Who we are
We at The Event Room respect our clients privacy.
Our website address is: https://www.theeventroom.com.au.
What personal data we collect and why we collect it
We collect contact information via contact forms so that we can communicate with you. This contact information is securely stored in our websites database and is only accessible by our staff or authorised website administrators. We do not share your contact information with any third parties without your consent.
If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
We use website analytics software which helps us understand how users interact with our site. These cookies are anonymous.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Who we share your data with
If you request a password reset, your IP address will be included in the reset email.
We do not share your data with any third parties without your explicit consent.
How long we retain your data
Data we collect via our contact form is retained securely in our database indefinitely.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor comments may be checked through an automated spam detection service.
How we protect your data
Our website uses SSL encryption to secure communication between the user and the website. We also use industry leading security software to monitor the integrity of our site and attempts to compromise it. Administration access to our systems is restricted to appropriate employees and authorised web administrators.
What data breach procedures we have in place
In the event of a data breach we will inform any users whose data has been compromised and will take all efforts to address any security issues uncovered.