What personal information do we collect from the people that visit our blog, website or app?
We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via email or other direct contact from you. We will not sell, share or rent this information to anyone.
We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization, other than as necessary to fulfill your request, e.g. to ship an order.
You can do the following at any time by contacting us via the email address or phone number given on our website:
- See what data we have about you, if any.
- Change/correct any data we have about you.
- Have us delete any personal database information we have about you.
- Express any concern you have about our use of your data.
How do we use your information?
We may use the information we collect from you:
- To improve our website in order to better serve you.
- To allow us to better service you in responding to your customer service requests.
- To administer a contest, promotion, survey or other site feature.
- To ask for ratings and reviews of services or products
- To follow up with them after correspondence (email or phone inquiries)
How do we protect your information?
Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.
We use regular Malware Scanning.
Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
We implement a variety of security measures when a user makes a reservation or accesses their information to maintain the safety of your personal information.
All transactions are processed through a gateway provider and are not stored or processed on our servers.
Do we use ‘cookies’?
- Understand and save user’s preferences for future visits.
- Keep track of advertisements.
- Compile aggregate data about site traffic and site interactions in order to offer better site experiences and tools in the future. We may also use trusted third-party services that track this information on our behalf.
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser’s Help Menu to learn the correct way to modify your cookies.
If you turn cookies off, some features will be disabled. It might affect the user’s experience that make your site experience more efficient and may not function properly.
However, you will still be able to make reservations.
We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information unless we provide users with advance notice. This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or serving our users, so long as those parties agree to keep this information confidential. We may also release information when it’s release is appropriate to comply with the law, enforce our site policies, or protect ours or others’ rights, property or safety.
However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.
Occasionally, at our discretion, we may include or offer third-party products or services on our website. These third-party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites.
Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en
We use Adwords and AdRoll Advertising on our website.
We have implemented the following:
- Remarketing with Google AdRoll
- Google Display Network Impression Reporting
- Demographics and Interests Reporting
We, along with third-party vendors such as Google use first-party cookies (such as the Google Analytics cookies) and other third-party identifiers together to compile data regarding user interactions with ad impressions and other ad service functions as they relate to our website.
Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising Initiative Opt Out page or by using the Google Analytics Opt Out Browser add on.
California Online Privacy Protection Act
According to CalOPPA, we agree to the following:
Users can visit our site anonymously.
How does our site handle Do Not Track signals?
We honor Do Not Track signals and Do Not Track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
Does our site allow third-party behavioral tracking?
It’s also important to note that we allow third-party behavioral tracking
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under the age of 13 years old, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States’ consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
We do not specifically market to children under the age of 13 years old.
CASL (Canada Anti-Spam Legislation)
We comply with Canada’s anti spam Legislation you will always have the opportunity to opt-in or opt-out of all email communications.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify the users via in-site notification
- Within 7 business days
We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.
CAN SPAM Act
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
We collect your email address in order to:
- Send information, respond to inquiries, and/or other requests or questions
- Process orders and to send information and updates pertaining to orders.
- Send you additional information related to your product and/or service
- Market to our mailing list or continue to send emails to our clients after the original transaction has occurred.
To be in accordance with CANSPAM, we agree to the following:
- Not use false or misleading subjects or email addresses.
- Identify the message as an advertisement in some reasonable way.
- Include the physical address of our business or site headquarters.
- Monitor third-party email marketing services for compliance, if one is used.
- Honor opt-out/unsubscribe requests quickly.
- Allow users to unsubscribe by using the link at the bottom of each email.
If at any time you would like to unsubscribe from receiving future emails, you can email us at
- Follow the instructions at the bottom of each email.
and we will promptly remove you from ALL correspondence.
Quality Inn Winkler WiFi Wireless Networking Acceptable Use Policy
We are offering this guest Wi-Fi wireless Internet service (the “Service”) according to this Guest Wi-Fi
Wireless Networking Acceptable Use Policy (the “Policy”) as a free, non-public service to its visitors for
the duration of their official visits. All users of this Service must agree to the terms of this Policy by
clicking the ACCEPT button below. We do not guarantee the Service or specific rates of speed. We also
have no control over information obtained through the Internet and cannot be held responsible for its
content or accuracy. Use of the service is subject to the user’s own risk. We reserve the right to remove,
block, filter, or restrict by any other means any material that, in our sole discretion, may be illegal, may
subject us to liability, or may violate this Policy. We may cooperate with legal authorities and/or third
parties in the investigation of any suspected or alleged crime or civil wrong. Violations of this Policy may
result in the suspension or termination of access to the Service or other resources, or other actions as
Responsibilities of Service Users:
Users are responsible for ensuring they are running up-to-date anti-virus software on their wireless
devices. Users must be aware that, as they connect their devices to the Internet through the Service, they
expose their devices to: worms, viruses, Trojan horses, denial-of-service attacks, intrusions, packet-
sniffing, and other abuses by third-parties. Users must respect all copyrights. Downloading or sharing
copyrighted materials is strictly prohibited. The running of programs, services, systems, processes, or
servers by a single user or group of users that may substantially degrade network performance or
accessibility will not be allowed. Electronic chain letters and mail bombs are prohibited. Connecting to
"Peer to Peer" file sharing networks or downloading large files, such as CD ISO images, is also
prohibited. Accessing another person's computer, computer account, files, or data without permission is
prohibited. Attempting to circumvent or subvert system or network security measures is prohibited.
Creating or running programs that are designed to identify security loopholes, to decrypt intentionally
secured data, or to gain unauthorized access to any system is prohibited. Using any means to decode or
otherwise obtain restricted passwords or access control information is prohibited. Forging the identity of a
user or machine in an electronic communication is prohibited. Saturating network or computer resources
to the exclusion of another's use, for example, by overloading the network with traffic such as emails or
legitimate (file backup or archive) or malicious (denial of service attack) activity, is prohibited. Users
understand that wireless Internet access is inherently not secure, and users should adopt appropriate
security measures when using the Service. We highly discourage users from conducting confidential
transactions (such as online banking, credit card transactions, etc.) over any wireless network, including
this Service. Users are responsible for the security of their own devices.
Limitations of Wireless Network Access:
We are not liable for any damage, undesired resource usage, or detrimental effects that may occur to a
user's device and/or software while the user’s device is attached to the Service. The user is responsible
for any actions taken from his or her device, whether intentional or unintentional, that damage or
otherwise affect other devices or users of the Service. The user hereby releases the Company from
liability for any loss, damage, security infringement, or injury which the user may sustain as a result of
being allowed access to the Service. The user agrees to be solely responsible for any such loss,
infringement, damage, or injury.
Terms of Service:
By clicking the accept button, below, the user agrees to comply with and to be legally bound by the terms
of this Policy. If this Policy or any terms of the Service are unacceptable or become unacceptable to the
user, the users only right shall be to terminate his or her use of the Service.
The Service may only be used for lawful purposes and in a manner which we believe to be consistent
with the rights of other users. The Service shall not be used in a manner which would violate any law or
infringe any copyright, trademark, trade secret, right of publicity, privacy right, or any other right of any
person or entity. The Service shall not be used for the purpose of accessing, transmitting, or storing
material which is considered obscene, libelous or defamatory. Illegal acts may subject users to
prosecution by local, state, federal, or international authorities. We may bring legal action to enjoin
violations of this Policy and/or to collect damages, if any, caused by violations.
The user specifically agrees to the following conditions:
The user will use the Service only as permitted by applicable local, state, federal, and International laws.
The user will refrain from any actions that we consider to be negligent or malicious. The user will not send
email containing viruses or other malicious or damaging software. The user will run appropriate anti-virus
software to remove such damaging software from his or her computer. The user will not access web sites
which contain material that is grossly offensive to us, including clear expressions of bigotry, racism, or
hatred. The user will not access web sites which contain material that defames, abuses, or threatens
Changes to Service:
We reserve the right to change the Service offered, the features of the Service offered, the terms of this
Policy, or its system without notice to the user.
851 Main Street
Winkler, Manitoba R6W 0M7