Your Privacy is Important

Who we are

Our website address is:

What personal data we collect and why we collect it


When visitors submit an inquiry or submit a message from the site we collect the data shown in the form, and also the visitor’s IP address and browser user agent string to help spam detection.

The information we ask of visitors is to assist us in assisting them in finding a suitable property and answering any question regarding our services that they may have.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here:

Your privacy is important to us and we do not share, lend, sell, rent or otherwise provide any other party with your personal contact details and information without your consent. Your data is stored on our servers for 30 days and then deleted.


Some parts of the site uses cookies with expire after one year. This cookie contains no personal data and is discarded when you close your browser

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

How long we retain your data

Data is only retained for 30 days. By then our clients have moved on or booked a property. Once they are a tenant in one of our properties only hard copy profiles  and documents are kept in our office or cloud based storage for executed leases and agreements.

How we protect your data

Our servers encrypt your contact details for 30 days. No credit card details are stored online or on any office hard drive but instead are stored as hard copy in our office storage files.

What data breach procedures we have in place

We employ strong firewalls on our office computers and 126 bit encryption on our servers plus an additional firewall and third party brute force protection.