It also tells you about your privacy rights and how the law protects you.
Accepting the Terms
Who we are
Our website address is: http://kathyide.com.
What personal data we collect and why we collect it
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Sharing of Information
We may share your name, email address and other information with certain of our partners so that they may assist you in using our products and services, contact you with offers, services or products that may be of interest to you, and provide you with their products or services. Our partners are prohibited from using your contact information for any other purpose without your consent. We will not provide our partners with your credit card information. If you are working with a partner and would like that partner to have full access to your account, we will provide access to just that partner upon your request or consent.
If we are involved in a merger, acquisition, a sale of all or a substantial portion of our assets, or other similar sale transaction, your information may be transferred as part of that transaction. We will notify you by email and/or a prominent notice on our website of any such transfer and any choices you may have regarding your information.
We may share your information with others within your organization (including any affiliates or any other individuals designated as users on your account).
Disclosure for Legal Purposes
We reserve the right to disclose any personally identifiable information or other information we collect through the Site or otherwise if we are required to do so by law or if we reasonably believe that the disclosure is necessary in order to (a) fulfill a government request; (b) conform with the requirements of law or to comply with legal process served on us; (c) protect or defend our legal rights or property or third party licensors of any material on the Site; or (d) in an emergency to protect the health or safety of the users of the Site or the general public.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor comments may be checked through an automated spam detection service.
Your contact information
Once you register with Kathy Ide Book Services and sign in to the Service, you are not anonymous to Kathy Ide Book Services.
When registering with Kathy Ide Book Services, you provide Personal Data, which may include your name, phone number, city, state/province, country, zip/postal code, a user name, confirmed email address, and a password. Kathy Ide Book Services may also record your IP address when you submit information.
Kathy Ide Book Services also may collect, at your option, certain preference and demographic information from you.
Google Analytics (GA) collects anonymous aggregate data from site visitors including which pages are visited, what time of the day the pages are visited, for how long those pages are visited, etc. GA collects hundreds, if not, thousands of data points regarding activity on the site. The only personally identifiable piece of information collected is a visitor’s IP address.
We Do Not Collect Personal Information from Children
Children under 13 years old are not the target audience for the Site. To protect their privacy, we prohibit the solicitation of personal information from these children. If you are under the age of 13, please do not submit your email address or any other personal information to us through the Site.
Kathy Ide Book Services does not intentionally gather Personal Data about visitors who are under the age of 13.
Security and Privacy
Our Commitment To Data Security
To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.
We employ reasonable technical, administrative and physical safeguards to protect the confidentiality and security of your personal information. We use industry-recognized technical safeguards, such as firewalls, and have adopted and implemented security procedures to protect your information from loss, misuse or unauthorized alteration. When we collect financial account information, such as credit card numbers, we protect its transmission through the use of encryption such as the Transport Layer Security (TLS) protocol.
Notwithstanding our efforts, we cannot guarantee absolute or unqualified protection of this information given the open nature and resulting instability of the Internet and World Wide Web, and we make no representations or warranties as to the effectiveness of our security and assume no liability for security breaches or any failure in the security of your computer equipment, your internet service provider or other networks and communications providers.
What data breach procedures we have in place
The following is the procedure that must be followed relating to a potential breach under GDPR legislation.
- Notify the web manager of the suspected data breach
- The web manager will instruct a team to investigate the potential breach to establish if it is real
- The impact to individuals and organizations will be assessed
- Identify within 72 hours details of:
- The nature of the personal data breach
- The categories and approximate number of individuals concerned
- The categories and approximate number of personal data records concerned
- A description of the likely consequences of the personal data breach
- A description of the measures taken, or proposed to be taken, to deal with the personal data breach and, where appropriate, of the measures taken to mitigate any possible adverse effects
- This is only necessary if the breach could result in:
- Damage to reputation
- Financial loss
- Loss of confidentiality
- Economic disadvantage
- Social disadvantage
- Notify any individuals concerned if there may be a risk to the rights and freedoms of those individuals
- Resolve breach