Privacy Policy

Privacy Policy for (George & Alston Media Ltd).

At, accessible from one of our main priorities is the privacy of our visitors. This Privacy Policy document contains types of information that is collected and recorded by and how we use it.

If you have additional questions or require more information about our Privacy Policy, do not hesitate to contact us through email at help [at]

We are registering with the Information Commissioner's Office (ICO) and fully committed to working with them on any data security matter.

General Data Protection Regulation (GDPR)

We are a Data Controller of your information. (George & Alston Media Ltd) legal basis for collecting and using the personal information described in this Privacy Policy depends on the Personal Information we collect and the specific context in which we collect the information:

  • (George & Alston Media Ltd) needs to perform a contract with you
  • You have given (George & Alston Media Ltd) permission to do so
  • Processing your personal information is in (George & Alston Media Ltd) legitimate interests
  • (George & Alston Media Ltd) needs to comply with the law (George & Alston Media Ltd) will retain your personal information only for as long as is necessary for the purposes set out in this Privacy Policy. We will retain and use your information to the extent necessary to comply with our legal obligations, resolve disputes, and enforce our policies.

If you are a resident of the European Economic Area (EEA), you have certain data protection rights. If you wish to be informed what Personal Information we hold about you and if you want it to be removed from our systems, please contact us.

In certain circumstances, you have the following data protection rights:

  • The right to access, update or to delete the information we have on you.
  • The right of rectification.
  • The right to object.
  • The right of restriction.
  • The right to data portability
  • The right to withdraw consent

Log Files follows a standard procedure of using log files. These files log visitors when they visit websites. All hosting companies do this and a part of hosting services' analytics. The information collected by log files include internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date and time stamp, referring/exit pages, and possibly the number of clicks. These are not linked to any information that is personally identifiable. The purpose of the information is for analyzing trends, administering the site, tracking users' movement on the website, and gathering demographic information.

Cookies and Web Beacons

Like any other website, uses 'cookies'. These cookies are used to store information including visitors' preferences, and the pages on the website that the visitor accessed or visited. The information is used to optimize the users' experience by customizing our web page content based on visitors' browser type and/or other information.

Privacy Policies

You may consult this list to find the Privacy Policy for each of the advertising partners of

Third-party ad servers or ad networks uses technologies like cookies, JavaScript, or Web Beacons that are used in their respective advertisements and links that appear on, which are sent directly to users' browser. They automatically receive your IP address when this occurs. These technologies are used to measure the effectiveness of their advertising campaigns and/or to personalize the advertising content that you see on websites that you visit.

Note that has no access to or control over these cookies that are used by third-party advertisers.

Third Party Privacy Policies's Privacy Policy does not apply to other advertisers or websites. Thus, we are advising you to consult the respective Privacy Policies of these third-party ad servers for more detailed information. It may include their practices and instructions about how to opt-out of certain options. You may find a complete list of these Privacy Policies and their links here: Privacy Policy Links.

You can choose to disable cookies through your individual browser options. To know more detailed information about cookie management with specific web browsers, it can be found at the browsers' respective websites. What Are Cookies?

How We Protect Your Data

All our data is secured to high industry standards.

Our site uses SSL (https protocol (you can see the green padlock). We use 2 Factor Authentication so that only authorised personnel may access the website. This helps prevent hackers accessing the site and either setting up software to steal visitor/subscriber details or simply preventing users access the site or their data.

We only use third party software and services which comply to rigorous standards of security and privacy (such as 2 Factor Authentication) to help eliminate risk to your data or infiltration by hackers through ‘back doors’ which partnering with security weak vendors or providers may leave open.

We endeavour to work with secure third party vendors who have a good track record of security as far as our diligence has led us to believe.

We have installed robust antivirus and security software systems on the site to prevent hackers accessing the site via such things as ‘brute force’, ‘man in the middle’ attacks and more etc.

What Data Breach Procedures Do We Have In Place?

Should there be a data breach we will execute the following procedure...

  • The Data Protection Officer ( will notify the affected parties asap (within 24 hrs of the breach being discovered).
  • Reset all passwords/review and renew all security procedures ensuring all subscribers change passwords too.
  • Work with third party vendors/developers to ascertain and stop the breach spreading/deepening.
  • Inform the ICO that a data breach has occured.
  • In extreme cases, shut down the site yet ensure there is a public notice to inform the public what is happening.
  • Ensure the subscribers and customers are communicated in a timely manner throughout the breach either via email or if that has been compromised then via the support desk/and or other channels such as Twitter etc.
  • Should the severity of the breach require it, report to relevant authorities such as the Police.
  • Call in specialist help, and including legal counsel should point 6 arise and is required.

Children's Information

Another part of our priority is adding protection for children while using the internet. We encourage parents and guardians to observe, participate in, and/or monitor and guide their online activity. does not knowingly collect any Personal Identifiable Information from children under the age of 13. If you think that your child provided this kind of information on our website, we strongly encourage you to contact us immediately and we will do our best efforts to promptly remove such information from our records.

Online Privacy Policy Only

This privacy policy applies only to our online activities and is valid for visitors to our website with regards to the information that they shared and/or collect in This policy is not applicable to any information collected offline or via channels other than this website.


By using our website, you hereby consent to our Privacy Policy and agree to its terms.