Privacy Policy

Our commitment to protecting your details


Our privacy commitment

We will make every effort to protect your privacy by adopting a consistently high level of site security and adhering to strict company policies on how we store and use personal information. This privacy policy may be updated from time to time.

If we make any changes to our privacy policy, we will post the revisions on our site.

  1. The information we collect and how we use it

    1. Users

      To access the sites, you will need to register with us. To access restricted parts of the websites we will need to obtain other details from you. All mandatory information is as indicated.

      Once you start using the site, we may track and keep a record of the pages you visit. We collect this data from groups of users to get a sense of how people are using our site and which topics are most popular. This helps us improve what we offer on our sites.

      Unless you have requested otherwise upon registration, from time to time we may use your personal data to email you with other information that may be of interest to you. If later do not wish to receive such other information you will be given the opportunity to opt out of receipt of such future email communications at any time.

      We feature a few sections where you can submit additional information. Participation is entirely voluntary but certain information in mandatory, as indicated.

    2. IP addresses

      Each time you use the internet, your Internet service provider assigns your computer a number called an IP address. This number may be the same or different each time you go online. The websites use visitors' IP addresses to gather general data about site traffic. Each time your computer requests information from our site, we log your IP address on our server. We cannot identify you from your IP address.

    3. To whom will we disclose information about you?

      We will not disclose your personal data to any third party other than:

      • (i) in the case of Badge Collectors Circle only:
      • (ii) those who provide IT and support services to us and only where bound by duties of confidentiality
    4. Can you change the information we hold about you?

      Where your details become outdated you can alter them in your Account Settings.

  2. How personal information stored and protected

    Your personal data is stored in our databases which is only available to the web administrators and selected authorised people on a password protected basis.

    1. Security

      We understand that the security of your information is important to you. We also understand that our success as a publisher on the web relies on our ability to communicate with you in a secure manner. We adhere to the highest standards of decency, fairness, and integrity in our operations. We use several measures to authenticate your identity when you visit our site. We also take steps to protect your information as it travels the internet, and to make sure all information is as secure as possible against unauthorised access and use (for example, by hackers). We review our security measures regularly.

      Despite our best efforts, and the best efforts of other firms, "perfect security" does not exist on the internet, or anywhere else.

    2. Authentication

      You should not share your user name and password with other people. If you think you might lose or forget these identifiers, write them down and keep each in a separate place.

    3. Email

      Any email between you and Bade Collectors Circle is not encrypted. It will be stored securely within our organisation’s firewall (see below).

    4. Data within our walls

      The information we collect about people visiting the site is stored in secure environments that are not available to any other individual or party. We have mechanisms in place to protect data. One such mechanism is called a "firewall." A firewall is a barrier that allows only authorised traffic through. It safeguards our computer systems and your information. We also use system and application logs to track all access. We review these logs periodically and investigate any anomalies or discrepancies.