Privacy Policy

By law I have to provide a privacy policy.

In a nutshell:

My system collects anonymous data to show me how many people have looked at my website recently.

The only personal information I receive is from anyone who uses the Contact form to get in touch. If you have a genuine message for me, I will be notified of your name, email address, the date and time of your enquiry, and the content of your message. I will use this information to reply to you.

Messages received via the Contact form which appear to be spam will be directed to the website’s spam box, where I can check to see no genuine messages have been sent there erroneously, and can then delete all the rubbish at a stroke.

My website does not provide any opportunity for anyone to comment publicly, upload any material, “follow” me, subscribe to anything, or make payments of any kind.

Below is the legal information I have to provide about the way my website captures and uses data:

Contact Form

Data Used: Akismet is enabled on this site. 

This means the contact form submission data — IP address, user agent, name, email address, website, and message — is submitted to the Akismet service for the sole purpose of spam checking. The actual submission data is stored in the database of the site on which it was submitted and is emailed directly to the owner of the form (i.e. the site author who published the page on which the contact form resides). This email will include the submitter’s IP address, timestamp, name, email address, website, and message.

Data Synced: Post and post meta data associated with a user’s contact form submission. As Akismet is enabled on the site, the IP address and user agent originally submitted with the comment are synced, as well, as they are stored in post meta.

Google Analytics

Google Analytics anonymously tracks visits to my website.

Data Used: Click here to see the type of data which Google Analytics collects.

Activity Tracked: This feature sends page view events (and any video play events) to Google Analytics for analysis.


This feature is used to protect the website from any unauthorised person trying to log in and make changes.

Data Used: In order to check login activity and potentially block fraudulent attempts, the following information is used: attempting user’s IP address, attempting user’s email address/username (i.e. according to the value they were attempting to use during the login process), and all IP-related HTTP headers attached to the attempting user.

Activity Tracked: Failed login attempts (these include IP address and user agent).

Data Synced: Failed login attempts, which contain the user’s IP address, attempted username or email address, and user agent information.