Your privacy is important – we are dedicated to protecting yours. Any information we collect is used only to provide you with better services to process your purchases, manage your account and increase your benefit for frequenting our site. We take privacy seriously and as such we take precautions to ensure that none of your privacy rights are violated.
SECURING YOUR PRIVACY
Our investment website (RegalAssets.com) is a Norton standard secured server powered by VeriSign with an up to date SSL certificate utilizing the exact same online security measures as Bank of America, Citibank, Ally Bank and all major financial institutions. Your private information is never shared with unauthorized parties and is stored in our fully encrypted database giving you absolute security on the most sensitive information that you submit.
PROTECTING YOUR PERSONAL INFORMATION
We have implemented a number of security procedures to secure protection of our client personal information. Your personal information is contained within securely controlled networks and can only be accessed by employees with the appropriate level of access. Any personal information shared by our employees is transmitted through a secure connection and is safely stored in our encrypted database.
PROTECTING YOUR PERSONAL EMAIL
All e-mails that are sent out from authorized representatives are sent from a secured server increasing the protection of your private information. Generally all e-mails will contain an opt-out link which you can click to have your name removed permanently from our e-mail list. We do not send unsolicited e-mails and will only add you to our e-mail list if you have requested specific information. We value your privacy and will never share your e-mail address with an unauthorized party.
COOKIES AND TRACKING
We utilize cookies and tracking pixels to increase our productivity and overall client experience. A cookie is a small data string that is written on your computer hard drive by a web server. (A web server is the computer that hosts a website and responds to requests received from your computer). Cookies can play an important role in providing a great customer experience using the web. Among other things, cookies enable a website to maintain information when a user’s web browser requests a series of web pages. Without cookies, for example, a website owner may not be able to recognize that a user just completed the first step during an ordering process so that the second step can be presented.
Cookies generally hold information, including data strings that contain a unique user ID which allow our website and our affiliates, agents and partners, to customize your experiences and gather information relevant to what you may be interested in. For example, cookies allow us, and others who place and access cookies on our website, to deliver advertising and other content specific to your interests, keep track of your purchases and alert you to new products or promotional opportunities based on your current services.
We also collect identifiable information through the use of tracking pixels. A tracking pixel is a transparent graphic image (usually 1 pixel x 1 pixel) that is placed on a web page and, in combination with a cookie, allows for the collection of information regarding the use of the web page that contains the tracking pixel. We use tracking pixels to tell when an advertisement has been clicked on or otherwise interacted with, track the web traffic of affiliates, agents and partners and use that information to judge which advertisements are more appealing to users and which affiliate, agents and partners are successful with their marketing efforts. With tracking pixels and cookies our affiliates, agents and partners who have referred business to us are able to access limited private information such as first name, IP address, potential investment amount and the state or region of the referral who accessed our website. Affiliates, agents and partners have access to this limited private information so that they can fine tune and tailor their individual marketing campaigns toward specific demographics. In all cases, we use third-party service providers to help us collect and analyze this information.
Our website contains web beacons in the form of clear .gif files, which are electronic images that allow for the collection of information about your interactions on our sites. Web beacons may be used to place advertisements, to understand website traffic patterns and the number of visitors to our website, and to measure the effectiveness of advertisements or email advertising messages.
Data Protection Policy (UK/EU)
What happens with your data will depend on the service you are requesting. Upon requesting information or requesting to open a bullion account, your data will be sent to a jurisdiction outside of the UK to the United States of America. The United States of America handles data differently and fully in line with local data protection laws.
Any other data is held in line with the following policy:
1.1 Everyone has rights with regard to how their personal information is handled. During the course of our activities we will collect, store and process personal information about our staff and customers, and we recognize the need to treat it in an appropriate and lawful manner.
1.2 The types of information that we may be required to handle include details of current, past and prospective employees, suppliers, customers and others that we communicate with. The information, which may be held on paper or on a computer or other media, is subject to certain legal safeguards specified in the Data Protection Act 1998 (the Act) and other regulations. The Act imposes restrictions on how we may use that information.
1.3 This policy does not form part of any employee’s contract of employment and it may be amended at any time. Any breach of this policy will be taken seriously and may result in disciplinary action.
Status of the policy
1.4 This policy sets out our rules on data protection and the legal conditions that must be satisfied in relation to the obtaining, handling, processing, storage, transportation and destruction of personal information.
1.5 The Data Protection Compliance Manager is responsible for ensuring compliance with the Act and with this policy. Our Data Protection Compliance Manager can be contacted at firstname.lastname@example.org. Any questions or concerns about the operation of this policy should be referred in the first instance to the Data Protection Compliance Manager.
1.6 If you consider that the policy has not been followed in respect of personal data about yourself or others you should raise the matter with your line manager or the Data Protection Compliance Manager.
Definition of data protection terms
1.7 Data is information which is stored electronically, on a computer, or in certain paper-based filing systems.
1.8 Data subjects for the purpose of this policy include all living individuals about whom we hold personal data. A data subject need not be a UK national or resident. All data subjects have legal rights in relation to their personal data.
1.9 Personal data means data relating to a living individual who can be identified from that data (or from that data and other information in our possession). Personal data can be factual (such as a name, address or date of birth) or it can be an opinion (such as a performance appraisal).
1.10 Data controllers are the people who or organisations which determine the purposes for which, and the manner in which, any personal data is processed. They have a responsibility to establish practices and policies in line with the Act. We are the data controller of all personal data used in our business.
1.11 Data users include employees whose work involves using personal data. Data users have a duty to protect the information they handle by following our data protection and security policies at all times.
1.12 Data processors include any person who processes personal data on behalf of a data controller. Employees of data controllers are excluded from this definition but it could include suppliers which handle personal data on our behalf.
1.13 Processing is any activity that involves use of the data. It includes obtaining, recording or holding the data, or carrying out any operation or set of operations on the data including organizing, amending, retrieving, using, disclosing, erasing or destroying it. Processing also includes transferring personal data to third parties.
1.14 Sensitive personal data includes information about a person’s racial or ethnic origin, political opinions, religious or similar beliefs, trade union membership, physical or mental health or condition or sexual life, or about the commission of, or proceedings for, any offence committed or alleged to have been committed by that person, the disposal of such proceedings or the sentence of any court in such proceedings. Sensitive personal data can only be processed under strict conditions, and will usually require the express consent of the person concerned.
Data protection principles
Anyone processing personal data must comply with the eight enforceable principles of good practice. These provide that personal data must be:
(a) Processed fairly and lawfully.
(b) Processed for limited purposes and in an appropriate way.
(c) Adequate, relevant and not excessive for the purpose.
(e) Not kept longer than necessary for the purpose.
(f) Processed in line with data subjects’ rights.
(h) Not transferred to people or organisations situated in countries without adequate protection.
Fair and lawful processing
1.15 The Act is intended not to prevent the processing of personal data, but to ensure that it is done fairly and without adversely affecting the rights of the data subject. The data subject must be told who the data controller is (in this case Felix J. Torres), who the data controller’s representative is (in this case the Data Protection Compliance Manager), the purpose for which the data is to be processed by us, and the identities of anyone to whom the data may be disclosed or transferred.
1.16 For personal data to be processed lawfully, certain conditions have to be met. These may include, among other things, requirements that the data subject has consented to the processing, or that the processing is necessary for the legitimate interest of the data controller or the party to whom the data is disclosed. When sensitive personal data is being processed, more than one condition must be met. In most cases the data subject’s explicit consent to the processing of such data will be required.
Processing for limited purposes
Personal data may only be processed for the specific purposes notified to the data subject when the data was first collected or for any other purposes specifically permitted by the Act. This means that personal data must not be collected for one purpose and then used for another. If it becomes necessary to change the purpose for which the data is processed, the data subject must be informed of the new purpose before any processing occurs.
Adequate, relevant and non-excessive processing
Personal data should only be collected to the extent that it is required for the specific purpose notified to the data subject. Any data which is not necessary for that purpose should not be collected in the first place.
Personal data must be accurate and kept up to date. Information which is incorrect or misleading is not accurate and steps should therefore be taken to check the accuracy of any personal data at the point of collection and at regular intervals afterwards. Inaccurate or out-of-date data should be destroyed.
Personal data should not be kept longer than is necessary for the purpose. This means that data should be destroyed or erased from our systems when it is no longer required.
Processing in line with data subject’s rights
Data must be processed in line with data subjects’ rights. Data subjects have a right to:
(a) Request access to any data held about them by a data controller.
(b) Prevent the processing of their data for direct-marketing purposes.
(c) Ask to have inaccurate data amended.
(d) Prevent processing that is likely to cause damage or distress to themselves or anyone else.
1.17 We must ensure that appropriate security measures are taken against unlawful or unauthorized processing of personal data, and against the accidental loss of, or damage to, personal data. Data subjects may apply to the courts for compensation if they have suffered damage from such a loss.
1.18 The Act requires us to put in place procedures and technologies to maintain the security of all personal data from the point of collection to the point of destruction. Personal data may only be transferred to a third-party data processor if he agrees to comply with those procedures and policies, or if he puts in place adequate measures himself.
1.19 Maintaining data security means guaranteeing the confidentiality, integrity and availability of the personal data, defined as follows:
(a) Confidentiality means that only people who are authorized to use the data can access it.
(b) Integrity means that personal data should be accurate and suitable for the purpose for which it is processed.
(c) Availability means that authorized users should be able to access the data if they need it for authorized purposes. Personal data should therefore be stored on our central computer system instead of individual PCs.
1.20 Security procedures include:
(a) Entry controls. Any stranger seen in entry-controlled areas should be reported.
(b) Secure lockable desks and cupboards. Desks and cupboards should be kept locked if they hold confidential information of any kind. (Personal information is always considered confidential.)
(c) Methods of disposal. Paper documents should be shredded. Floppy disks and CD-ROMs should be physically destroyed when they are no longer required.
(d) Equipment. Data users should ensure that individual monitors do not show confidential information to passers-by and that they log off from their PC when it is left unattended.
Dealing with subject access requests
A formal request from a data subject for information that we hold about them must be made in writing. A fee is payable by the data subject for provision of this information. Any member of staff who receives a written request should forward it to Felix J. Torres immediately.
Providing information over the telephone
Any member of staff dealing with telephone inquiries should be careful about disclosing any personal information held by us. In particular they should:
(e) Check the caller’s identity to make sure that information is only given to a person who is entitled to it.
(f) Suggest that the caller put their request in writing if they are not sure about the caller’s identity and where their identity cannot be checked.
(g) Refer to Felix J. Torres for assistance in difficult situations. No-one should be bullied into disclosing personal information.
Monitoring and review of the policy
1.21 This policy is reviewed monthly by our board of directors. Recommendations for any amendments are reported to the entire BGKB workforce.
1.22 We will continue to review the effectiveness of this policy to ensure it is achieving its stated objectives.
Legal Policies Update
August 11, 2019