Protecting Your Privacy with Industry-Leading Data Security

At ThistleMoor Events, your privacy is paramount. We are committed to transparency in how we collect, use, and protect your personal information, ensuring full compliance with GDPR and all UK data protection laws.

This policy is effective as of 15th May 2024. For any concerns, please contact us at info@thistlemoor.co.uk.

What Information We Collect and How We Use It

Personal & Event Details

We collect essential personal information (name, contact details, address) and specific event details (date, location, equipment preferences) to process your bookings and deliver our services efficiently. This allows us to tailor our offerings precisely to your needs, ensuring a flawless event experience. Your event's success starts with accurate planning, powered by your shared preferences.

Communication & Website Data

We record your communication preferences and gather anonymised website usage data through analytics. This helps us understand how you interact with our site, enabling continuous improvement of our user experience and service offerings. We only send marketing communications if you have explicitly consented, and you can manage these preferences at any time.

Abstract illustration of data points flowing into a secure, encrypted database, representing data collection under privacy policy
Visualising the secure flow of your data for seamless event planning.

How We Protect Your Personal Information

  • Advanced Encryption & Secure Transmission

    All data transmitted to and from ThistleMoor Events is secured with industry-standard TLS encryption, ensuring your information remains confidential during online interactions.

  • Strict Access Controls & Staff Training

    Only authorised personnel with a legitimate business need can access your data. Our team undergoes regular training on data protection best practices and ethical data handling.

  • Ongoing Security Audits & System Updates

    We conduct frequent security assessments and maintain robust firewalls and malware protection. Our systems are regularly updated to counter emerging threats and maintain cutting-edge security.

  • Secure Payment Processing

    Financial transactions are handled by PCI DSS compliant third-party payment processors. We do not store sensitive payment card details directly on our servers.

Image depicting abstract shields and lock icons protecting digital data, representing robust security measures
Our commitment to safeguarding your data with multi-layered protections.

Your Data Rights and Privacy Controls

Under GDPR and UK data protection laws, you have comprehensive rights over your personal data. ThistleMoor Events is dedicated to supporting you in exercising these rights:

Right to Access

Request copies of personal data we hold about you.

Request Data

Right to Rectification

Correct inaccurate or incomplete personal data.

Update My Data

Right to Erasure

Ask us to delete your personal data under certain conditions.

Delete My Data

Right to Portability

Receive your data in a structured, commonly used format.

Portable Data

Right to Object / Restrict

Object to or request restriction of processing in specific situations.

Manage Preferences

Data Sharing and Third-Party Services

To deliver our comprehensive event services, we occasionally share essential data with trusted third-party partners who adhere to stringent data protection standards.

  • Service Providers

    We partner with essential service providers for elements like secure payment processing, delivery logistics, and event setup. Data shared is strictly limited to what is necessary for them to perform their designated functions, always under confidentiality agreements.

  • Analytics & Marketing Platforms

    Anonymised data helps us understand website traffic and optimise our marketing. You have full control over marketing consent, and we ensure these platforms comply with GDPR.

  • Legal & Regulatory Compliance

    We may disclose data when legally required by public authorities, including law enforcement, to meet national security or legal requirements, always adhering to strict UK judicial oversight.

Abstract visualization of interconnected secure digital nodes, representing controlled data sharing with trusted third parties
A network of trust: sharing data only with partners who uphold our high standards.

Questions about your data privacy?

Contact Our Team for Assistance