What information do we collect?
We collect information from you when you register on the Bunny Bash website or fill out the interest form on our website and real-world marketing channels. We collect personally identifiable information such as email address, name phone number, geography etc.
You can browse through some sections of our website without registration. If you browse through this site without providing us with any personal information, we will gather and store some information about your visit, such as IP address, type of browser and operating system used, date and time you access our site, pages you visit, and if you linked to our website from another website, the address of that website. This information will not identify you personally and will not be linked back to you.
What do we do with the information provided by you?
To personalize the offers, experiences, services, and communication.
To improve our web and application platforms based on your feedback and reviews
Improving customer service and TOR (Time Of Response) towards quires
To send periodic emails, SMS, web notifications for new products, experiences, rental services, services or any appropriate information related to contest, promotion, survey or other site feature.
What disclaimer do we have towards your personal information?
We do not sell, trade or otherwise transfer your personally identifiable information to outside parties. This does not include trusted third parties and our affiliates who assist us in operating our web and app platform, conducting our business or servicing you, so long as those parties agree to keep your information confidential. We may also release your information when it is necessary to comply with the law, enforce our site policies, or protect ours or others rights, property or safety. However, non-personally identifiable visitor information may be provided to other parties for insights, marketing, and other uses.
Are we responsible for the third-party links?
What do we do to keep your data safe?
Our websites combine industry-approved physical, electronic and procedural safeguards to ensure that your information is well protected though it's life cycle in our infrastructure. Sensitive data is hashed or encrypted when it is stored in our infrastructure. Sensitive data is decrypted, processed and immediately re-encrypted or discarded when no longer necessary. We host web services in audited data centers, with restricted access to the data processing servers. Controlled access, recorded and live-monitored video feeds, 24/ 7 staffed security and biometrics provided in such data centers ensure that we provide secure hosting.