top of page

Website Privacy Terms & Protection of Personal
Information (“POPI”) Policy
Our Email Address: dotterawomanco@gmail.com
Last updated: [01 February 2022]

​

DISCLAIMER

These statements on the website have not been evaluated by the Food and Drug Administration. These products are not intended to diagnose, treat, cure, or prevent disease.” These products DO NOT prevent, treat, or cure any kind of sickness, illness, infection, disease, chronic condition, etc.

​

These products support, maintain or improve health, wellness, or structures and functions of the body like the brain, the heart, the liver, muscles and joints, the respiratory system, cognitive function, etc.

​

PRIVACY

 

Whereas the Company respects the privacy of all personal data and private information collected, processed and stored, and hereby adheres to the requirements as set out in the Protection of Personal Information Act 4 of 2013 (“POPI”). As such, we undertake to deal with all personal information received and processed with due care and diligence, and provide the necessary security to safeguard all information held by us. Our internal system similarly allows us to proactively react should there be a breach of any kind, alternatively our privacy practices and POPI policy dictates that we report any material breach to the Regulator.

 

Website Privacy & POPI:

Your privacy is important to the Company. This policy explains the Company’s privacy practices and the choices you have about the way your personal information will be dealt with. All practices are in line with the Company’s SOP, PAIA Manual and the provisions of POPI.

i. Personal information is collected only when knowingly and voluntarily submitted.

ii. Personal information is only used for the purpose for which it was collected and/or submitted.

iii. In addition to where you have consented to the disclosure of your personal information, personal information may be disclosed in special situations where the Company has reason to believe that doing so is necessary to identify or act against anyone damaging or interfering with our rights or property, users or anyone else that could be harmed by such activities.

iv. The Company may engage third parties to provide you with goods or services on our behalf and in such circumstances may disclose your personal information to such parties in order to provide such goods and services.

 

Social Plugins

We use social plugins of social networks such as Facebook, YouTube, LinkedIn, Google+ and Twitter.

Please note that we have no influence on or control over the extent of the data retrieved by the social networks’ interfaces and we can accordingly not be held responsible or liable for any processing or use of personal information transmitted via these social plugins. For information on the purpose and extent of the data retrieval by the social network concerned, and about the rights and settings possibilities for the protection of your private sphere, please refer to the data protection information provided by the social network in question.

 

Cookies:

The Company uses cookies, pixels and other technologies (collectively referred to as “cookies”) to recognize your browser or device, learn more about your company or industry, and provide you with essential features and services, as well as for additional purposes, including:

i. Recognizing you when you sign-up to use our services. This allows us to provide each user or data subject with customized features and services, if applicable.

ii. Conducting research and diagnostics to improve the Company’s website content, products, and services.

iii. Preventing fraudulent activity.

iv. Improving security.

v. Delivering content, including ads, relevant to your interests.

vi. Reporting. This allows us to measure and analyze the performance of our services.

You can manage browser cookies through your browser setting. The “Help” feature on most browsers will tell you how to prevent your browser from accepting new cookies; how to have the browser notify you when you receive a new cookie; how to disable cookies; and when cookies will expire. If you disable all cookies on your browser, the Company, nor any of its third parties, will transfer cookies to your browser. If you do this, however, you may have to manually adjust some preferences every time you visit a site and some features and services may not work.

 

Information security on our website:

i. Any information that you upload on our website will be stored on a secure server and be used for limited purposes such as future communications (which you are always entitled to un-subscribe to).

ii. The Company will not disclose, sell, rent, or disseminate your personal information to third parties without your consent unless the Company is compelled to do so by law. The Company may do so if you have granted consent thereto.

iii. While all reasonable efforts are taken to ensure that your personal information is protected as it travels over the internet, the Company cannot guarantee the absolute security of any information you exchange with us due to reasons beyond our control.

iv. The Company may use cookies and web beacons to facilitate improvement of our website. However, neither cookies nor web beacons collect personal information such as the user’s name or email address. You may reject cookies, as most browsers permit individuals to decline the same.

 

PROTECTION OF PERSONAL INFORMATION & BREACH PROTOCOL

 

  1. INTRODUCTION:

The right to privacy is an integral human right recognized and protected in the South African Constitution and in the Protection of Personal Information Act 4 of 2013 (“POPI Act”). 

The POPI Act aims to promote the protection of privacy through providing guiding principles that are intended to be applied to the processing of personal information in a context-sensitive manner. Through the provision of quality goods and services, the organization is necessarily involved in the collection, use and disclosure of certain aspects of the personal information of clients, customers, employees, and other stakeholders. A person’s right to privacy entails having control over his or her personal information, being able to conduct her or her affairs relatively free from unwanted intrusions. Given the importance of privacy, the organization is committed to effectively managing personal information in accordance with the POPI Act’s provisions.

 

  1. DEFINITIONS: 

2.1. Personal Information: personal information is any information that can be used to reveal a person’s identity. Personal Information relates to an identifiable, living, natural person, and where applicable, an identifiable, existing juristic person (such as a company), including but not limited to information concerning:

2.1.1. Race, gender, sex, pregnancy, marital status, national or ethnic origin, color, sexual orientation, age, physical or mental health, disability, religion, conscience,
belief, culture, language and birth of person;

2.1.2. Information relating to the education or medical, financial, criminal or employment history of the person;

2.1.3. Any identifying number, symbol, email address, physical address, telephone number, location information, online identifier or other particular assignment to the person;

2.1.4. Biometric information of the person;

2.1.5. The personal opinions, views or preferences of the person;

2.1.6. Correspondence sent by the person that is implicitly or explicitly of a private or confidential nature or further correspondence that would reveal the contents of
the original correspondence;

2.1.7. The views or opinions of another individual about the person;

2.1.8. The name of the person if it appears with other personal information relating to the person or if the disclosure of the name itself would reveal information about the person.

2.1.9. Some other sensitive or special categories of personal information, including biometric information mentioned above, such as images, fingerprints and voiceprints.

2.2. Data Subject: this refers to the natural or juristic person to whom personal information relates, such as an individual client, customer or a company that supplies the organization with products or other goods.

2.3. Responsible Party: the responsible party is the entity that needs the personal information for a particular reason and determines the purpose of and means for
processing the personal information. In this case, the organization is the responsible party.

2.4. Operator: means a person who processes personal information for a responsible party in terms of a contract or mandate, without coming under the direct authority of that party. For example, a third-party service provider that has contracted with the organization to shred documents containing personal information. When dealing with an operator. It is considered good practice for a responsible party to include an indemnity clause.

2.5. Information Officer: the information officer is responsible for ensuring the organization’s compliance with the POPI Act. Where no information officer is appointed, the head of the organization will be responsible for fulfilling the information officer’s duties. Once appointed, the information officer must be registered with the South African Information Regulator established under the POPI Act prior to performing his or her duties. Deputy Information Officers can also be appointed to assist the Information Officer.

2.6. Processing: the act of processing information includes any activity or any set of operations, whether by automatic means, concerning personal information and includes:
2.6.1. The collection, receipt, recording, organization, collation, storage, updating or modification, retrieval, alteration, consultation or use;
2.6.2. Dissemination by means of transmission, distribution or making available in any other form; or
2.6.3. Merging, linking, as well as any restriction, degradation, erasure or destruction of information.

2.7. Record: means any recorded information, regardless of form or medium, including:
2.7.1. Writing on any material;
2.7.2. Information produced, recorded or stored by means of any tape-recorder, computer equipment, whether hardware or software or both, or other device, and any material subsequently derived from information so produced, recorded or stored
2.7.3. Label, marking or other writing which identifies or describes anything of which it forms part, or to which it is attached by any means;
2.7.4. Book, map, plan, graph or drawing;
2.7.5. Photograph, film, negative, tape or other device in which one or more visual images are embodied so as to be capable, with or without the aid of some other equipment, of being reproduced.

2.8. Filing System: means any structed set of personal information, whether centralized, decentralized or dispersed on a functional or geographical basis, which is accessible according to specific criteria.

2.9. Unique Identifier: means any Identifier that is assigned to a data subject and is used by a responsible party for the purposes of the operations of the responsible party and that uniquely identifies that data subject in relation to that responsible party.

2.10. De-Identify: means to delete any information that identifies a data subject, or which can be used by a reasonably foreseeable method to identify, or when linked to other information, that identifies the data subject.

2.11. Re-Identity: means any voluntary, specific and informed expression of will in terms of which permission is given for the processing of personal information.

2.12. Direct Marketing: means to approach a data subject, either in person or by mail or electronic communication, for the direct or indirect purpose of:
2.12.1. Promoting or offering to supply, in the ordinary course of business, any goods or services to the data subject; or
2.12.2. Requesting the data subject to make a donation of any kind for any reason.

2.13. Biometrics: means a technique of personal identification that is based on physical, physiological or behavioral characterization including blood tying, fingerprinting, DNA analysis, retinal scanning and voice recognition.

2.14. Subscriber: Individual that subscribes to the services offered by the App and TRIGGER. The Subscriber pays for these services, submits its data to enable the App to function efficiently and to its fullest extent, and agrees to the terms and conditions of the use of the App.

2.15. “TRIGGER” shall mean Trigger Systems (Pty) Ltd, a company duly registered in the Republic of South Africa with registration number 2016/460285/07.

2.16. “Platform” shall mean hardware architecture and software frameworks that allow the Applications and integrated systems to run.

2.17. “Application” shall mean the TRIGGER app, which app gives its Subscriber access to the Platform.

2.18. “Service” shall mean the service offered via the TRIGGER Application.

 

  1. POLICY PURPOSE:

3.1. The purpose of this policy is to protect the organization from the compliance risks associated with the POPI Act which includes:

3.1.1. Breaches of confidentiality. For instance, the organization could suffer loss in revenue where it is found that the personal information of data subjects has been
shared or disclosed inappropriately. 

3.1.2. Failing to offer choice. For instance, all data subjects should be free to choose how and for what purpose the organization uses information relating to them.

3.1.3. Reputational damage. For instance, the organization could suffer a decline in shareholder value following an adverse event such as a computer hacker deleting
the personal information held by an organization.

3.2. This policy demonstrates the organization’s commitment to protecting the privacy rights of data subjects in the following manner:

3.2.1. Through stating desired behavior and directing compliance with the provisions of the POPI Act and best practice.

3.2.2. By cultivating an organizational culture that recognizes privacy as a valuable human right.

3.2.3. By developing and implementing internal controls for the purpose of managing the compliance risk associated with the protection of personal information.

3.2.4. By creating business practices that will provide reasonable assurance that the rights of data subjects are protected and balanced with the legitimate business
needs of the organization.

3.2.5. By assigning specific duties and responsibilities to control owners, including the appointment of an Information Officer and where necessary, Deputy Information officers, to protect the interests of the organization and data subjects.

 

  1. POLICY APPLICATION

4.1. This policy and its guiding principles applies to:

4.1.1. The organization’s governing body;

4.1.2. All branches, business units and divisions of the organization;

4.1.3. All employees and volunteers;

4.1.4. All contractors, suppliers and other persons acting on behalf of the organization.

4.2. The policy’s guiding principles find application in all situations and must be read in conjunction with the POPI Act, as well as any other applicable documentation (PAIA Manual).

4.3. The legal duty to comply with the POPI Act is activated in any situation where there is: a processing of personal information entered into a record by or for a responsible party who is domiciled in South Africa.

4.4. The POPI Act does not apply in situations where the processing of personal information:
4.4.1. Is concluded in the course of purely personal or household activities; or
4.4.2. Where the personal information has been de-identified.

 

  1. RIGHTS OF DATA SUBJECTS Where appropriate, the organization will ensure that its clients and customers are made aware of the rights conferred upon them as data subjects. The organization will ensure that it gives effect to the following rights:

 

5.1. The right to access of personal information
5.1.1. The organization recognizes that a data subject has the right to establish whether the organization holds personal information related to him, her or “it”,including the right to request access to that personal information.
5.2. The Right to have Personal Information Corrected or Deleted 

5.2.1. The data subject has the right to request, where necessary, that his, her or its personal
information must be corrected or deleted where the organisation is no longer authorised to retain the personal information.
5.3. The Right to Object to the Processing of Personal Information 

5.3.1. The data subject has the right, on reasonable grounds, to object to the processing of his,
her or its personal information. In such circumstances, the organization will give due consideration to the request and the requirements of POPIA. The organization may cease to use or disclose the data subject’s personal information and may, subject to any statutory and contractual record keeping requirements, also approve the destruction of the personal information.
5.4. The Right to Object to Direct Marketing 

5.4.1. The data subject has the right to object to the processing of his, her or its personal
information for purposes of direct marketing by means of unsolicited electronic communications.
5.5. The Right to Complain to the Information Regulator 

5.5.1. The data subject has the right to submit a complaint to the Information Regulator regarding an alleged infringement of any of the rights protected under POPIA and to institute civil proceedings regarding the alleged non-compliance with the protection of
his, her or its personal information. 
5.6. The Right to be Informed
5.6.1. The data subject has the right to be notified that his, her or its personal information is being collected by the organisation. The data subject also has the right to be notified in any situation where the organization has reasonable grounds to believe that the personal information of the data subject has been accessed or acquired by an unauthorized person.

 

  1. GENERAL GUIDING PRINCIPLES

All employees and persons acting on behalf of the organization (all affiliates and third-parties acting for and on behalf of the Company) will at all times be subject to, and act in accordance with, the following guiding principles:

 

6.1. Accountability

Failing to comply with the POPI Act could potentially damage the organisation’s reputation or expose the organisation to a civil claim for damages. The protection of personal information is therefore everybody’s responsibility. The organisation will ensure that the provisions of POPIA and the guiding principles outlined in this policy are complied with through the encouragement of desired behaviour. However, the organisation will take appropriate sanctions, which may include disciplinary action, against those individuals who through their intentional or negligent actions and/or omissions fail to comply with the principles and responsibilities outlined in this policy.

6.2. Processing Limitation

The organisation will ensure that personal information under its control is processed:
in a fair, lawful and non-excessive manner;
only with the informed consent of the data subject; and
only for a specifically defined purpose.

The organisation will inform the data subject of the reasons for collecting his, her or its personal information and obtain written consent prior to processing personal information. Alternatively, where services or transactions are concluded over the telephone or electronic video feed, the organisation will maintain a voice recording of the stated purpose for collecting the personal information followed by the data subject’s subsequent consent.
The organisation will under no circumstances distribute or share personal information between separate legal entities, associated organisations (such as subsidiary
companies) or with any individuals that are not directly involved with facilitating the purpose for which the information was originally collected. Where applicable, the data subject must be informed of the possibility that their personal information will be shared with other aspects of the organisation’s business and be provided with the reasons for doing so.

6.3. Purpose Specification

All the organisation’s business units and operations must be informed by the principle of transparency. The organisation will process personal information only for specific, explicitly defined and legitimate reasons. The organisation will inform data subjects of these reasons prior to collecting or recording the data subject’s personal information.

6.3.1. Information we collect automatically through the use of technology

When you visit our website, use our mobile app, read our emails or otherwise engage with us, we and our business partners may automatically collect certain information about your computer or device through a variety of tracking technologies, including cookies, web beacons, log files, embedded scripts, location-identifying technologies, or other tracking/recording tools (collectively, “tracking technologies”), and we may combine this information with other personal information we collect about you. We use these tracking technologies to collect usage and device information, such as:

  • Information about how you access the Service, for example, referral/exit pages, how frequently you access the Service, whether you open emails or click the links contained in emails, whether you access the Service from multiple devices, and other actions you take on the Service.

  • Information about how you use the Service, for example, the features you use, the links you click, the ads you view and click on, purchase transaction information, your location when you access or interact with our Service, and other similar actions.

  • Information about the computer, tablet, smartphone or other device you use, such as your IP address, browser type, Internet service provider, platform type, device type/ model/ manufacturer, operating system, phone number, mobile carrier, date and time stamp, a unique ID that allows us to uniquely identify your browser, mobile device or your account (including, for example, a UDID, IDFA, Google Ad ID, Windows Advertising ID or other persistent device identifier or Ad ID), battery life, and other such information. With your permission, we may also access your photo or camera roll.

6.3.2. What we do with the information we collect automatically through the use of technology

  • The information submitted, such as your name and surname, contact details and whether you have subscribed to the use of the App, will go through third-parties (independent contractors) who specialize in CRM systems, namely administering welcome mails, operational mails and SMS services.

  • Once the Subscriber uses the App, it has the option to submit personal data  With the use of the App, the Subscriber gives the App permission to access all the necessary data and access to its device to function and to be able to deliver in terms of the service subscribed for. This may include access to the Subscriber’s location and contact list on the mobile device used to download and utilize the App.

6.3.3. We may receive information about you in alternative ways, including but not limited to:

  • When you contact us directly, either via our website, web chat service, our Customer Service teams, by email, telephone or via social media, whether to apply for one of our products or services or to make an enquiry or other request;

  • From our network of authorised  Retailers/Agencies;

  • From other  Entities or entities within, or affiliates of, the Group or our carefully selected business partners who provide products and services under one of our brands;

  • From third parties, such as credit bureaus, when we do credit checks or decide whether to enter into an agreement with you; or

  • Occasionally from other third parties who may lawfully pass your information on to us.

  • Telephone calls to us may be recorded and/or monitored for training and quality assessment purposes.

6.4. Further Processing Limitation

Personal information will not be processed for a secondary purpose unless that processing is compatible with the original purpose. Therefore, where the organisation
seeks to process personal information it holds for a purpose other than the original purpose for which it was originally collected, and where this secondary purpose is not compatible with the original purpose, the organisation will first obtain additional consent from the data subject.

6.5. Information Quality

The organisation will take reasonable steps to ensure that all personal information collected is complete, accurate and not misleading. The more important it is that the personal information be accurate the greater the effort the organisation will put into ensuring its accuracy. Where personal information is collected or received from third parties, the organisation will take reasonable steps to confirm that the information is correct by verifying the accuracy of the information directly with the data subject or by way of independent sources.

6.6. Open Communication

The organisation will take reasonable steps to ensure that data subjects are notified (are at all times aware) that their personal information is being collected including the purpose for which it is being collected and processed. The organisation will ensure that it establishes and maintains a “contact us” facility, for instance via its website or through an electronic helpdesk, for data subjects who want to:
Enquire whether the organisation holds related personal information;
Request access to related personal information;
Request the organisation to update or correct related personal information; or
Make a complaint concerning the processing of personal information.

6.7. Security Safeguards

6.7.1. The organisation will manage the security of its filing system to ensure that personal information is adequately protected. To this end, security controls will be
implemented to minimise the risk of loss, unauthorised access, disclosure, interference, modification or destruction. Security measures also need to be
applied in a context-sensitive manner. For example, the more sensitive the personal information, such as medical information or credit card details, the greater
the security required.

The organisation will ensure that all paper and electronic records comprising personal information are securely stored and made
accessible only to authorised individuals.

 If you have any queries relating to the concerned third-party service providers/ independent contractors use of your personal information, you must contact the relevant entity directly.

6.8. Data Subject Participation A data subject may request the correction or deletion of his, her or its personal information held by the organisation. The organisation will ensure that it provides a facility for data subjects who want to request the correction of deletion of their personal information. Where applicable, the organisation will include a link to unsubscribe from any of its electronic newsletters or related marketing activities.​​

 

  1. REQUEST TO ACCESS PERSONAL INFORMATION

10.1. Data subjects have the right to:
10.1.1. Request what personal information the organisation holds about them and why.
10.1.2. Request access to their personal information.
10.1.3. Be informed how to keep their personal information up to date.
10.2. Access to information requests can be made by email, addressed to the Information Officer. The Information Officer will provide the data subject with a “Personal Information Request Form”.

 

  1. POPI COMPLAINTS PROCEDURE

11.1. Data subjects have the right to complain in instances where any of their rights under POPIA have been infringed upon. The organisation takes all complaints very seriously and will address all POPI related complaints in accordance with the following procedure:
11.1.1. POPI complaints must be submitted to the organisation in writing. 
11.1.2. Where the complaint has been received by any person other than the Information Officer, that person will ensure that the full details of the complaint reach the Information Officer.
11.1.3. The Information Officer will provide the complainant with a written acknowledgement of receipt of the complaint 
11.1.4. The Information Officer will carefully consider the complaint and address the complainant’s concerns in an amicable manner. In considering the complaint, the
Information Officer will endeavour to resolve the complaint in a fair manner and in accordance with the principles outlined in POPIA.
 

  1. PERSONAL DATA BREACH PROTOCOL

12.1. For the purposes of this section, a personal data breach is any attempt at, or occurrence of, unauthorized acquisition, exposure, disclosure, use, modification or
destruction of personal and/or sensitive data as described in this policy. The breach protocol is meant to address security incidents involving any and all personal data held, collected, processed and/or stored by the Organisation, including personal data under the control or responsibility of an affiliated business or third party.
12.2. The Organisation shall ensure that, inter alia, all personal data breaches are reported to the Regulator, investigated and contained within the Organisation or by the Organisation and in terms of this policy.
12.3. The following is an indication of the timelines necessary herein and to be followed by the organisation and/or its Information Officer when responding to, investigating and reporting on any personal data breach within the Organisation:
12.3.1. Initial response to discovering personal data breach, or potential breach:
12.3.1.1. Identifying personal data breach or potential breach;
12.3.1.2. Involvement of Information Officer, IT/Server Department and any necessary and/or applicable parties;
12.3.1.3. Involvement of compliance department, legal department or similar (if applicable to the Organisation).
 

  1. CAN THIS PRIVACY STATEMENT BE AMENDED?

We may amend this Statement from time to time for any of the following reasons:

14.1. to provide for the introduction of new systems, methods of operation, services, products, property offerings or facilities;

14.2. to reflect an actual or expected change in market conditions or general financial services or lending practices;

14.3. to comply with changes to any Applicable Laws;

14.4. to ensure that this Statement is clearer and more favourable to you;

14.5. to rectify any mistake that might be discovered from time to time; and/or

14.6. for any other reason which in its sole discretion, may deem reasonable or necessary.

14.7. Any such amendment will come into effect and become part of any agreement you have when notice is given to you of the change by publication on our website. It is your responsibility to check the website often.

 

​​

  • Can the company share my information?
    We may share your personal information with:

  • Other  entities, our agents and sub-contractors, or affiliates, in South Africa and in other countries;

  • Our authorised Retailers/Agencies/ Affiliates and Independent Contractors;

  • Our carefully selected business partners, including those who provide products and services under any of our brands;

  • Our service providers and agents who perform services on our behalf;

We may disclose your personal information to these third parties for any purpose permitted in terms of Applicable Laws, including to-​

  • determine which products and services may be of interest to you and/or to send you information about such products and services, unless you object or choose not to receive such communications;

  • make reports to any regulator or supervisory authority, including those in foreign jurisdictions, if TRIGGER is required to do so in terms of Applicable Laws.

We do not share your personal information with any third parties, except if:

  • we are legally permitted or obliged to provide such information for legal or regulatory purposes;

  • we are required to do so for purposes of existing or future legal proceedings;

  • we are selling one or more of our businesses to someone to whom we may transfer our rights under any agreement we have with you;

  • Necessary for purposes of preventing fraud, loss, bribery or corruption;

  • they perform services and process personal information on our behalf;

  • it is required in order to provide or manage any information, products and/or services to you;

  • needed to help us improve the quality of our products and services.

If you do not wish us to disclose this information to third parties, please contact us at the contact details set out herein. We may, however, not be able to provide products or services to you if such disclosure is necessary.

Can I share information with on third Parties?

Where you provide us with the personal information of third parties you should take steps to inform the third party that you need to disclose their details to us and identify us. We will process their personal information in accordance with this Statement. If you give us information on behalf of someone else, you confirm to us that you have their permission to do so and that they are aware of the contents of this Statement and do not have any objection to us processing their information in accordance with this Statement.

What is my personal information used for?

Subject to Applicable Laws, we may use your personal information for a variety of purposes, including:

​

Marketing & Data Analytics/Enrichment

  • Data analytics and/or enrichment;

  • To carry out analysis and customer profiling;

  • To identify other products and services which might be of interest to you;

  • To assess and deal with complaints and requests;

  • To conduct market research and provide you with information about TRIGGER’s products or services from time to time via email, telephone or other means (for example, events).

  • Where you have unsubscribed from certain direct marketing communications, for the purposes of ensuring that we do not send such direct marketing to you again.

Financial

  • To help us recover debts;

  • To help us collect all subscriptions due and payable for the services rendered. 

Operational & Customer Service

  • To obtain a single view of a customer for all of TRIGGER;

  • To improve your customer experience;

  • To help us improve the quality of our products and services;

  • To provide you with the services, products or offerings you have requested, and to notify you about important changes to these services, products or offerings

What should I do if my personal details change?

We strive to maintain the integrity and accuracy of your personal information at all times. You are responsible for informing us of any change in your details, such as a change of address. You have a right to ask us to correct any inaccuracies in the information we hold about you.

If your personal information changes at any time or our records appear to be incorrect, please inform us immediately so that we may update or correct our records accordingly. If you fail to keep your information updated, or if your information is incorrect

Can TRIGGER contact me?

We (and these other parties) may contact you by post, telephone, e-mail, SMS and other electronic means, to inform you about services, products and offerings available or selected third parties, which we believe may be of interest to you, unless you have unsubscribed from receiving such communications. We will only send you marketing communications if we are entitled to do so under Applicable Laws and where you have given us permission to do so.

Your participation is completely voluntary. You may unsubscribe or opt out from receiving such communications from TRIGGER Entities by accessing your online customer profile by making use of the “Unsubscribe” option available on the relevant communication.

You may also contact us utilising the contact details set out in this Statement if you have previously asked not to receive marketing communications from us 

bottom of page