A link to set a new password will be sent to your email address.
It is vitally important to you that your personal information is kept safe and confidential. It is equally important that when you communicate information to Ossett Mouldings Ltd or Ossett Mouldings Ltd communicates with you that such communication is secure. This policy is intended to make sure that we, Ossett Mouldings Ltd, do all that we can to ensure that information and communication with you is kept private.
You will need to provide a contact telephone so the couriers can contact you directly if required regarding your delivery.
WHAT KIND OF INFORMATION DO WE GATHER ABOUT YOU?
Only information which is relevant to your enquiry.
Sufficient information to be able to deal with your enquiry without asking unnecessary or unreasonable questions.
HOW DO WE USE THAT INFORMATION?
We use the information you supply to provide you with the service which you have requested.
If you allow us to, we may also use the information you supply to provide you with information about other services or products which may be of interest to you.
YOUR ABILITY TO VIEW AND CORRECT THE INFORMATION
We will, at your request and subject to proof of identity, provide you with details of all personal information held about you under our control. Such information may be corrected, added to or deleted to ensure that it is accurate, up-to-date and complete.
WEBSITE SECURITY AND SECURITY OF TRANSMITTING INFORMATION
We have security procedures in place for the administration of the website which prevent unauthorised access to the website processes and records.
Ordinary e-mails passing between both parties are not secure.
BREACH OF SECURITY
If you suspect that your data has reached an unauthorised person through us we ask that you provide us with a statement of how any actual or suspected security breach has come to your notice and the nature of that breach.
We will investigate and take action as necessary to remedy any breach of security.
We retain records in electronic form and maintain adequate backup procedures in the event of data corruption or destruction.
After records are no longer required to be kept they are deleted.