Skip to content

Privacy Policy

Last updated January 30, 2022

We reserve the right to make changes to this Privacy Policy at any time and for any reason. We will alert you about any changes by updating the “Last Updated” date of this Privacy Policy. Any changes or modifications will be effective immediately upon posting the updated Privacy Policy on the Site, and you waive the right to receive specific notice of each such change or modification.

Who we are

Our website address is: http://hillarycooper.easttaylorcreative.com.

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

We may collect information such as IP address, name, and email when you use the contact form. We promise to never sell your data.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me,” your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

We may use cookies, web beacons, tracking pixels, and other tracking technologies on the Site to help customize the Site and improve your experience. When you access the Site, your personal information is not collected through the use of tracking technology. Most browsers are set to accept cookies by default. You can remove or reject cookies, but be aware that such action could affect the availability and functionality of the Site. You may not decline web beacons. However, they can be rendered ineffective by declining all cookies or by modifying your web browser’s settings to notify you each time a cookie is tendered, permitting you to accept or decline cookies on an individual basis.

Policy for children

We do not knowingly solicit information from or market to children under the age of 13. If you become aware of any data we have collected from children under age 13, please contact us using the contact information provided below.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Internet-based advertising

Additionally, we may use third-party software to serve ads on the Site, implement email marketing campaigns, and manage other interactive marketing initiatives. This third-party software may use cookies or similar tracking technology to help manage and optimize your online experience with us. For more information about opting-out of interest-based ads, visit the Network Advertising Initiative Opt-Out Tool or Digital Advertising Alliance Opt-Out Tool.

Analytics

We may also partner with selected third-party vendors, such as Google Analytics and Google Search Console to allow tracking technologies and remarketing services on the Site through the use of first party cookies and third-party cookies, to, among other things, analyze and track users’ use of the Site, determine the popularity of certain content and better understand online activity. By accessing the Site, you consent to the collection and use of your information by these third-party vendors. You are encouraged to review their privacy policy and contact them directly for responses to your questions. We do not transfer personal information to these third-party vendors. We use Google Analytics to learn how users are interacting with the website so we can enhance user experience. Google may collect:

  • Randomly generated Google Analytics Cookie ID (Client ID)
  • IP Address
  • User ID
  • Hashed Email ID

You can use this Google Chrome extension to opt out: https://tools.google.com/dlpage/gaoptout

You can request for your Google Analytics data to be deleted by using the contact form with the subject “Remove My Google Analytics Data”.

3rd party plugins

Please inquire to the above email for privacy policies on specific 3rd party plugins.

Who we share your data with

By law or to protect rights

If we believe the release of information about you is necessary to respond to legal process, to investigate or remedy potential violations of our policies, or to protect the rights, property, and safety of others, we may share your information as permitted or required by any applicable law, rule, or regulation. This includes exchanging information with other entities for fraud protection and credit risk reduction.

Sale or bankruptcy

If we reorganize or sell all or a portion of our assets, undergo a merger, or are acquired by another entity, we may transfer your information to the successor entity. If we go out of business or enter bankruptcy, your information would be an asset transferred or acquired by a third party. You acknowledge that such transfers may occur and that the transferee may decline honor commitments we made in this Privacy Policy.

We are not responsible for the actions of third parties with whom you share personal or sensitive data, and we have no authority to manage or control third-party solicitations. If you no longer wish to receive correspondence, emails or other communications from third parties, you are responsible for contacting the third party directly.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Do Not Track

Most web browsers and some mobile operating systems include a Do-Not-Track (“DNT”) feature or setting you can activate to signal your privacy preference not to have data about your online browsing activities monitored and collected. No uniform technology standard for recognizing and implementing DNT signals has been finalized. As such, we do not currently respond to DNT browser signals or any other mechanism that automatically communicates your choice not to be tracked online. If a standard for online tracking is adopted that we must follow in the future, we will inform you about that practice in a revised version of this Privacy Policy. Most web browsers and some mobile operating systems include a Do-Not-Track (“DNT”) feature or setting you can activate to signal your privacy preference not to have data about your online browsing activities monitored and collected. If you set the DNT signal on your browser, we will respond to such DNT browser signals.

Emails and correspondence

If you no longer wish to receive correspondence, emails, or other communications from us, you may opt-out via the unsubscribe button in an email or by replying “Unsubscribe” in the subject line.

If you no longer wish to receive correspondence, emails, or other communications from third parties, you are responsible for contacting the third party directly.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Your contact information

For all questions, comments, and more please contact us via the contact form.

Additional information

How we protect your data

We use administrative, technical, and physical security measures to help protect your personal information. While we have taken reasonable steps to secure the personal information you provide to us, please be aware that despite our efforts, no security measures are perfect or impenetrable, and no method of data transmission can be guaranteed against any interception or other type of misuse. Any information disclosed online is vulnerable to interception and misuse by unauthorized parties. Therefore, we cannot guarantee complete security if you provide personal information.

What data breach procedures we have in place

  1. Identification and classification
  2. Containment and recovery
  3. Risk assessment
  4. Reporting of breach
  5. Evaluation of the response & recovery to prevent future breaches

  1. Identification and classification – Identify the following: Date, time, who/what reported the breach, an account of immediate actions taken.
  2. Containment and recovery – As part of the breach management steps to be taken, the following measures have to be considered immediately, where applicable: Shut down the compromised system that led to the data breach, prevent further unauthorized access to the system, reset passwords if accounts and passwords have been compromised, establish whether steps can be taken to recover lost data and limit any damage caused by the breach (e.g. remotely disabling a lost laptop containing personal data of clients and/or individuals), isolate the causes of the data breach in the system, and where applicable, change the access rights to the compromised system and remove external connections to the system notify the police if criminal activity is suspected and preserve evidence for investigation (e.g. hacking, theft or unauthorized system access by an employee), put a stop to practices that led to the data breach, address lapses in processes that led to the data breach.
  3. Risk assessment – Knowing the risks and impact of the data breach will help to determine the consequences to affected organizations and individuals, as well as the steps necessary to notify the organizations and individuals affected.
    For each data breach it has to be assessed:
    -How many people were affected?
    -Whose personal data has been breached?
    -To whom does the personal data belong?
    -What types of personal data were involved?
    -Is there a risk to reputation, identity theft, safety and/or financial loss of affected individuals?
    -How sensitive is the information?
    -Do any additional measures have to be put in place to minimize the impact of the data breach?
    -What caused the data breach?
    -When and how often did the breach occur?
    -Who might gain access to the compromised personal data?
    -Will compromised data affect transactions with any other third parties?
    -Who needs to be notified?
  4. Reporting of breach – Individuals affected by the data breach should be notified.
    Who to notify – We will notify individuals whose personal data have been compromised; We will notify other third parties such as banks, credit card companies or the police, where relevant.
    When to Notify – We notify affected individuals immediately if a data breach involves sensitive personal data. This allows them to take necessary actions early to avoid potential abuse of the compromised data
    Data Privacy & Breach Policy – We notify affected individuals when the data breach is resolved.
    How to Notify – We will reach out to affected organizations and/or individuals in the most effective way, taking into consideration the urgency of the situation and number of individuals affected (e.g. e-mails, telephone calls, letters); Notifications will be simple to understand, specific and provide clear instructions on what individuals can do to protect themselves.
    What to Notify – How and when the data breach occurred, types of personal data involved in the data breach; What has been done or will be done in response to the risks brought about by the data breach; Contact details and how affected individuals can reach administrators for further information or assistance.
  5. Evaluation of the response & recovery to prevent future breaches – After these steps have been taken to resolve the data breach, the cause of the breach has to be reviewed and it has to be evaluated whether existing protection and prevention measures are sufficient to prevent similar breaches from occurring.
    We will assess whether:
    -There are processes that can be streamlined or introduced to limit the damage if future breaches happen or to prevent a relapse;
    -There were weaknesses in existing security measures and protection measures;
    -The methods for accessing and transmitting personal data were sufficiently secure.

What third parties we receive data from

We may receive information from 3rd parties and plugins including but not limited to Google Analytics, Themify, Jetpack, Alphabet, Automattic, Bluehost, Meta, and others.

Industry regulatory disclosure requirements

This website uses a plugin that helps ensure compliance with GDPR and CCPA.

Other

This Privacy Policy was generated in part by Termly’s Privacy Policy Generator.