1. What personally identifiable information is being collected from you through the website, how it is used and with whom it is shared
2. What choices are available to you regarding the use of your data.
3. The security procedures in place to protect the misuse of your information.
4. How you can correct any inaccuracies in the information.
Information Collection, Use, and Sharing
Indian Lakes Hotel are the sole owners of the information collected on this website. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell or rent this information to anyone.
We will only use your information to respond to you regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than necessary to fulfill your request, e.g. to ship an order.
Unless you ask us not to, we may contact you via email in the future to tell you about specials, new products or services, or changes to this policy.
Your Access to and Control over Information
You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:
See what data we have about you, if any
Change/correct any data we have about you
Have us delete any data we have about you
Express any concern you have about our use of your data
We take precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline. Whenever we collect sensitive information (such as credit card data) that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a closed lock icon at the bottom of your web browser, or looking for "https" at the beginning of the address of the webpage. While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.
e Beliefs Regarding User Privacy And Data Protection
User privacy and data protection are human rights
We have a duty of care to the people within our data
Data is a liability, it should only be collected and processed when absolutely necessary
We loathe spam as much as you do!
We will never sell, rent or otherwise distribute or make public your personal information
Along with our business and internal computer systems, this website is designed to comply with the following national and international legislation with regards to data protection and user privacy:
Personal Information That This Website Collects And Why We Collect It
This website collects and uses personal information for the following reasons:
Site visitation tracking
Like most websites, this site uses Google Analytics (GA) to track user interaction. We use this data to determine the number of people using our site, to better understand how they find and use our web pages and to see their journey through the website.
Although GA records data such as your geographical location, device, internet browser and operating system, none of this information personally identifies you to us. GA also records your computer's IP address, which could be used to personally identify you, but Google does not grant us access to this. We consider Google to be a third party data processor (see section below).
Disabling cookies on your internet browser will stop GA from tracking any part of your visit to pages within this website.
In addition to Google Analytics, this website may collect information (held in the public domain) attributed to the IP address of the computer or device that is being used to access it.
Contact Forms and Email Links
Should you choose to contact us using the contact form on our Contact us page, none of the data that you supply will be stored by this website or passed to / be processed by any of the third party data processors defined in section below. Instead the data will be collated into an email and sent to us over the Simple Mail Transfer Protocol (SMTP). Our SMTP servers are protected by TLS (sometimes known as SSL) meaning that the email content is encrypted before being sent across the internet. The email content is then decrypted by our local computers and devices.
Third Party Data Processors
We use a number of third parties to process personal data on our behalf. These third parties have been carefully chosen and all of them comply with the legislation set out in section above.
Essential cookies and similar technologies
These are vital for the running of our services on our websites and apps. Without the use of these cookies parts of our websites would not function. For example, session cookies allows a navigation experience that is consistent and optimal to user's network speed and choice of device.
2. Analytics cookies and similar technologies
These collect information about your use of our websites and apps, and enable us to improve the way it works. For example, analytics cookies show us which are the most frequently visited pages. They also help identify any difficulties you have accessing our services, so we can fix any problems. Additionally these cookies allow us to see overall patterns of usage at an aggregated level.
3. Tracking, advertising cookies and similar technologies
We use these types of technologies to provide advertisements that are more relevant to your interests. This can be done by delivering online adverts based your previous web browsing activity. Cookies are placed on your browser which will remember the websites you have visited. Advertising based on what you have been looking at is then displayed to you when you visit websites who use the same advertising networks.
We will report any unlawful data breach of this website's database or the database(s) of any of our third party data processors to any and all relevant persons and authorities within 72 hours of the breach if it is apparent that personal data stored in an identifiable manner has been stolen.