Privacy Policy

Who we are

Our website address is:

What personal data we collect and why we collect it

Contact forms

Your information is stored on our private mail server. It is not shared with anyone and is kept only as long as we need to use it to contact you. It feels somewhat superfluous to mention this as it’s called a contact form so we feel that it should be self-explanatory that it’s information we use to contact you but this is the situation we find ourselves.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracing your interaction with the embedded content if you have an account and are logged in to that website.


There is local analytics software on this site. It is not run by Google. It does not need any external services, so any data about your visits is never shared with a third-party service.
Furthermore, your privacy is respected. Nothing that could lead back to a specific visitor is tracked and it is easy for you to opt-out of tracking altogether using a standardized browser setting called “Do Not Track”. The analytics plugin is additionally customised to not use cookies at all.
When you use any website the computer hosting the site will collect information about your operating system, your IP address and other details including the time spent on the site, where you visited from and the pages you viewed. This data is only stored on the server and is not made available to any third party.


Additional information

How we protect your data

If you send me an email I download it to my computer and sometimes my work phone. I lock my front door when I leave the studio and try to not lose my phone more than once or twice a year.

What data breach procedures we have in place

If someone steals my computer or backup, I’ll let you all know.

What third parties we receive data from


What automated decision making and/or profiling we do with user data

None. And honestly not much non-automated decision making either.