Your privacy is important to us
At The Game Experience Group, we are committed to protecting your personal information. This privacy policy outlines how we collect, use, and protect your data when you visit our website or use our services.

What information do we collect?
We collect basic personal information that visitors provide directly to us. This includes names, email addresses, phone numbers, and organisation details when you submit a contact form or request a consultation. We may also automatically collect information through analytics tools, such as pages visited, time on site, browser type, and general usage patterns. We do not collect sensitive information unless it is provided voluntarily.

How do we use your information?
We use the information we collect to respond to enquiries, provide requested information, and deliver the consulting services clients engage us for. We also use basic analytics to understand how visitors interact with our website, which helps us improve our content and user experience. In some cases, we use the information to maintain business records and meet legal or administrative requirements. We do not sell or share personal information for marketing purposes.

Do we share your information?
We only share personal information when it is necessary to deliver our services or operate our business. This may include trusted service providers such as website hosting, email, or analytics tools, or partners working with us on a project you have engaged us for. We may also share information if required by law. We do not sell personal information or share it for marketing purposes.

How do we protect your information?
We use Webflow as our website platform, and any information submitted through our contact form is stored securely within their system. We also utilise reputable, industry-standard tools for email and business operations. Access to personal information is limited to authorised team members and is only used for legitimate business purposes. We take reasonable steps to protect information from loss, misuse, or unauthorised access.