Transparency ledger

Privacy Policy

This extended statement explains how Stunningkneesear collects, uses, discloses, stores, and deletes personal information when you browse stunningkneesear.world, submit enquiries, attend coaching conversations, or purchase educational programmes about hydration routines. It is designed to align with the EU General Data Protection Regulation where applicable, and with the New Zealand Privacy Act 2020 for domestic processing.

Lawful bases mapped Retention tables Rights checklist Non-medical scope
01

Scope and informational-only context

Stunningkneesear publishes general informational content about hydration routines, reminder timing, and behavioural coaching. Personal data processing supports scheduling, billing where relevant, customer service, security monitoring, and statutory obligations. We do not use this website to deliver clinical diagnosis, prescribe fluid intake for medical conditions, or infer health outcomes.

If you believe information here intersects with regulated health services in your jurisdiction, pause before submitting sensitive details and consult an appropriately licensed professional. Where voluntary disclosures include special-category information, we minimise retention and segregate access.

Plain-language boundary

Coaching notes describe schedules and preferences you choose to share. They are not clinical records and should not be relied upon as medical documentation.

02

Controller details

The data controller is Stunningkneesear, reachable at Albany Mega Centre, 140 Don McKinnon Drive, Auckland 0632, New Zealand. Primary correspondence for privacy requests flows through online@stunningkneesear.world. Telephone enquiries may be initiated via +64 9 941 4906; complex requests are confirmed in writing to maintain an audit-friendly trail.

Where processing occurs jointly with a collaborating facilitator under a co-branded workshop, contracts specify independent-controller versus joint-controller responsibilities before marketing materials go live.

03

Categories of personal data

We aim to collect the minimum information necessary for each interaction. The inventory below is illustrative; not every category applies to every visitor.

Category Examples Typical context
Identity and contact Name, email address, phone number, organisation Enquiry forms, invoicing, calendar invitations
Relationship data Workshop preferences, reminder cadence notes Coaching preparation worksheets
Transaction data Invoice identifiers, payment confirmation references Purchases of programmes or challenges
Technical metadata IP address, browser type, device hints Hosting logs, abuse prevention
Consent artefacts Cookie preference JSON, newsletter opt-in timestamps Preference centre and audit logs
04

Sources we collect from

  • Information you submit through web forms, email signatures, or handwritten intake sheets transcribed with consent.
  • Calendar integrations you authorise for scheduling automation.
  • Payment services that relay confirmation tokens rather than full card numbers.
  • Infrastructure providers that generate standard server logs.
  • Referral partners who introduce you with explicit permission to share limited contact details.
05

Purposes and lawful bases

Lawful bases depend on context. Where GDPR applies, we document the primary basis below. Where New Zealand law applies without an identical taxonomy, we rely on comparable grounds such as authorised purpose and reasonable expectation.

Processing activity GDPR basis (where relevant) NZ anchor
Answering enquiries and delivering contracted coaching Contract and legitimate interests Purpose connected to collection
Sending optional newsletters after opt-in Consent Express permission
Fraud monitoring and security analytics Legitimate interests Protection of lawful interests
Tax and accounting retention Legal obligation Statutory compliance

Legitimate interest balancing

Before relying on legitimate interests for outbound operational mail or aggregated analytics, we weigh your expectations against our need to maintain service reliability. You may object by emailing the privacy inbox; we pause processing unless compelling grounds override your interests.

06

Recipients and processors

Processors receive instructions through data-processing agreements describing confidentiality, subprocessors, and deletion timelines. Categories include secure email providers, calendar middleware, accounting suites, and encrypted backup storage.

We do not sell personal information as a standalone commodity. Any future disclosure to acquirers during a business transfer would be preceded by diligence reviews and user notification consistent with applicable law.

07

International transfers

Cloud tooling may store encrypted replicas outside New Zealand or the European Economic Area. When GDPR applies, we implement Standard Contractual Clauses, supplementary technical measures such as encryption at rest, and transfer impact assessments documented internally.

08

Retention schedule

Record type Default window Deletion mechanics
Website enquiry threads without contract Up to twenty-four months after last reply Mailbox archival purge plus CRM scrub
Signed coaching agreements Seven years aligned with tax guidance Secure shredding after legal hold release
Server logs Rolling ninety days unless incident flagged Automated log rotation
Marketing consent proof Until withdrawn plus thirty-six months evidentiary buffer Anonymised aggregates retained separately
09

Security programme

Administrative controls

Role-based access, onboarding checklists, confidentiality clauses for contractors, quarterly access reviews.

Technical controls

TLS for transport security, disk encryption on laptops handling client notes, endpoint monitoring where deployed.

No stack eliminates risk entirely. Report suspected unauthorised access immediately using the contact strip at the end of this policy.

10

Your rights

  • Access: Obtain a copy of personal data we maintain subject to statutory exemptions.
  • Rectification: Correct outdated mailing addresses or spelling errors within reasonable timelines.
  • Erasure: Request deletion where continued processing lacks justification, acknowledging overlapping duties such as accounting retention.
  • Restriction: Pause certain processing while disputes resolve.
  • Portability: Receive structured machine-readable exports where technically feasible.
  • Objection: Object to legitimate-interest processing tied to direct outreach.

NZ-specific reminder

Information Privacy Principles under the Privacy Act 2020 reinforce expectations of fairness and transparency. If you are unsatisfied after contacting us, you may escalate concerns to the Office of the Privacy Commissioner in New Zealand.

11

Automated decisions

We do not deploy automated decision-making that produces legal or similarly significant effects. Analytics dashboards summarise aggregate traffic and remain disconnected from individual profiling for adjudication.

12

Children

Offerings target adults balancing professional schedules. If you believe a minor submitted data without guardian oversight, notify us promptly so we can delete records not required for lawful defence.

13

Marketing preferences

Optional campaigns honour granular consent captured through forms or cookie banners. Each marketing email includes unsubscribe mechanics processed within ten business days unless technical backlog requires transparent communication.

14

Incident response

Suspected breaches trigger containment, logging, impact assessment, regulator notification where thresholds trigger, and affected individual advisories when high risk exists. Post-incident reviews inform policy revisions.

15

Complaints and regulators

We encourage informal resolution first. EU residents may contact their supervisory authority without prejudice to judicial remedies. New Zealand residents may engage the Office of the Privacy Commissioner after exhausting reasonable dialogue with our team.

16

Changes and versioning

Material updates revise this page and, where appropriate, summarise modifications via email to active clients. Continued use after conspicuous posting constitutes acknowledgement unless fresh consent is legally mandated.

Exercise your privacy rights

Route structured requests through the contact form or privacy inbox with “Privacy request” in the subject line so routing stays swift.

Contact channel