Who we are
Our website address is: https://bluefoxconstruction.co.uk
What personal data do we collect and why do we collect it
Personal data will be collected if the Contacts page on our website is completed and sent to us. The information collected will include your email address as mandatory and may include an attachment or contact number should you wish to include this. Your information is not shared outside this organisation unless requested by law enforcements for legitimate requests.
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
Information collected must include your email address as a way of correspondence. Attachments and further contact information my be included if you provided this to us in your message. Personal information is not shared outside this organisation unless requested by law enforcements for legitimate requests.
We use the following cookies:
Strictly necessary cookies. These are cookies that are required for the operation of our Site. They allow you to navigate back and forth between pages without losing their previous actions from the same session.
Analytical/performance cookies. They allow us to recognise and count the number of visitors and to see how visitors move around our Site when they are using it. This helps us to improve the way our Site works, for example, by ensuring that users are finding what they are looking for easily.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Who we share your data with
How long we retain your data
We retain personal information and data for a period of 1 year after first communication with us. You can request to have your information removed sooner if required.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor contact information may be checked through an automated spam detection service. However this is not shared outside the organisation.
Our contact information
Registered Office: 70 Hensons Lane, Thringstone, Leicestershire, LE67 8LH
Telephone: 01530 432321
Registered Number: 8494290
Information regarding how we protect your data and our data breach procedures can be found below.
How we protect your data
Personal data shall be subject to additional safeguards to ensure this data is processed securely. For example, we work hard to ensure data is encrypted when in transit and storage, and access to this data will be strictly limited to a minimum number of individuals and subject to confidentiality commitments.
We will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Policy. Unfortunately, the transmission of information via the internet is not completely secure. Although we will do our best to protect your personal data, we cannot guarantee the security of your data transmitted to any of our websites; any transmission is at your own risk. Once we have received your information, we will use strict procedures and security features to try to prevent unauthorised access. When possible, encryption is used, both in transit and storage. Access controls within the organisation limit who may access information.
What data breach procedures we have in place
In case of a data breach, our system administrators will go through affected users and notify them of the breach. We will create a fresh backup, scan the site for malware and attempt to identify the breach, removing any associated code and means of access. Subsequently we will look at preventative measures that will prevent a similar breach from happening again, and take action where possible.