We are gasworld conferences and our website address is: https://www.gasworldconferences.com.
Should you get in touch with us through the website, e.g. with a sponsorship request, booth request, or similar we will retain this information on our servers
until the user’s account is removed from our records or a data deletion request is made by the user.
We use analytics to help us provide the best content we can to the audience. We are using Google Analytics to help us do so. Besides Analytics we are also using Hotjar to help us improve placements of elements on the website and make sure we can offer you the best browsing experience.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, or edit their personal information at any time (except they cannot change their username). You can also request the data we hold on you or request an account deletion if you wish to delete your data. Website administrators can also see and edit that information except passwords.
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
You can get in touch with us by phone or email. The details can be found at the footer of every page.
We try our best to make sure your data is securely stored on our servers. Every bit of sensitive information is stored in encrypted form on our servers. Software, as well as hardware is
kept up-to-date to ensure further security. We aim to stay on top of security to ensure you are having a safe and secure browsing experience using our services.
Should we encounter a data breach within our servers, we will try to locate the origin, close the possible breach, assess the situation and let the users know what data may have been breached.
In case of a breach, the attackers would only get encrypted data which is useless since we have several encryption mechanisms implemented to make sure your data is stored securely.