Becca Benning CHC & beccabenning.com adhere to the principles of the Data Protection Act 2018. We do not share personal information with third parties unless we have your permission or are required by law to do so.
How do we collect information?
When visiting our website we use a third-party service, www.healthhosts.com , who publish and host our website, to provide information on visitor statistics.
What information do we collect?
When registering for our services we might collect personal and health related information. This information is supplied by you when entering data on our website or filling in questionnaires. We also collect information during coaching sessions with you. These sessions could be in person, video call or by telephone and includes email correspondence.
Why do we collect your information?
We may ask you to fill in a questionnaire before we start coaching, in order that we can be fully aware of your state of health and sure that we are not operating outside of our Scope of Practice.
We take notes during each session to serve as a reminder to us of the key issues discussed. These will be referred back to during future sessions. This information will not be shared with any of our partners (fellow coaches, therapists or practitioners) without your express permission.
How do we store and protect your information?
We are committed to protecting and respecting your privacy. Any information that is collected during our coaching sessions is stored only in hard copy and destroyed at the end of our coaching contract.
Do you have access to the information we hold?
In accordance with the Data Protection Act 2018, clients may request to see the notes that we hold on them at any time.
In compliance with GDPR, patients have the right to:
- Access all of their information plus any other content that forms part of their record, including notes.
- Know if their personal information has been forwarded to a third-party
- Have any invalid information we hold about them corrected.
- Apply to have their personal data destroyed.
- Be notified if critical information about them is inappropriately accessed.