Privacy Policy
This Privacy Policy outlines how Brilydan collects, processes, and protects any personal information you provide while using our website. We are committed to safeguarding your privacy and ensuring that your personal data is handled securely and in compliance with the
UK General Data Protection Regulation (UK GDPR) and Data Protection Act 2018.
By using our website, you agree to the collection and use of your information in accordance with this policy. We may update this policy from time to time, and we encourage you to review this page regularly for any changes.
Information We Collect
We may collect and process the following types of personal data:
● Identity Data – Name
● Contact Data – Email address, phone number, postal address
● Technical Data – IP address, browser type, operating system, device information
● Usage Data – Information about how you use our website, including page visits and interactions
● Marketing and Communication Data – Your preferences in receiving marketing materials from us
How We Use Your Information
We collect and process your personal data for the following purposes:
- To provide, manage, and improve our services
- To respond to enquiries and provide customer support
- To personalise your user experience on our website
- To send updates, promotional offers, or newsletters if you have opted in
- To comply with legal obligations and regulatory requirements
- To ensure website security and prevent fraudulent activities
We will only process your personal data where we have a legal basis to do so, including contractual necessity, legitimate interest, legal obligation, or with your consent.
Data Retention
We retain your personal data only for as long as necessary to fulfil the purposes for which it was collected, including legal, accounting, or reporting requirements. Once the data is no longer required, we securely delete or anonymise it.
Data Security
We have implemented appropriate technical and organisational security measures to protect your data from unauthorised access, loss, misuse, or alteration. These measures include encrypted storage, secure access controls, and regular security assessments.