Privacy Policy

PRIVACY STATEMENT

Information according to the Personal Data Act (523/99): By sending your personal data, you agree to their storage in the register maintained by DAME beauty Oy. Your personal information is kept confidential. In the event of a possible customer relationship, your data can only be used at DAME beauty offices. They are only given to others based on the law or with your permission.

The administrator of the register and its contact information Tampere

DAME beauty Oy (3121593-6)
Satakunnkatu 26 LH3
33210 Tampere
info@dame.fi

The administrator of the register and its contact information Fuengirola

DAME beauty SL (CIF/NIF B09921081)
Antonio Rubio Torres 15
29640 Fuengirola
info@damebeauty.es

What information is collected about me?

The customer's first name, last name, e-mail address and phone number are stored in the customer register. Address information only if it has been given during the booking phase. The legal basis for processing personal data is a contract, consent or legitimate interest. The processing of personal data has been taken into account as of May 25, 2018

The requirements set by the EU data protection regulation.

What is personal data used for?

To manage the customer relationship
For statistical purposes
For marketing purposes

How long will my personal data be kept?

We will keep your personal data as long as the register is necessary to fulfill the purposes of use.
In addition, some data can be stored longer in those aspects is necessary for the obligations set by law, such as accounting and to manage responsibilities regarding consumer trade.

Customer rights

As a customer, you have the following rights:

Right of revision
Right of rectification
The right to withdraw consent
Right of deletion

Partner Timma Oy

We use the appointment booking system offered by Timma Oy for everyone working at DAMES. Timma has organized the information security of its own register in a generally acceptable manner and strives with appropriate technical solutions to prevent unauthorized access to its information systems maintained with the help of information technology.