You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: data/privacy.md
+10-14Lines changed: 10 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,21 +2,23 @@
2
2
3
3
This privacy policy has been compiled to better serve those who are concerned with how their 'Personally Identifiable Information' (PII) is being used online. PII, as described in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.
4
4
5
-
> What personal information do we collect from the people that visit our blog, website or app? When do we collect information?
5
+
## Introduction
6
+
7
+
### What personal information do we collect from the people that visit our blog, website or app? When do we collect information?
6
8
7
9
We collect information from you when you register on our site or enter information on our site.
8
10
9
-
>How do we use your information?
11
+
###How do we use your information?
10
12
11
13
We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:
12
14
13
15
- To improve our website in order to better serve you.
14
16
15
-
>How do we protect your information?
17
+
###How do we protect your information?
16
18
17
19
Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible. We use regular Malware Scanning. Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology. We implement a variety of security measures when a user places an order enters, submits, or accesses their information to maintain the safety of your personal information. All transactions are processed through a gateway provider and are not stored or processed on our servers.
18
20
19
-
>Do we use 'cookies'?
21
+
###Do we use 'cookies'?
20
22
21
23
We do not use cookies for tracking purposes.
22
24
@@ -44,9 +46,7 @@ According to CalOPPA, we agree to the following:
44
46
45
47
Users can visit our site anonymously. Once this privacy policy is created, we will add a link to it on our home page or as a minimum, on the first significant page after entering our website. Our Privacy Policy link includes the word 'Privacy' and can be easily be found on the page specified above.
46
48
47
-
You will be notified of any Privacy Policy changes:
48
-
49
-
- On our Privacy Policy Page
49
+
You will be notified of any Privacy Policy changes on our Privacy Policy Page.
50
50
51
51
## COPPA (Children Online Privacy Protection Act)
52
52
@@ -60,13 +60,9 @@ The Fair Information Practices Principles form the backbone of privacy law in th
60
60
61
61
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
62
62
63
-
We will notify you via email
64
-
65
-
- Within 1 business day
66
-
67
-
We will notify the users via in-site notification
63
+
We will notify you via email within 1 business day.
68
64
69
-
- Within 1 business day
65
+
We will notify the users via in-site notification within 1 business day.
70
66
71
67
We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.
72
68
@@ -98,4 +94,4 @@ Student Government Assoc. ATTN: Webmaster
0 commit comments