Data Protection Declaration
1.The entity collecting data is: Happy Mouth LLC
2.WHAT DATA DO WE STORE?
We store all of the data that we need in order to maintain our relationships with customers and clients. This data ranges from records including full name, e-mail address and country, to more extensive records that include full name, telephone number, e-mail address, home and work address.
For tax purposes, if you attend a class or buy a product, we will store your tax or VAT identification number and all of the data that we need to issue a correct invoice in all of the jurisdictions in which we operate.
We may store both your shipping address, for product delivery, and your billing address, which can be used to verify credit card payments or other methods of payment.
3. WHY DO WE STORE YOUR DATA?
We store your data in order to provide the services that we offer for free and to fulfill our contractual undertakings with our customers and clients.
Personal data is stored to be able to send you information, free samples, products and to register you for classes and telecalls.
Recordings of classes and telecalls are stored and distributed to enable clients and customers to play back classes or telecalls they attended. Following the aforementioned classes or telecalls, recordings are also turned into products that are sold in the shop.
4.WHO HAS ACCESS TO YOUR DATA?
The Happy Mouth team has access to your data to be able to fulfill our contractual agreements with our customers and clients. The team may include our communications and marketing team, our event organizers and our administrative staff.
In addition, outsourcing work on specialist tasks within IT and accounting, for example, sometimes requires us to grant consultants access to your data whenever and wherever this is required to fulfill our legal obligations towards official authorities or to develop and improve our services.
5. DO WE SHARE YOUR DATA?
We do not share your data with anyone!
6. HOW LONG IS THE DATA STORED?
We keep the data stored as long as…
– We have a relationship with you as a customer, client or interested party
– We are legally obliged to for tax purposes
– until you unsubscribe or ask us to delete your information
7. WHAT DATA PROTECTION RIGHTS DO YOU HAVE AS A CUSTOMER?
As a customer, you have the right to…
– manage your e-mail or paid subscription
– correct any and all information I have stored
– request details of the data I have stored regarding you
– request deletion or limitation of your stored data.
If you would like to update, change or amend your data, please let us know by contacting us at this e-mail address: email@example.com
If you would like to be deleted from our database, please contact us here: firstname.lastname@example.org
8. ARE CUSTOMERS OBLIGED TO PROVIDE THEIR DATA?
Yes, as a customer or client, you must provide the data we need to be able to fulfill our contractual obligations within the various services we offer.
Depending on what you are requesting from us, we will ask you to provide information that may range from your full name, e-mail address and country to more extensive details including full name, telephone number, e-mail address, home and work address.
9. COOKIES, PROFILING AND AUTOMATION
We do not perform any form of automated profiling. Sometimes we will check what topics a client may be interested in based on his/her previous choices of classes or products.
We do not share your data or sell it to any external agencies. Checks on prerequisites for advanced classes are processed automatically.
10. WHERE DO WE STORE YOUR DATA?
We use multiple systems for storing your data to fulfill our contractual agreements with customers and clients.
In general, information is stored in cloud services and on computers in the country of residence,
the United States of America, the European Union and Australia.
11. HOW DO WE PROTECT YOUR DATA?
Contractors and the external agencies with whom we work have all signed NDAs (Non-Disclosure Agreements). They have also been trained in data protection.
The stored data can only be accessed through security-protected entry points by users with permission to access the information.