RESTORATIVE PRODUCTS AVAILABLE ON ETSY @LAMESPA

Privacy & Confidentiality

Privacy Policy

Privacy of personal information is an important principle. We are committed to collecting, using and disclosing personal information responsibly and only to the extent necessary for the goods and services we provide. This document describes our privacy policies.

What is Personal Information?

Personal information is information about identifiable individuals. Personal information includes information that relates to:

  • an individual’s personal characteristics (e.g., gender, age, home address or telephone number, family status);

  • health (e.g., health history, health conditions, health services received by them);

  • activities and views (e.g., opinions expressed by an individual, an opinion or evaluation of an individual).

  • Personal information is different from business information (e.g., an individual’s business address and telephone number). This is not protected by privacy legislation.

Who We Are

A holistic health & wellness brand committed to the highest standards of care provided by our therapists.

We also specializing in cosmetic products which are plant-based, handmade, cruelty free, vegan, gluten free, paraben and sulfate free and suitable for all skin types.

Like all medical professions, we collect, use and disclose personal information in order to serve our clients. For our clients, the primary purpose for collecting personal information is to provide treatment. For example, we collect information about a client’s health history, including their family history, physical condition, function and social situation in order to help us assess what their health needs are, to advise them of their options and then to provide the health care they choose to have. A second primary purpose is to obtain a baseline of health and social information so that in providing on going health services we can identify changes that occur over time.

Information Collection And Use

When you engage with our products and services, we may ask you to share your personal information.  We have listed below the categories of personal data we may collect:

Primary Purposes

Personal Information 

While using our Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. Personally identifiable information (“Personal Information”) may include, but is not limited to:

  • Name

  • Email address

  • Telephone number

  • Address

  • Identity Document (I.D.)

  • Images & Photographs

  • Opinions & Product Reviews

When you register for an account, we will also collect transactional information associated with your account such as the date you joined and your order numbers.

For example, when you place an order and/or contact our customer service department, you may provide your delivery and billing address, credit card type, credit card number and credit card expiration date. We will also collect details of your past orders.

For example, if you review the products you have purchased from us or provide information about products and/or cosmetic concerns, and the brands and products you use.

Log Data

We collect information that your browser sends whenever you visit our Service (“Log Data”). This Log Data may include information such as your computer’s Internet Protocol (“IP”) address, browser type, browser version, the pages of our Service that you visit, the time and date of your visit, the time spent on those pages and other statistics.

Cookies

Cookies are files with small amount of data, which may include an anonymous unique identifier. Cookies are sent to your browser from a web site and stored on your computer’s hard drive.

We use “cookies” to collect information. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Service.

Related and Secondary Purposes

Service Providers

We may employ third party companies and individuals to facilitate our Service, to provide the Service on our behalf, to perform Service-related services or to assist us in analyzing how our Service is used.

These third parties have access to your Personal Information only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.

Like most organizations, we also collect, use and disclose information for purposes related to or secondary to our primary purposes. The most common examples of our related and secondary purposes are as follows:

To invoice clients for goods or services that was not paid for at the time, to process credit card payments or to collect unpaid accounts.

Registered Massage Therapists are regulated by Associations, Boards and/or Provincial Regulatory Bodies. These Provincial Regulatory Bodies may inspect our records and interview our staff as a part of their regulatory activities in the public interest. In addition, as professionals, we will report serious misconduct, incompetence or incapacity of other practitioners, whether they belong to other organizations or our own. Also, our organization believes that it should report information suggesting serious illegal behavior to the authorities. External regulators have their own strict privacy obligations. Sometimes these reports include personal information about our clients, or other individuals, to support the concern (e.g., Canada Customs and Revenue Agency, Information and Privacy Commissioner, Human Rights Commission, etc.) have the authority to review our files and interview our staff as a part of their mandates. In these circumstances, we may consult with professionals (e.g., Lawyers, Accountants) who will investigate the matter and report back to us.

The cost of goods/services provided by the organization to clients is often paid for by third-parties (e.g., motor vehicle accident insurance, private insurance). These third-party payers often have the client’s consent or legislative authority to direct us to collect and disclose to them certain information in order to demonstrate client entitlement to this funding.

Protecting Personal Information 

We understand that you care how your personal information is used and/or shared with others, and we value your trust and seek to safeguard your personal information.

We implement appropriate technical and organizational security measures, including physical, administrative and technical safeguards to protect your personal information from unauthorized access, use and disclosure.

For that reason, we have taken the following steps:

  • Paper information is either under supervision or secured in a locked or restricted area.

  • Electronic hardware is either under supervision or secure in a locked or restricted area at all times. In addition, passwords are used on computers. Paper information is transmitted through sealed, addressed envelopes or boxes by reputable companies.

  • Staff is trained to collect, use and disclose personal information only as necessary to fulfill their duties and in accordance with our privacy policy.

Security

The measures we use to protect your personal information are designed to provide a level of security appropriate to the risk of processing your personal information. However, please be aware that no electronic transmission of information can be entirely secure. We cannot guarantee that the security measures that we have in place to safeguard personal information will never be defeated or fail, or that those measures will always be sufficient or effective. While we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its absolute security.

Retention and Destruction of Personal Information 

We need to retain personal information for some time to ensure that we can answer any question the client may have about the services provided and for our own accountability to external regulatory bodies.

We keep our clients files for ten years.

We destroy paper files containing personal information by shredding. We destroy electronic information by deleting it and, when the hardware is discarded, we ensure that the hard drive is physically destroyed.