As part of the new European Union privacy protection laws we are required to inform you when we use tracking features called ‘cookies’.
“Cookies” are tiny, harmless text files sent to your computer or mobile when you visit a website.
What to do if you do not consent to us using cookies
if you do not consent to us using cookies you can restrict or delete them from your browser.
Please note if cookies are disabled the online browsing experience “may” be limited.
It is vitally important to you that your personal information is kept safe and confidential. It is equally important that when you communicate information to Nixon Homes Ltd or Nixon Homes Ltd communicates with you that such communication is secure. This policy is intended to make sure that we, Nixon Homes Ltd, do all that we can to ensure that information and communication with you is kept private.
1.2 What kind of information do we gather about you?
1.3 How do we use that information?
We use the information you supply to provide you with the service which you have requested. If you allow us to, we may also use the information you supply to provide you with information about other services or products which may be of interest to you
1.4 Your ability to view and correct the information
We will, at your request and subject to proof of identity, provide you with details of all personal information held about you under our control. Such information may be corrected, added to or deleted to ensure that it is accurate, up-to-date and complete.
1.5 Website security and security of transmitting information
We have security procedures in place for the administration of the website which prevent unauthorised access to the website processes and records. Ordinary e-mails passing between both parties are not secure.
1.6 Breach of Security
If you suspect that your data has reached an unauthorised person through us we ask that you provide us with a statement of how any actual or suspected security breach has come to your notice and the nature of that breach. We will investigate and take action as necessary to remedy any breach of security.
We retain records in electronic form and maintain adequate backup procedures in the event of data corruption or destruction.
After records are no longer required to be kept they are deleted.