At Mavors Investment Managers LLP ('MIM'), we recognise the importance of protecting information, and the specific concerns of the internet user about the type of information which is gathered, and which can be tracked on websites, how that information is used and with whom it is shared.
The information we collect about you is for the sole purpose of identifying you as a potential suitable investor into the funds we manage. This information will include your name, address, telephone number, and any other contact details either about you or the company you represent. It includes information which either you give to us, or which we obtain about you, through the use of this site, and/or in connection with any products we provide to you.
We may also gather information about you from our site. This will include information on an individual basis from areas of our site that requires site visitors to logon using an access code (e.g. userID and/or password).
You agree that we may disclose your information to third parties, including our funds' administrators, when we are considering your suitability and as part of the application process. We will only share your information on the condition that these third parties keep your information strictly confidential.
We may share your information with any governmental, or regulatory body, if required to do so by law. Otherwise we will not use your information for any other purpose.
We do not use or send cookies via this internet site. A cookie is a small piece of information that an internet site sends to a website visitor's computer. In some cases it is stored on the visitor's computer's hard drive. Cookies can save the visitor's name, password, username, screen preferences and the pages of the site viewed by the visitor.
We do not accept any responsibility for the privacy policies and customer information practices of any third party internet websites hyperlinked from our site.
We work hard to ensure that our systems are secure and that they meet industry standards. Where appropriate, we employ firewalls, encryption technology, user authentications systems (e.g. passwords and personal identification numbers) and access control mechanisms to control access to systems and data. We will continue to assess new technology to evaluate its ability to provide additional protection for your personal information.