Section 1 - What do we do with your information?
If you choose to fill in a contact form on our website, we will store that information and only use it for the purpose of contacting you in relation to that inquiry.
Email marketing: With your explicit permission, we may send you emails about our products and other updates.
Section 2 - Consent
How do you get my consent?
When you provide us with personal information we ask you to explicitly consent to our collecting it and using it for that specific reason only.
If we ask for your personal information for a secondary reason, like marketing, we will either ask you directly for your expressed consent, or provide you with an opportunity to say no.
How do I withdraw my consent?
If after you opt-in, you change your mind, you may withdraw your consent for us to contact you by clicking the unsuscribe link.
Section 3 - Disclosure
We may disclose your personal information if we are required by law to do so.
Section 4 - Data Storage
Your data is stored through Phorest Software’s data storage and databases. We store your data on a secure server behind a firewall.
Section 5 - Third-party services & links
In general, the third-party providers used by us will only collect, use and disclose your information to the extent necessary to allow them to perform the services they provide to us.
When you click on links on our site, they may direct you away from our site. We are not responsible for the privacy practices of other sites and encourage you to read their privacy statements.
Section 6 - Security
To protect your personal information, we take reasonable precautions and follow industry best practices to make sure it is not inappropriately lost, misused, accessed, disclosed, altered or destroyed.
If you provide us with your personal information, the information is encrypted using secure socket layer technology (SSL) and stored with industry-standard encryption. Although no method of transmission over the Internet or electronic storage is 100% secure, we implement generally accepted industry standards.
Section 7 - Cookies
Here is a list of cookies that we use. We’ve listed them here so you can choose if you want to opt-out of cookies or not. Opt-out by altering your web browser’s settings to reject cookies.
Google Analytics – we use Google Analytics to measure how our siteis used by visitors and to generate reports for our own use. Google Analytics does not collect any personally identifiable information about you.
Questions and contact information
If you would like to: access, correct, amend or delete any personal information we have about you, register a complaint, or simply want more information contact us at or
Late Night Hair
407 N Roselle Rd
Roselle Il 60172
GDPR compliance statement
Late Night Hair respects and complies with the EU General Data Protection Regulations (GDPR).
Some of the key ways we comply with these regulations are:
We explain what you’re consenting to clearly and without ‘legalese’, and ask that you explicitly consent to contact from us.
In the event of a breach we will notify affected users within 72 hours of first having become aware of the breach.
Right to Access
Users can request confirmation as to whether or not personal data concerning them is being processed, where and for what purpose. Further, we shall provide a copy of the personal data, free of charge, in an electronic format.
Right to be Forgotten
Once we have compared your (the subjects') rights to "the public interest in the availability of the data", we may delete your personal data where you have requested this.
We allow you to receive the personal data concerning you, which we will provide in a 'commonly used and machine readable format' and you have the right to transmit that data to another ‘controller’.
Privacy by Design
We implement appropriate technical and organisational measures, in an effective way, in order to meet the requirements of this Regulation and protect the rights of data subjects'. We hold and process only the data absolutely necessary for the completion of our duties (data minimisation), as well as limiting the access to personal data to those needing to act out the processing.