacting Us
How do we use your information?
- We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features, and we may use this information in the following ways:
- To personalize user’s experience and to allow us to deliver the type of content and product offerings in which you are most interested.
- To allow us to better service you in responding to your customer service requests.
- To administer a contest, promotion, survey or other site feature.
- To quickly process your transactions.
- To ask for ratings and reviews of services or products.
- To follow up with them after correspondence (live chat, email or phone inquiries).
How do we protect visitor information?
- Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.
- We use Shield Security, as evidenced by the logo in the left bottom of this page; Shield is the most powerful WordPress protection system available.
Designed for maximum compatibility with WordPress sites, it provides a super-simple platform for both beginner and advanced users. Your Personal information is contained behind secured networks and is only accessible by a limited number of trusted persons who have special access rights to such systems (called Administrators), who have signed Confidentiality and Non Disclosure agreements.
- In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
- We implement a variety of security measures when a user places an order, enters, submits, or accesses their information, to maintain the safety of your personal information. All transactions are processed through an equitable gateway provider and are not stored or processed on our servers.
How does our site handle ‘Do Not Track’ signals?
- We honor ‘do not track’ signals and do not track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
Does our site allow third-party behavioral tracking?
- It is important to note that we do not allow third-party behavioral tracking
Protection of Personal Information Act
Act 4 of 2013 (“POPIA”) – POPIA aims to:
- promote the protection of personal information processed by public and private bodies,
- introduce certain conditions so as to establish minimum requirements for the processing of personal information,
- provide for the establishment of an Information Regulator to exercise certain powers and to perform certain duties and functions in terms of this Act and the Promotion of Access to Information Act, 2000,
- provide for the issuing of codes of conduct,
- provide for the rights of persons regarding unsolicited electronic communications and automated decision making,
- regulate the flow of personal information across the borders of the Republic, and
- provide for matters connected therewith.
Consumer Protection Act
Act no 68 of 2008 (“CPA”) – Under the CPA, your attention is drawn to the following clauses;
- which limit our risk and liability to you and other Third Parties – Clauses 6, 11 and 13
- when you assume certain risk and liabilities – Clauses 6, 10, 11, 13 and 16
- when you acknowledge that you are aware of certain facts relating to the agreement – Clauses 3, 4, 5, 6, 7, 9, 10, 11, 13, 15.2, 15.3 and 16
Digital Millennium Copyright Act (DMCA)
- The Digital Millennium Copyright Act is part of US Copyright Law. It addresses penalties for copyright infringement found on the Internet.
- This act protects content creators by “establishing procedures for proper notification” to Online Service Providers (OSPs) when copyright infringement is identified online.
- Online Copyright Infringement Liability Limitation Act (OCILLA), Title II is part of the DMCA as Section 512 to the Copyright Act and creates a conditional safe harbour to liability for copyright infringement by online service providers. These procedures allow proper DMCA Takedown Notices to be filed by the owner of this website or DMCA.com, as their designated agent, to an OSP in case infringed material has been detected on their servers.
Refer to our Copyright Notice, under the auspices of the Digital Millennium Copyright Act (DMCA).
- We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information unless we provide users with advance notice.
- This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or serving our users, so long as those parties agree to keep this information confidential.
- We may also release information when it’s release is appropriate to comply with the law, enforce our site policies, or protect ours or others’ rights, property or safety. However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.
California Online Privacy Protection Act (CalOPPA)
According to CalOPPA we agree to the following:
- Users are able to change their personal information by logging in to their account
Children Online Privacy Protection Act (COPPA)
- When it comes to the collection of personal information from children under 13, the COPPA Act puts parents in control.
- The Federal Trade Commission, the nation’s consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
- We do not specifically market to children under 13.
Fair Information Practices
- The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe.
- Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information. In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
- We will notify the users via email within 7 business days
- We also agree to the Individual Redress Principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law.
- This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.
- The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to:
- Send information, respond to inquiries, and/or other requests or questions.
- Market to our mailing list or continue to send emails to our clients after the original transaction has occurred.
To be in accordance with CAN-SPAM we agree to the following:
- NOT use false or misleading subjects or email addresses.
- Identify the message as an advertisement in some reasonable way.
- Include the physical address of our business or site headquarters.
- Monitor third-party email marketing services for compliance, if one is used.
- Honor opt-out/unsubscribe requests quickly.
- Allow users to unsubscribe by using the link at the bottom of each email.
If at any time you would like to unsubscribe from receiving future emails, follow the ‘Unsubscribe’ link at the bottom of each email and we will promptly remove you from ALL correspondence.
- PostNet Suite 81, Private Bag X068, Vanderbijlpark 1900, Gauteng, South Africa
- Email: firstname.lastname@example.org
Last Edited on 2022-12-01