Privacy Policy - Dental Turism Clinic

    Privacy Policy

    Last Updated: June 29, 2018

    Dental Turism Clinic (“us”, “we”, or “our”) operates the website (the “Service”).

    This page informs you of our policies regarding the collection, use, and disclosure of personal data when you use our Service and the choices you have associated with that data.

    We use your data to provide and improve the Service. By using the Service, you agree to the collection and use of information in accordance with this policy. Unless otherwise defined in this Privacy Policy, terms used in this Privacy Policy have the same meanings as in our Terms and Conditions, accessible from

    Information Collection And Use

    We collect several different types of information for various purposes to provide and improve our Service to you.

    Types of Data Collected

    Personal Data

    While using our Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you (“Personal Data”). Personally identifiable information may include, but is not limited to:

    • Email address
    • First name and last name
    • Phone number
    • Address, State, Province, ZIP/Postal code, City
    • Cookies and Usage Data

    Usage Data

    We may also collect information how the Service is accessed and used (“Usage Data”). This Usage Data may include information such as your computer’s Internet Protocol address (e.g. IP address), browser type, browser version, the pages of our Service that you visit, the time and date of your visit, the time spent on those pages, unique device identifiers and other diagnostic data.

    Tracking & Cookies Data

    We use cookies and similar tracking technologies to track the activity on our Service and hold certain information.

    Cookies are files with small amount of data which may include an anonymous unique identifier. Cookies are sent to your browser from a website and stored on your device. Tracking technologies also used are beacons, tags, and scripts to collect and track information and to improve and analyze our Service.

    You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Service.

    Examples of Cookies we use:

    • Session Cookies. We use Session Cookies to operate our Service.
    • Preference Cookies. We use Preference Cookies to remember your preferences and various settings.
    • Security Cookies. We use Security Cookies for security purposes.

    Data management challenges for healthcare organizations

    Here are some specific areas that organizations in the healthcare industry should be concerned about.

    • The GDPR outlines specific rights for data subjects — for example, the “right to be forgotten,” as well as accessibility, portability, and more. Organizations must also gain explicit consent for processing if they don’t fall under other lawful bases of handling personal and health data. It is the responsibility of the healthcare organization to create a system so that the subject can exercise all these rights. This requires some time and effort — from reorganizing data to installing new software and setting new archiving policies.
    • For years, healthcare organizations have been highly targeted by cybercriminals looking to profit from the unique and valuable data they store. These threat actors target victims using different methods such as ransomware, phishing, malicious spam, and so on. Data breaches that put individuals at risk can be fined.
    • There are many exposed devices in homes and enterprises across the globe, which are left unsecured and vulnerable to hackers. In healthcare, unsecured medical internet of things (IoT) devices contain confidential patient information, test results, and medical images. Organizations have to use devices with adequate built-in security, or install solutions to secure the data stored in them.
    • Connected hospitals have to look out for supply chain compromise. Some third-party suppliers develop unique partnerships with healthcare organizations and have access to sensitive data and devices. This has its risks. Cyberattacks in the supply chain can come through different, and sometimes atypical, vectors: firmware attacks, mobile app compromise, portal compromise, third-party vendor breaches, and even insider threats.

    Solutions and mitigation

    To comply with the GDPR, as well as protect the sensitive personal data of patients and staff, there are steps healthcare organizations can take.

    • Organizations have to retool their data management framework and adopt new policies for accessibility, archiving, organization, and protection. There should be an efficient system in place that can guarantee that data subjects can exercise all the rights outlined in the GDPR. Companies in the United States can rely on comprehensive security frameworks like HITRUST CSF®, which already incorporates the GDPR in its latest version, in addition to global standards like those of the International Organization for Standardization (ISO) and Payment Card Industry Data Security Standard (PCI DSS) as well as the relevant local regulations.
    • Meanwhile, companies also have to manage the growing risk of supply chain attacks. Risk assessment is essential — companies should only work with organizations that are compliant with the GDPR and are reliable partners in data protection. Apart from that, they should perform risk assessments on suppliers, do background checks on anyone with access to databases, medical devices, and equipment, and make sure to implement efficient patching policies. Penetration testing of hospital networks by professional pen-testing companies is also highly recommended.
    • General best practices that will help secure data and hospital networks include the following: network segmentation, firewalls, antimalware solutions, Breach Detection Systems (BDS), security systems that detect and prevent network attacks, and encryption technologies. Apart from the hospital networks, medical devices, and third-party software also need to be sufficiently secured: Devices should be assessed during design and manufacturing phase; applications and software should also be assessed and be equipped with the proper security solutions.

    Use of Data

    Dental Turism Clinic uses the collected data for various purposes:

    • To provide and maintain the Service
    • To notify you about changes to our Service
    • To allow you to participate in interactive features of our Service when you choose to do so
    • To provide customer care and support
    • To provide analysis or valuable information so that we can improve the Service
    • To monitor the usage of the Service
    • To detect, prevent and address technical issues

    Transfer Of Data

    Your information, including Personal Data, may be transferred to — and maintained on — computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ than those from your jurisdiction.

    If you are located outside Romania and choose to provide information to us, please note that we transfer the data, including Personal Data, to Romania and process it there.

    Your consent to this Privacy Policy followed by your submission of such information represents your agreement to that transfer.

    Dental Turism Clinic will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal information.

    Disclosure Of Data

    Legal Requirements

    Dental Turism Clinic may disclose your Personal Data in the good faith belief that such action is necessary to:

    • To comply with a legal obligation
    • To protect and defend the rights or property of Dental Turism Clinic
    • To prevent or investigate possible wrongdoing in connection with the Service
    • To protect the personal safety of users of the Service or the public
    • To protect against legal liability

    Security Of Data

    The security of your data is important to us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Data, we cannot guarantee its absolute security.

    Service Providers

    We may employ third party companies and individuals to facilitate our Service (“Service Providers”), to provide the Service on our behalf, to perform Service-related services or to assist us in analyzing how our Service is used.

    These third parties have access to your Personal Data only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.


    We may use third-party Service Providers to monitor and analyze the use of our Service.

    • Google AnalyticsGoogle Analytics is a web analytics service offered by Google that tracks and reports website traffic. Google uses the data collected to track and monitor the use of our Service. This data is shared with other Google services. Google may use the collected data to contextualize and personalize the ads of its own advertising network.You can opt-out of having made your activity on the Service available to Google Analytics by installing the Google Analytics opt-out browser add-on. The add-on prevents the Google Analytics JavaScript (ga.js, analytics.js, and dc.js) from sharing information with Google Analytics about visits activity.For more information on the privacy practices of Google, please visit the Google Privacy & Terms web page:

    Links To Other Sites

    Our Service may contain links to other sites that are not operated by us. If you click on a third party link, you will be directed to that third party’s site. We strongly advise you to review the Privacy Policy of every site you visit.

    We have no control over and assume no responsibility for the content, privacy policies or practices of any third party sites or services.

    Children’s Privacy

    Our Service does not address anyone under the age of 18 (“Children”).

    We do not knowingly collect personally identifiable information from anyone under the age of 18. If you are a parent or guardian and you are aware that your Children has provided us with Personal Data, please contact us. If we become aware that we have collected Personal Data from children without verification of parental consent, we take steps to remove that information from our servers.

    Changes To This Privacy Policy

    We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page.

    We will let you know via email and/or a prominent notice on our Service, prior to the change becoming effective and update the “effective date” at the top of this Privacy Policy.

    You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

    Contact Us

    If you have any questions about this Privacy Policy, please contact us:

    • By email:
    • By visiting this page on our website: