Privacy Policy Overview

The purpose of this Information Security and Data Protection Policy (“Policy”) is to put in detail how data is handled at Guest Experience Maximization (GEM) and the actions that are taken to protect and secure all relating software, data, and information. All electronic information assets (data) shall be protected and maintained according to all applicable federal and state laws.

All data handled at GEM is managed responsibly and gathered to be utilized for marketing needs and data analysis.

GEM employees and its subsidiaries must follow this Policy; this includes contractors, consultants, and other external entities

GEM recognizes the importance of Personal Data and respects the privacy rights of individuals. The purpose of this Policy presents the principles that are applied to the Processing of Personal Data and GEM’s use of Confidential Information. We are committed to safeguarding one of the most valuable assets which belongs to our consumers and there are procedures installed to ensure such security and protection from invasion and breaches.

Our Policy dictates how we process and secure the data we obtain, highlighting how we protect from and respond to data breaches. This is to ensure every level of security is maintained to protect our servers and consumers. GEM follows all related requirements and laws that deal with data protection and information security to properly handle all data and assess possible risks.

Definitions

All capitalized terms used but not otherwise defined in this Agreement shall have the meanings ascribed to such terms as noted below.

Controller
Controller means ‘the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data; where the purposes and means of such processing are determined by Union or Member State law, the Controller or the specific criteria for its nomination may be provided for by Union or Member State law.’

Data Breach
Data Breach refers to a security incident where sensitive and personal data may be viewed, stolen, or used by someone(s) unauthorized.

Data Processor
Data Processor refers to the person or organization that processes Personal Data at the behest of the Controller(s).

Data Protection Officer
Data Protection Officer(s) is a designated role assigned to working with the Controller and Processor for the protection of personal data.

GDPR
General Data Protection Regulation (GDPR) is a regulation regarding data privacy and protection within the European Union (EU). This EU law determines clear guidelines addressing consumer consent guidelines and regulations for international business.

Joint Controller
Joint Controller is a partner company that jointly determines the purposes and means of the processing of personal data, alongside the Controller.

Personal Data
Personal Data implies data that is relating to a living individual who may be identified by the data or from the data together with other information in the possession of, or is likely to come into possession of GEM.

Processing
Processing is the act of retrieving and securing the data or acting on a set of operations with the data. This may include organizing, adapting, and amending the data as well as erasing or destroying the data. Most actions relative to using data will fall under the terms of Processing which can be done within a mainframe, desktop or laptop, or other similar electronic devices.

Processor
Processor is ‘the entity (that can be natural or legal person, public authority, agency or other body) which processes personal data on behalf of the Controller under the Controller’s instructions.’

Services
Services refers to the relevant GEM strategies and solutions provided relating to data processing, movement, and changes.

www.allaboutcookies.org to learn more about technical cookies.

Cookies are small text pieces that are sent by your web browser through a website you visit. Once sent, each cookie file is stored onto your web browser to allow the website or a third-party to recognize you on your web browser and make your next visit easier and more useful to you.

The cookies we use are performance cookies. They are used to enable certain functions on our website, to provide us with analytics of users exploring our web pages, to store your preferences, and to ensure future visits to our website are faster to load. These cookies are installed by Drupal for websites using this CMS.

Our cookies do not capture identity information including names, addresses, or similar personal data. The cookies on the GEM website do not collect information. They only support the loading of website materials to present to you but do not present GEM with any personal information. We use cookies to recognize your browser or device and provide you with essential features and services.

In order to disable cookies or if you’d like to instruct your web browser to remove or refuse cookies, please visit the help pages of your web browser.

It is important to know before disabling, deleting, or refusing to accept any and/or all cookies, that your web browser may not permit access or complete use of the features or loaded pages offered on our website.

Bitnami