...

Privacy Policy

Who we are

Our website address is: {url}.

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracing your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

Who we share your data with

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Your contact information

Additional information

How we protect your data

What data breach procedures we have in place

What third parties we receive data from

What automated decision making and/or profiling we do with user data

Industry regulatory disclosure requirements

Privacy Policy

Who we are

Our website address is: Easynet Pro.

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: Gravatar. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

Who we share your data with

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Your contact information

Additional information

How we protect your data

How we protect your data

Safeguarding your data is our utmost priority. We understand the importance of your privacy and are committed to ensuring that your information remains secure at all times. Here’s how we protect your data:

  1. Encryption: We employ robust encryption techniques to safeguard your data during transmission and storage. This ensures that even if unauthorized individuals gain access to the data, they cannot decipher it without the proper encryption keys.
  2. Secure Storage: Your data is stored in secure, state-of-the-art facilities with stringent access controls. Only authorized personnel with a legitimate need to access the data are granted permission, further minimizing the risk of unauthorized access.
  3. Access Controls: We implement strict access controls to limit who can access your data within our organization. Access is granted on a need-to-know basis, and all access is logged and regularly audited to detect and prevent any unauthorized activity.
  4. Regular Security Audits: We conduct regular security audits and assessments to identify and address any potential vulnerabilities in our systems and processes. This proactive approach ensures that our security measures are always up-to-date and effective.
  5. Data Minimization: We only collect and retain the data that is necessary for providing our services to you. We do not store more data than is required, reducing the potential impact of any data breaches.
  6. Employee Training: Our employees undergo comprehensive training on data security best practices to ensure that they understand their responsibilities in protecting your data. This includes training on handling sensitive information securely and recognizing and reporting any security threats.
  7. Third-party Vetting: Before engaging with any third-party service providers that may have access to your data, we thoroughly vet their security measures to ensure they meet our high standards for data protection.
  8. Compliance with Regulations: We comply with all relevant data protection regulations, including [list specific regulations if applicable], to ensure that your data is handled in accordance with the highest legal and ethical standards.
  9. Transparent Communication: We are committed to being transparent about how we handle your data. Our privacy policy clearly outlines our data handling practices, including how we collect, use, and protect your data.
  10. Continuous Improvement: We continuously strive to improve our data protection measures by staying informed about the latest security trends and technologies. This ongoing commitment ensures that we remain at the forefront of data security and provide you with the highest level of protection for your data.

Your trust is paramount to us, and we are dedicated to earning and maintaining it by safeguarding your data with the utmost care and diligence. If you have any questions or concerns about how we protect your data, please don’t hesitate to contact us.

What data breach procedures we have in place

What data breach procedures we have in place

We take data breaches seriously and have established robust procedures to promptly address and mitigate any potential breaches. Our data breach procedures are designed to minimize the impact on you, our valued users, and to ensure that your data remains secure. Here’s an overview of our data breach procedures:

  1. Detection and Identification: We utilize advanced monitoring tools and technologies to detect any unauthorized access or unusual activity on our systems. In the event of a potential data breach, our dedicated security team immediately investigates to identify the scope and nature of the breach.
  2. Containment and Mitigation: Upon confirming a data breach, our priority is to contain the breach and prevent any further unauthorized access. We take immediate action to isolate affected systems and networks to minimize the impact on your data. Additionally, we implement measures to mitigate any potential harm caused by the breach.
  3. Notification: If we determine that a data breach poses a risk to your personal information, we will promptly notify you in accordance with applicable data protection regulations. Our notification will include details about the nature of the breach, the type of data affected, and any steps you can take to protect yourself.
  4. Communication and Transparency: We believe in maintaining open and transparent communication with our users throughout the data breach response process. We provide regular updates on the situation, including the steps we are taking to address the breach and enhance our security measures.
  5. Coordination with Authorities: In the event of a significant data breach, we cooperate fully with relevant authorities, such as data protection regulators and law enforcement agencies. We provide them with all necessary information and assistance to support their investigations into the breach.
  6. Internal Review and Improvement: Following a data breach, we conduct a comprehensive internal review to identify any weaknesses in our systems or procedures that may have contributed to the breach. We use this information to implement additional security measures and improve our data protection practices.
  7. Support for Affected Users: We understand that a data breach can be distressing for our users, and we are committed to providing support and assistance to those affected. This may include offering credit monitoring services, providing guidance on protecting personal information, and addressing any concerns or questions you may have.

By implementing these data breach procedures, we strive to minimize the risk of breaches and maintain the trust and confidence of our users. Your privacy and security are our top priorities, and we remain vigilant in our efforts to protect your data. If you have any questions or concerns about our data breach procedures, please contact us for more information.

What third parties we receive data from

What third parties we receive data from

We may receive data from various third-party sources to enhance the quality of our services and provide you with a better user experience. We take the privacy and security of your data seriously and only partner with reputable third parties that adhere to strict data protection standards. Here’s an overview of the types of third parties from which we may receive data:

  1. Service Providers: We may engage third-party service providers to assist us in delivering our services to you. These service providers may collect data on our behalf, such as analytics data, customer support interactions, or payment information. We ensure that these service providers have appropriate data protection measures in place and only share data with them to the extent necessary to fulfill their service obligations.
  2. Advertising and Marketing Partners: We may collaborate with third-party advertising and marketing partners to promote our products and services or to display targeted advertisements to you. These partners may provide us with data such as demographic information, interests, or online behavior to help us tailor our marketing efforts more effectively. We adhere to industry best practices and regulations regarding data privacy and ensure that your consent is obtained where required for targeted advertising activities.
  3. Business Partners and Affiliates: We may receive data from our business partners or affiliates in the course of our collaborations or joint ventures. This data may include information related to shared customers, leads, or transactions. We only share data with trusted business partners and affiliates for legitimate business purposes and in accordance with applicable data protection laws.
  4. Social Media Platforms: If you interact with our services through social media platforms or use social media features integrated into our website or mobile applications, we may receive data from these platforms. This data may include your social media profile information, preferences, or activities. We handle this data in accordance with our privacy policy and the terms of service of the respective social media platforms.
  5. Publicly Available Sources: We may obtain data from publicly available sources, such as government databases, public records, or professional networking sites, to verify or supplement the information you provide to us. We ensure that any data obtained from publicly available sources is used responsibly and in compliance with applicable laws and regulations.
  6. Data Aggregators and Data Brokers: In some cases, we may acquire data from data aggregators or data brokers for marketing or analytical purposes. We carefully vet these data sources to ensure that they comply with data protection regulations and industry standards for data quality and accuracy.
  7. Other Third Parties: We may receive data from other third parties not explicitly mentioned above, such as business partners of our service providers or vendors in our supply chain. We handle data received from these parties with the same level of care and diligence as data received from our direct partners.

We are committed to transparency regarding the sources of data we receive from third parties and strive to ensure that your data is handled responsibly and ethically. If you have any questions or concerns about the third parties we receive data from or how we use this data, please contact us for more information.

What automated decision making and/or profiling we do with user data

What automated decision making and/or profiling we do with user data

We may utilize automated decision-making processes and profiling techniques to enhance your experience and tailor our services to better meet your needs. These processes are designed to analyze user data efficiently and accurately, allowing us to provide personalized recommendations, targeted advertisements, and improved service offerings. Here’s an overview of the automated decision-making and profiling activities we engage in:

  1. Personalized Recommendations: We may use automated algorithms to analyze your usage patterns, preferences, and interactions with our services to generate personalized recommendations. These recommendations may include product suggestions, content recommendations, or relevant offers based on your past behavior and interests.
  2. Targeted Advertising: We may engage in profiling activities to segment our users into different audience groups based on demographic information, interests, or online behavior. This allows us to deliver targeted advertisements that are more relevant to your interests and preferences. However, we do not use sensitive personal data for targeted advertising without obtaining your explicit consent where required by law.
  3. Fraud Detection and Prevention: We may employ automated decision-making processes to detect and prevent fraudulent activities, such as identity theft, payment fraud, or account hijacking. These processes analyze various data points and patterns to identify suspicious behavior and take appropriate action to mitigate risks and protect our users.
  4. Customized User Experiences: We may use profiling techniques to customize your user experience based on your preferences and behavior. For example, we may personalize the content, layout, or features of our website or mobile application to better align with your interests and usage habits.
  5. Risk Assessment and Credit Scoring: In certain cases, we may use automated decision-making processes to assess the risk associated with providing certain services or extending credit to users. These processes analyze factors such as credit history, financial behavior, and transactional data to evaluate the likelihood of default or other risks.
  6. Compliance with Legal Obligations: We may use automated decision-making processes to ensure compliance with legal obligations, such as age verification or screening for prohibited activities. These processes help us enforce our terms of service and adhere to applicable laws and regulations.

We are committed to transparency and accountability in our use of automated decision-making and profiling techniques. We provide clear information about these processes in our privacy policy and obtain your consent where required by law. Additionally, we offer mechanisms for you to access, review, and update your personal data preferences, including the option to opt-out of certain profiling activities. If you have any questions or concerns about how we use automated decision-making and profiling with your data, please contact us for more information.

Industry regulatory disclosure requirements

Industry Regulatory Disclosure Requirements

We are committed to upholding the highest standards of compliance with industry regulations and disclosure requirements related to data privacy and security. We understand the importance of transparency and accountability in our data handling practices, especially in industries where specific regulatory standards apply. Here’s how we address industry regulatory disclosure requirements in our privacy policy:

  1. Compliance Framework: We adhere to all relevant industry-specific regulations and standards governing data privacy and security. This includes but is not limited to regulations such as the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), the Health Insurance Portability and Accountability Act (HIPAA), and any other applicable regional or sector-specific regulations.
  2. Clear Disclosure: Our privacy policy provides clear and comprehensive information about how we collect, use, disclose, and protect your personal data in accordance with industry regulations. We outline your rights regarding your data and provide instructions on how you can exercise these rights.
  3. Data Handling Practices: We disclose our data handling practices, including how we obtain consent, the purposes for which we use your data, and the security measures we implement to protect your data. We also detail any data sharing or disclosure practices with third parties and the safeguards in place to ensure compliance with regulatory requirements.
  4. Individual Rights: We inform users about their rights regarding their personal data, as mandated by industry regulations. This includes the right to access, rectify, restrict processing, and delete their data, as well as the right to data portability and the right to object to certain processing activities.
  5. Data Breach Notification: In compliance with industry regulations, we outline our procedures for detecting, investigating, and notifying users in the event of a data breach. We provide clear guidance on what constitutes a data breach, our notification obligations, and the steps we take to mitigate any potential harm to affected individuals.
  6. Regulatory Compliance Statements: We may include specific statements or certifications in our privacy policy to demonstrate our compliance with industry regulations. This may include certifications such as Privacy Shield certification for international data transfers or compliance statements for specific regulatory frameworks.
  7. Updates and Amendments: We commit to keeping our privacy policy up-to-date with any changes in industry regulations or our data handling practices. We inform users about any material changes to the privacy policy and provide the effective date of the updated policy.
  8. Contact Information: We provide contact information for users to reach out to us with questions, concerns, or requests related to their data privacy rights or our compliance with industry regulations. We strive to be responsive and transparent in addressing user inquiries and requests.

By addressing industry regulatory disclosure requirements in our privacy policy, we aim to build trust with our users and demonstrate our commitment to protecting their privacy and complying with applicable regulations. If you have any questions or require further information about our compliance with industry regulations, please don’t hesitate to contact us.

Plugin: Appointments

When visitors book an appointment on the site we collect the data shown in the appointments form to allow future contact with a client.

All collected data is not shown publicly but we can send it to our workers or contractors who will perform ordered services.

Plugin: CoursePress

We collect information about you during the enrollment to our courses or checkout process on our site.

What we collect and store

While you visit our site, we’ll track:

  • Courses you’ve enrolled.
  • Courses your answers, comments, files.

When you purchase from us, we’ll ask you to provide information including your name, billing address, shipping address, email address, phone number, credit card/payment details and optional account information like username and password. We’ll use this information to:

  • Send you information about your account and order.
  • Respond to your requests, including refunds and complaints.
  • Process payments and prevent fraud.

If you create an account, we will store your name, address, email and phone number, which will be used to populate the checkout for future orders.

We will store order information for XXX years for tax and accounting purposes. This includes your name, email address and billing and shipping addresses.

We will also store comments or reviews, if you chose to leave them.

Who on our team has access

Members of our team have access to the information you provide us. Administrators, Instructors and Facilitators can access:

  • Customer information like your name, email address and billing.

Our team members have access to this information to help fulfill orders, process refunds, and support you.

What we share with others

Payments

We accept payments through PayPal. When processing payments, some of your data will be passed to PayPal, including information required to process or support the payment, such as the purchase total and billing information.
Please see the PayPal Privacy Policy for more details.

Plugin: Defender Pro

Third parties

This site may be using third-party cloud storage to store backups of its audit logs where personal information is collected.

Additional data

This site creates and stores an activity log that capture the IP address, username, email address and tracks user activity (like when a user makes a comment). Information will be stored locally for 30 days and remotely for 1 year. Information on remote logs cannot be cleared for security purposes.