What personal information do we collect from the people that visit our blog, website or app?
When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address, mailing address, phone number, images or other details to help you with your experience.
When do we collect information?
We collect information from you when you register on our site, subscribe to a newsletter, fill out a form Post and advertisment or enter information on our site.
How do we use your information?
We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
• To personalize user’s experience and to allow us to deliver the type of content and product offerings in which you are most interested.
How do we protect visitor information?
We use regular Malware Scanning.
Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
We implement a variety of security measures when a user places an order enters, submits, or accesses their information to maintain the safety of your personal information.
All transactions are processed through a gateway provider and are not stored or processed on our servers
Do we use ‘cookies’?
• Help remember and process the items in the shopping cart.
• Understand and save user’s preferences for future visits.
If users disable cookies in their browser:
If you disable cookies off, some features will be disabled It will turn off some of the features that make your site experience more efficient and some of our services will not function properly and you will be redirected from the site to google.
Third Party Disclosure
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information.
Third party links
Occasionally, at our discretion, we may include or offer third party products or services on our website. These third party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites. Sellers may include links to their sites or products and services and we cannot be responsible for any misleading advertisements on theses links or sites. WE cannot be responsible for the stability and security of any other sites apart from our own and you click theses links and visits theses sites solely at your own risk.
Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users.
We use Google AdSense Advertising on our website.
We have implemented the following:
• Demographics and Interests Reporting
We along with third-party vendors, such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with ad impressions, and other ad service functions as they relate to our website.
Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising initiative opt out page or permanently using the Google Analytics Opt Out Browser add on.
Data Protection online privacy codes of practice.
According to CalOPPA we agree to the following:
Users can visit our site anonymously
Users are able to change their personal information:
• By logging in to their account
Does our site allow third party behavioral tracking?
It’s also important to note that we do not allow third party behavioral tracking
The Council of the European Union undertook its first initiative against illegal content on the Internet in July 1996, by adopting the action plan for combating racism and xenophobia. In 1997 the EU Telecoms Council adopted the resolution on illegal and harmful content on the Internet. In January 1999 the European Parliament and the Council of the European Union adopted the Action Plan on promoting safe use of the Internet by combating illegal and harmful content on global networks. By force of this document the European Commission launched the first programme under Safer Internet Action Plan (SIAP) – to promote safe use of the Internet and other new technologies, including the new generation of mobile phones, online games, chatrooms, and instant messaging software.
We do not specifically market to children under 13.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify the users via email
· within a reasonable time frame
· We will notify the users via in site notification
· within a reasonable time frame
We also agree to the individual redress principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or a government agency to investigate and/or prosecute non-compliance by data processors.
Under the directive, any data “by which an individual can be identified” was the sole responsibility of the data controller, ie the owner of this data. Under the new regulations, however, any company or individual that processes this data will also be held responsible for its protection, including third parties such as cloud providers. Put simply, anyone who touches or has access to your data, wherever they are based, is responsible in the case of a data breach. The ramifications of this are pretty broad. Third parties will need to be extra vigilant when it comes to securing the data of others, and data owners will want to thoroughly vet their partners.