This web site (including www.greysky.co.uk, www.grey-sky.co.uk and all related websites) is administered by Grey Sky Consulting Ltd (GreySky) with the main aim of describing and promoting GreySky’s business and services. We are committed to ensuring your privacy in using this site. The following explains what information is, or may be, collected through your use of this site, and how it may be used.
How do we collect information?
We aim to collect information using this web site in two ways – automatically through the site’s technology, and with your involvement through email.
What information do we collect, and how do we use it?
Through the site’s technology we will collect information of traffic to the site, and its different sections. We will use this information from time to time to ensure and improve the effectiveness of the site in marketing our services. We may also use this information as part of our work with other client businesses as reference data to develop or analyse the performance of their’ web sites.
The site provides email contacts to help you to contact us to find out more about our services and help our clients monitor and manage our projects with them. We may use contact details obtained through these email contacts to promote GreySky’s current or future services. In cases where we are not able to provide the services you require we may also be able to suggest alternative consultants or businesses who can – we will only pass on your contact details with your permission.
Sensitive or personal information
This site does not use encryption or any other systems to ensure the security of the data you supply through it. It is not the intention of the site to gather sensitive or personal data and we advise you not to send information of this type using non secure emails.
Security of information collected
We will take appropriate action to ensure the security of information collected through this web site. You should understand that the open nature of the Internet is such that data may flow over networks without security measures and may be accessed and used by people other than those for whom the data is intended.