Who we are
We are Chameleon Customs – professional valeting and car detailing based in Leicester.
What personal data we collect and why we collect it
If you complete and submit a contact form, you are providing us with your name, phone number, and email address and you explicitly grant us permission to use these details to contact you for the purposes of your enquiry and any additional marketing information, directly or indirectly related to your enquiry. We are strongly against spam and we will only send out marketing material when we feel it is relevant to our clients.
We use Google Analytics for data collection. This data is stored securely on Google servers. We do not generally collect personally identifiable information through analytics, but more behavior related i.e. link clicks, scrolling, page views, etc.
Who we share your data with
How long we retain your data
We will keep your data from the contact form for a duration of 12 months after the last time period of contact. After this, we will remove your data from our records.
What rights you have over your data
If you have left us a contact form enquiry, you can request to receive a copy of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
You can contact us by emailing us on firstname.lastname@example.org.
How we protect your data
We store all data securely with a trusted hosting provider and we ensure all of our systems have been updated with the latest security patches where available.
What data breach procedures we have in place
If a data breach was to occur, we would notify all affected parties at the earliest possible time, and endeavour to retrieve the data, or at least find the cause of the data breach. Appropriate action would be taken at the time dependent on circumstances. We would also urge affected parties to change any passwords they may be using as part of the data that was breached.