Skip to content Skip to footer
0 items - R0.00 0

Privacy Policy

1. Introduction
Privacy Policy for www.theroyalty.co.za

Last Updated: October 22, 2025

Thank you for shopping at The Royalty (www.theroyalty.co.za). We are committed to protecting your personal information and your right to privacy. If you have any questions or concerns about this privacy notice or our practices with regard to your personal information, please contact us.

This privacy notice describes how we might use your information if you:

  • Visit our website at www.theroyalty.co.za

  • Create an account with us

  • Purchase our products (earrings, eyewear, etc.)

  • Sign up for our newsletter

  • Engage with us in other related ways, including sales, marketing, or events

In this privacy notice, if we refer to:

  • “Website”, we are referring to this website, www.theroyalty.co.za.

  • “You”, we are referring to any person who visits and/or uses our Website.

1. What Information Do We Collect?

We collect personal information that you voluntarily provide to us when you register on the Website, express an interest in obtaining information about us or our products, when you participate in activities on the Website (such as making a purchase or subscribing to our newsletter), or otherwise when you contact us.

 

The personal information that we collect depends on the context of your interactions with us and the Website, the choices you make, and the products and features you use. The personal information we collect may include the following:

 
  • Personal Information Provided by You:

    • Contact & Account Data: Name, email address, phone number, and password when you create an account.

    • Purchase & Billing Data: Shipping address, billing address, and contact details for processing and delivering your orders.

    • Payment Data: We do not collect or store your payment card details. Payment data is collected and processed directly by our third-party payment processor(s) (e.g., PayFast, Yoco, Stripe, PayPal). We recommend you review their privacy policy to understand how they handle your data.

  • Information Automatically Collected:

    • Log and Usage Data: Our servers automatically collect log and usage data when you access our Website. This data may include your IP address, browser type, operating system, referring URLs, pages viewed, and dates/times of your visits.

    • Cookies and Tracking Technologies: We use cookies and similar tracking technologies to access or store information. This is used to maintain your shopping cart, log-in session, and analyze site traffic. You can manage your cookie preferences through your browser settings.

2. How Do We Use Your Information?

We use personal information collected via our Website for a variety of business purposes described below:

  • To Fulfill Your Orders: To process your payments and deliver the products you purchase.

  • To Manage Your Account: To create and manage your user account, including your wishlist and order history.

  • To Send Administrative Information: To send you information regarding your order, changes to our terms, conditions, and policies.

  • To Send Marketing Communications: To send you our newsletter and promotional emails, if you have opted-in to receive them. You may opt-out of our marketing emails at any time.

  • To Respond to Inquiries: To respond to your questions and provide customer support when you use our contact form.

  • To Improve Our Website: To analyze usage data to understand how our Website is being used and to improve its functionality and user experience.

3. Will Your Information Be Shared With Anyone?

We only share information with your consent, to comply with laws, to provide you with services, to protect your rights, or to fulfill business obligations. We may share your information with the following parties:

  • Payment Processors: To securely process your payments when you make a purchase.

  • Courier & Delivery Services: To deliver your orders, we must share your name, shipping address, and phone number with our delivery partners.

  • Legal Requirements: We may disclose your information where we are legally required to do so in order to comply with applicable law, governmental requests, or legal process.

We do not sell, rent, or trade any of your personal information with third parties for their promotional purposes.

4. How Do We Keep Your Information Safe?

We have implemented appropriate technical and organizational security measures designed to protect the security of any personal information we process. However, despite our safeguards, no electronic transmission over the Internet or information storage technology can be guaranteed to be 100% secure. We cannot promise or guarantee that hackers, cybercriminals, or other unauthorized third parties will not be able to defeat our security and improperly collect, access, steal, or modify your information.

5. What Are Your Privacy Rights?

Depending on your location (such as in South Africa under the POPIA), you may have certain rights regarding your personal information. These may include the right to:

  • Request access to and obtain a copy of your personal information.

  • Request correction or deletion of your personal information.

  • Object to the processing of your personal information.

You can review and change the information in your user account at any time by logging into your “My Account” page.

If you would like to make such a request, please contact us using the details below.

6. Do We Use Cookies?

Yes. We use cookies to:

  • Remember the items in your shopping cart.

  • Keep you logged into your account.

  • Understand and save user’s preferences for future visits.

  • Compile aggregate data about site traffic and site interactions to offer better site experiences in the future.

7. How Can You Contact Us About This Policy?

If you have questions or comments about this policy, you may contact us via:

  • Email: info@theroyalty.co.za

  • Contact Form:  www.theroyalty.co.za/contact/]

8. Embedded Content

Pages on this site may include embedded content, like YouTube videos, for example. Embedded content from other websites behaves in the exact same way as if you visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website. Below you can find a list of the services we use:

Facebook

The Facebook page plugin is used to display our Facebook timeline on our site. Facebook has its own cookie and privacy policies over which we have no control. There is no installation of cookies from Facebook and your IP is not sent to a Facebook server until you consent to it. See their privacy policy here: Facebook Privacy Policy .

Twitter

We use the Twitter API to display our tweets timeline on our site. Twitter has its own cookie and privacy policies over which we have no control. Your IP is not sent to a Twitter server until you consent to it. See their privacy policy here: Twitter Privacy Policy .

Youtube

We use YouTube videos embedded on our site. YouTube has its own cookie and privacy policies over which we have no control. There is no installation of cookies from YouTube and your IP is not sent to a YouTube server until you consent to it. See their privacy policy here: YouTube Privacy Policy.

9. Who Has Access To Your Data

If you are not a registered client for our site, there is no personal information we can retain or view regarding yourself.

If you are a client with a registered account, your personal information can be accessed by:

  • Our system administrators.
  • Our supporters when they (in order to provide support) need to get the information about the client accounts and access.
10. Security Measures

We use the SSL/HTTPS protocol throughout our site. This encrypts our user communications with the servers so that personally identifiable information is not captured/hijacked by third parties without authorization.

In case of a data breach, system administrators will immediately take all needed steps to ensure system integrity, will contact affected users and will attempt to reset passwords if needed.