Acceptance of Terms of Use

Use of the web site is subject to acceptance of the terms and conditions stated. English Law and the jurisdiction of the English courts govern these conditions. By using the site, you are deemed to have accepted the terms and conditions. If you find the conditions to be unacceptable, you should terminate your use of the site immediately. We reserve the right to amend or append to these terms and conditions at any time without notice.

Definitions

"The site" or "the sites" shall be taken to mean the website alisonthompson.co.uk

No representations or warranties

The content of this site is provided in good faith and all reasonable care has been taken to ensure that the information is accurate and up to date, as at the time of publication. However, no guarantees are given and no liability is accepted for any inaccuracy or omission or your reliance on information contained in the site. We reserve the right to alter, delete or discontinue any part of the site without notice.

Copyright

Copyright © Alison Thompson. All rights reserved.

All content and images on this website are the property of Alison Thompson and are protected under UK and International copyright laws. Copying, downloading, saving as digital files, printing, or reproducing in any way without the prior written permission of Alison Thompson is strictly forbidden and would constitute a breach of copyright.

This site is not a source of free content or images and use of any content or image for any purpose is chargeable, to be agreed in advance of image use.

The programming source code and all site content produced or designed by Alison Thompson whether text or graphics, remain the property of Alison Thompson. Reproduction of the site either in part or complete, in any form is prohibited without the express written permission of Alison Thompson.

Security SSL

An SSL Certificate consists of a public key and a private key. The public key is used to encrypt information and the private key is used to decipher it. When a browser points to a secured domain, a secure sockets layer authenticates the server and the client and initiates encryption and a unique session key. This then starts a secure session, that guarantees the privacy of data.

Changes to terms and conditions

We reserve the right to make changes to the terms and conditions from time to time, if it is deemed necessary.