Collection of Your Information
Instances where personally identifiable information may be gathered include registrations (for example, registration on our website, in our marketing program or contests or sweepstakes) and purchases made on our website or by mail order. The types of personally-identifying information we collect may include contact information (e.g., name, postal address, email address, and phone number), credit card and ID verification information (such as credit card number and diver’s license number, where permitted by applicable law), information about your Lifestyle preferences, as well as other relevant information.
When you visit us online, we also may collect certain non-personally identifiable information, such as the type of browser you are using, the domain name of your Internet service provider, which of our pages you access, how long you spend on each page, and aggregate data about the number of visits you make and the products and services in which you are interested. The information we learn from you during your visit helps us to improve our site, respond to your requests and customize your shopping experience with Reverse Logistics Solutions.
Use of Your Information
We know that you care how information about you is used and shared, and we appreciate your trust that we will do so carefully and sensibly. We use the personally identifiable information you provide to respond to any of your questions about our products and services and for various marketing and promotional purposes.
Also, we employ other companies and individuals to perform functions on our behalf. Examples include website hosting and development, fulfilling orders, delivering packages, sending postal mail and e-mail, removing repetitive information from customer lists, analyzing data, providing marketing assistance, and processing credit card payments. They have access to personal information needed only to perform their functions. We require companies with whom we contract for outsourced services to keep data received from us confidential and use it only for the indicated purposes.
From time to time, we may supplement the information we collect with outside records to enhance our ability to serve you, tailor our content to you, and offer you opportunities to purchase products or services that we believe may be of interest to you.
Also, we may release personally-identifying information when we believe release is appropriate to comply with law or legal process (e.g., in response to a court order, subpoena or a law enforcement agency’s request) or to protect the rights or property of Reverse Logistics Solutions, westmarine.com, our users, our marketing partners or others. This includes exchanging information with other companies and organizations for fraud protection and credit risk reduction. In addition, in the event that all or substantially all of Reverse Logistics Solutions’s™ stock and/or assets are transferred or sold to another entity, we may transfer personally identifiable information to the acquiring entity.
Reverse Logistics Solutions Personal Data both as a Processor and as a Controller, as defined in the Directive and the GDPR:
Reverse Logistics Solutions entity with which you as User entered an agreement when using Reverse Logistics Solutions platform will be the Controller for User Data, as outlined above in the “Collection of User data” section.
For Respondent data as outlined in the Collection of Respondent data” section, the User will be the Controller following Directive and GDPR, and Reverse Logistics Solutions will be the Processor.
Reverse Logistics Solutions adheres to the Directive of 1995 and the GDPR from May 25, 2018. Reverse Logistics Solutions processes all data collected by Millionaire Life Services Users goes through PayPal, Amazon Web Services, WordPress, Reach Mail, Name Cheap, Facebook, Twitter, Instagram, TikTok, Pinterest, YouTube, and LinkedIn and will be stored exclusively in secure hosting facilities provided by these firms. Millionaire Life Services uses these IT vendors to ensure compliance with the Directive. All hosting is performed in accordance with the highest security regulations. All transfers of data internally in the EEA is done in accordance with this TOS data processing agreement. Each vendor independently is responsible for abiding by the GDPR initiatives, including complying with the obligations in Articles 32 to 36 of the GDPR.
All data collected by Reverse Logistics Solutions Users goes through PayPal, Amazon Web Services (10minutefunnels.com), Reach Mail, Name Cheap, and GoDaddy and will be stored exclusively in secure hosting facilities provided by these firms. Reverse Logistics Solutions uses these IT vendors to ensure compliance with the Directive. All hosting is performed in accordance with the highest security regulations. All transfers of data internally in the EEA is done in accordance with this TOS data processing agreement.
International Privacy Laws
EU – US Privacy Shield
For Personal Data we receive from the EEA, Reverse Logistics Solutions has self-certified its compliance to the EU-US Privacy Shield standard set forth by the U.S. Department of Commerce regarding collecting, using, and retaining personal data from European Union countries. We have self-certified that we adhere to the Privacy Shield Principles of Notice, Choice, Accountability for Onward Transfers, Security, Data Integrity & Purpose Limitation, Access and Recourse, Enforcement & Liability when processing Personal Data from the EEA in the United States.
Data protection policy
Reverse Logistics Solutions needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees, and other people the organization has a relationship with or may need
This policy describes how this personal data must be collected, handled, and stored to meet the company’s data protection standards and comply with the law.
Why does this policy exist
This data protection policy ensures Reverse Logistics Solutions
- Complies with data protection law and follow good practice
- Protects the rights of staff, customers, and partners
- Is open about how it stores and processes individuals’ data
- Protects itself from the risks of a data breach
Data protection law
The Data Protection Act 1998 describes how organizations — including Reverse Logistics Solutions – must collect, handle and store personal information.
These rules apply regardless of whether data is stored electronically, on paper or on other materials.
To comply with the law, personal information must be collected and used fairly, stored safely and not disclosed unlawfully.
The Data Protection Act is underpinned by eight important principles.
These say that personal data must:
Be processed fairly and lawfully
Be obtained only for specific, lawful purposes
Be adequate, relevant, and not excessive
Be accurate and kept up to date
Not be held for any longer than necessary
Processed following the rights of data subjects
Be protected in appropriate ways
People, risks, and responsibilities Policy scope
This policy applies to:
- The head office of Reverse Logistics Solutions
- All branches of Reverse Logistics Solutions
- All staff and volunteers of Reverse Logistics Solutions
- All contractors, suppliers, and other people working on behalf of Reverse Logistics Solutions
It applies to all data that the company holds relating to identifiable individuals, even if that information technically falls outside of the Data Protection Act 1998. This can include:
- Names of individuals
- Postal addresses
- Email addresses
- Telephone numbers
- …plus any other information relating to individuals
Data protection risks
This policy helps to protect Reverse Logistics Solutions from some very real data security risks, including:
- Breaches of confidentiality. For instance, information being given out inappropriately.
- Failing to offer choice. For instance, all individuals should be free to choose how the company uses data relating to them.
- Reputational damage. For instance, the company could suffer if hackers successfully gained access to sensitive data.
Everyone who works for or with Reverse Logistics Solutions has some responsibility for ensuring data is collected, stored and handled appropriately.
Each team that handles personal data must ensure that it is handled and processed in line with this policy and data protection principles.
However, these people have key areas of responsibility:
The board of directors is ultimately responsible for ensuring that Reverse Logistics Solutions meets its legal obligations.
Director of IT, is responsible for:
- Keeping the board updated about data protection responsibilities, risks and issues.
- Reviewing all data protection procedures and related policies, in line with an agreed schedule.
- Arranging data protection training and advice for the people covered by this policy.
- Handling data protection questions from staff and anyone else covered by this policy.
- Dealing with requests from individuals to see the data Reverse Logistics Solutions holds about them (also called ‘subject access requests’).
- Checking and approving any contracts or agreements with third parties that may handle the company’s sensitive data.
- Ensuring all systems, services and equipment used for storing data meet acceptable security standards.
- Performing regular checks and scans to ensure security hardware and software is functioning properly.
- Evaluating any third-party services the company is considering using to store or process data.
For instance, cloud computing services:
- Approving any data protection statements attached to communications such as emails and letters.
- Addressing any data protection queries from journalists or media outlets like newspapers.
- Where necessary, working with other staff to ensure marketing initiatives abide by data protection principles.
General staff guidelines
- The only people able to access data covered by this policy should be those who need it for their work.
- Data should not be shared informally. When access to confidential information is required, employees can request it from their line managers.
- Reverse Logistics Solutions will provide training to all employees to help them understand their responsibilities when handling data.
- Employees should keep all data secure, by taking sensible precautions and following the guidelines below.
- In particular, strong passwords must be used and they should never be shared.
- Personal data should not be disclosed to unauthorized people, either within the company or externally.
- Data should be regularly reviewed and updated if it is found to be out of date. If no longer required, it should be deleted and disposed of.
- Employees should request help from their line manager or the data protection officer if they are unsure about any aspect of data protection.
These rules describe how and where data should be safely stored. Questions about storing data safely can be directed to the IT manager or data controller.
When data is stored on paper, it should be kept in a secure place where unauthorized people cannot see it.
These guidelines also apply to data that is usually stored electronically but has been printed out for some reason:
- When not required, the paper or files should be kept in a locked drawer or filing cabinet.
- Employees should make sure paper and printouts are not left where unauthorized people could see them, like on a printer.
- Data printouts should be shredded and disposed of securely when no longer required.
When data is stored electronically, it must be protected from unauthorized access, accidental deletion and malicious hacking attempts:
- Data should be protected by strong passwords that are changed regularly and never shared between employees.
If data is stored on removable media (like a CD or DVD), these should be kept locked away securely when not being used.
- Data should only be stored on designated drives and servers and should only be uploaded to an approved cloud computing services.
- Servers containing personal data should be sited in a secure location, away from general office space.
- Data should be backed up frequently. Those backups should be tested regularly, in line with the company’s standard backup procedures.
- Data should never be saved directly to laptops or other mobile devices like tablets or smart phones.
All servers and computers containing data should be protected by approved security software and a firewall.
Data use Personal data is of no value to Reverse Logistics Solutions unless the business can make use of it. However, it is when personal data is accessed and used that it can be at the greatest risk of loss, corruption or theft:
- When working with personal data, employees should ensure the screens of their computers are always locked when left unattended.
- Personal data should not be shared informally. In particular, it should never be sent by email, as this form of communication is not secure.
- Data must be encrypted before being transferred electronically through PayPal. The IT manager can explain how to send data to authorized external contacts.
- Notice is being given that Personal data will be transferred outside of the European Economic Area.
- Employees should not save copies of personal data to their own computers. Always access and update the central copy of any data.
The law requires Reverse Logistics Solutions to take reasonable steps to ensure data is kept accurate and up to date.
The more important it is that the personal data is accurate, the greater the effort Reverse Logistics Solutions should put into ensuring its accuracy.
It is the responsibility of all employees who work with data to take reasonable steps to ensure it is kept as accurate and up to date as possible.
- Data will be held in as few places as necessary. Staff should not create any unnecessary additional data sets.
Staff should take every opportunity to ensure data is updated. For instance, by confirming a customer’s details when they call.
- Reverse Logistics Solutions will make it easy for data subjects to update the information Reverse Logistics Solutions holds about them. For instance, via the company website.
- Data should be updated as inaccuracies are discovered. For instance, if a customer can no longer be reached on their stored telephone number, it should be removed from the database.
- It is the marketing manager’s responsibility to ensure marketing databases are checked against industry suppression files every six months.
Subject access requests
All individuals who are the subject of personal data held by Reverse Logistics Solutions are entitled to:
- Ask what information the company holds about them and why.
- Ask how to gain access to it.
- Be informed how to keep it up to date.
- Be informed how the company is meeting its data protection obligations.
If an individual contacts the company requesting this information, this is called a subject access request.
Subject access requests from individuals should be made by email, addressed to the data controller at Support at ReverseLogisticsSolutions.com. The data controller can supply a standard request form, although individuals do not have to use this.
Individuals will be charged $10.00 per subject access request. The data controller will aim to provide the relevant data within 14 business days.
The data controller will always verify the identity of anyone making a subject access request before handing over any information.
Disclosing data for other reasons
In certain circumstances, the Data Protection Act allows personal data to be disclosed to law enforcement agencies without the consent of the data subject.
Under these circumstances, Reverse Logistics Solutions will disclose requested data. However, the data controller will ensure the request is legitimate, seeking assistance from the board and from the company’s legal advisers where necessary.
Reverse Logistics Solutions aims to ensure that individuals are aware that their data is being processed, and that they understand:
- How the data is being used
- How to exercise their rights
To these ends, the company has a privacy statement, setting out how data relating to individuals is used by the company and is located on this page.
We will take all reasonable efforts to delete your personal information from our database as soon as reasonably possible. Please note that even if you chose to opt out of marketing communications, we will continue to send you important service-related communications (e.g., order confirmation or product safety information). However, these are not promotional in nature. Therefore, you should not expect that all of your personally identifiable information will be completely removed from our databases in response to your requests.
Protection of Children’s Personal Information
Reverse Logistics Solutions is concerned about protecting the safety and privacy of children. We do not knowingly or specifically request or collect personally identifiable information from or about children and do not market specifically to children. We do, however, sell children’s products for purchase by adults.
Reverse Logistics Solutions uses the best security available for on-line purchasing. Your privacy and security are very important to us. When you click the “Add to Shopping Cart” button, Reverse Logistics Solutions automatically checks to see that you have a secure connection. Reverse Logistics Solutions uses Secure Sockets Layer (SSL), an encryption technology that works with the following supported browsers: Mozilla Firefox, Google Chrome, Microsoft Internet Explorer, and Apple Safari.
If your browser does not support SSL, you will need to upgrade to a newer version of a supported browser in order to perform an on-line purchase. Alternatively, you may mail or phone in your order.
As part of Reverse Logistics Solutions’s™ privacy and security practices, we do not store your credit card number in your membership file or order history. We kindly request that you validate your credit card number each time you make a secure transaction through Reverse Logistics Solutions’s™ website.
Other Legal Notices
Reverse Logistics Solutions is committed to treating your personal information in a confidential manner. We have put in place appropriate physical, electronic, and managerial procedures to safeguard and maintain data security, and correctly use the information we collect.