Privacy policy

Who we are

Our website is:

What personal information we collect and why


When visitors leave comments on the site, we collect the data shown in the response form, the IP address of the visitor and the browser user agent to help detect spam. An anonymized string created from your email address (also called a hash) can be provided to the Gravatar service to see if you are using it. The Gravatar service’s privacy policy is available here: After your comment has been approved, your profile picture will be visible to the public in the context of your comment.


When you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS). Visitors to the website can download and extract location data from images on the website.

Contact forms


If you leave a comment on our site, you can choose to store your name, email address and website in cookies. These are for your convenience so you don’t have to refill your details if you leave another comment. These cookies last for a year.

Embedded content from other websites

Articles on this site may contain embedded content (e.g. Videos, images, articles, etc.). Embedded content from other websites behaves exactly the same as if the visitor has visited the other website. These websites may collect data about you, use cookies, embed third-party tracking, and monitor your interaction with that embedded content, including your interaction with the embedded content if you have an account and are logged into that website.


Who do we share your data with?

Google Analytics

How long we keep your data

If you leave a comment, the comment and metadata will be retained indefinitely. This is so that we can automatically recognize and approve follow-up comments instead of keeping them in a moderation row.

What rights you have over your data

Where we send your data

Visitor comments can be monitored by an automated spam detection service.

Your contact information

Additional information

How do we protect your data

What procedures for data breaches have we set up

From which third parties we receive data

What automated decision-making and/or profiling we do with user data

Industry disclosure requirements