What personal information do we collect from the people that visit our blog, website or app?
In order to use our site, we ask for your name, company name, addresses, emails, and phone numbers. As a natural part of the application, we also collect information pertaining to the projects that you are operating as well as names and email addresses of subscribers who can view and interact with those projects.
For billing purposes, we ask for details such as credit card information and billing addresses.
We may use the information we collect from you when you register, purchase a subscription, use the website, sign up for our communications from our site, respond to a survey or marketing communication, or use certain other site features in the following ways:
• To deliver the product of which you’ve subscribed to.
• To personalize your experience and to allow us to deliver the type of content and product offerings in which you are most interested.
• To quickly process your transactions.
Do we share your information with anyone else?
We do not market or sell your information to other parties. We will always ask your permission before using any of your information in any marketing capacity for our site.
We may view and share your information internally to investigate any bugs, site errors, or issues with the website and your use of it.
We track site usage of all members for site statistical purposes for performance and usability evaluations.
We may use your information to take action if we believe the site is being used for illegal purposes or for violations of our Terms of Service, or as otherwise required by law.
We may share your information with law enforcement officials if we receive a court order to do so.
How do we protect your information?
Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible.
Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
We implement a variety of security measures when a user enters, submits, or accesses their information to maintain the safety of your personal information.
All financial transactions are processed through a gateway provider and are not stored or processed on our servers.
Do we use 'cookies'?
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser's Help Menu to learn the correct way to modify your cookies.
If you turn cookies off, many of the features on our site will not function.
California Online Privacy Protection Act
According to CalOPPA, we agree to the following:
Users can visit our site anonymously.
You can change your personal information by logging in to your account
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under the age of 13 years old, the Children's Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States' consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.
We do not specifically market to children under the age of 13 years old.
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will attempt to notify you via email within 7 business days
We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.
Last Edited: 5-26-2017