Butter Tart Trail Four locations on the Kawarthas Northumberland Butter Tart Trail are located in Trent Hills. We recommend you...
The Un4gettable Destination
The Chamber seeks consent for all personal information it collects, uses and discloses through information provided to individuals prior to collection, or at the time of collection.
As required by the PIPEDA, the Chamber will not use personal information for any purpose other than that for which that person or organization consented. Should the Chamber require personal information for a new purpose, it will contact the individual or organization to seek consent for that new use.
Limits for Collecting, Using, Disclosing and Keeping Personal Information
The Chamber does not collect, use or disclose personal information except when consent has been given on a voluntary basis. There may be occasions where more specific personal information is necessary for the Chamber to proceed with a request for information, or provide a product or service. In such cases, it will provide a description of the information required. In all cases, the Chamber limits the amount and type of information collected to that which is required to provide the product or service. Whatever the case, such information will be kept strictly confidential.
With reference to the above, the Chamber will retain active personal information only as long as is necessary to provide the requested product, service or information. To facilitate legal reporting and retention requirements the Chamber archives inactive information.
Safeguarding Personal Information
The Chamber respects the privacy of our members, partners, potential website visitors and Internet users and will protect that privacy as vigorously as possible. It stores personal information in electronic and physical files that are secure. Unfortunately, no data transmission over the Internet can be guaranteed to be 100% secure. While the Chamber strives to protect personal information, it cannot absolutely ensure or warrant the security of any information electronically transmitted or received. Therefore, while the Chamber cannot protect the information in transit, once it is received, it undertakes to ensure its security on the Chamber’s servers.