At George Fethers, we are committed to ensuring the privacy of your information. We understand that, as a visitor to the George Feathers website, your personal information is important to you. The following statement addresses relevant privacy issues for George Fethers. If you have any further questions relating to this privacy statement, please do not hesitate to contact us.


For each visitor to our website, our site analytics collects the following type of information for statistical purposes:

The number of users who visit the website

The date and time of visits

The number of pages viewed

Traffic patterns

This is anonymous statistical data. No attempt will be made to identify users or their browsing activities. We use this data to evaluate our website performance and improve our content and online offerings.


When you provide us with personal details (i.e. when contacting George Fethers about our services), we will request personal information such as your name, address, e-mail address and a contact phone number. This information is important so we may contact you when necessary on issues relating directly to our service.

We will not use your personal information for any purpose that is not related to the services we provide to you or for any purpose for which you would not reasonably expect us to use the information. We will never sell or disclose your information to any individual or entity outside Geroge Fethers for marketing purposes.


We may use your email address to send you regular communications, which may provide information, or updates on our services.

It is our policy to only email customers who give us permission to do so. If we send you an email for a commercial purpose, we will give you the option of not receiving further communications of this nature.


When capturing customer data it is sent through our secure encryption technology to ensure that your information is protected when being sent over the Internet. Additionally, all stored customer information is protected from unauthorised access through the use of secure passwords and user logons or other security procedures.