INTRODUCTION
At Peaks and Trails, we know how important your personal data is and that is why we’re committed to treating any information you provide with the utmost respect and secured in the strictest of confidence.
We never sell, trade, rent or exchange your details to other companies and we go to great efforts to look after you and your data. In the following privacy policy, we've outlined this in greater detail - please read on to gain a greater understanding of how we collect, use and look after your data.
WHO ARE WE?
We are a registered company in England and our registered address is: St Quentin, Old Sticklepath Hill, Barnstaple, Devon, EX31 2BG
WHAT DATA DO WE COLLECT AND HOW DO WE USE IT?
Booking information
When you book a holiday, along with your holiday requirements, we'll ask for the following information - full name, postal address (and billing address if different), telephone number, email address, and the names of anyone accompanying you.
These details enable us to process your booking, send you your holiday details, and help us to contact you urgently if there are any problems.
When you provide payment details these are not stored by us in any way (either on paper or digitally), but are securely delivered directly to our payment processor who fully encrypt and secure the data.
WHO CAN SEE MY DATA?
The data you provide is only ever visible to Peaks and Trails staff and our external web support team. We never sell your data.
To fulfil our service to you, we will share limited data with accommodation and service providers that you use during the course of your holiday.
HOW CAN I ACCESS MY DATA?
You're entitled to access or remove the personal information that we hold about you at any time by formal request.
WHAT IF DATA IS BREACHED?
We go to great lengths to ensure your data is extremely secure and handled with the utmost care. However, should a data breach occur, we will contact you by email within 72 hours to notify you that this has happened. We will follow up shortly after with a more complete explanation of the breach, how it happened, what data was breached, the steps taken to remedy the breach and what you need to do next.