Who we are
Our website address is: whenwomeninspire.com.
What personal data we collect and why we collect it
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
Some of our website’s services enable you to contact us via email. We will use the information you give us, such as your email, only to respond to your question or other inquiry. Please bear in mind that email transmissions do not automatically undergo encryption, so we suggest you do not include sensitive data such as credit card numbers or bank account details in the contact forms.
If we do require such info via contact forms, it will be on a website that states the page clearly and its transmission of information is secure and by encryption. All electronic messages we receive are deleted when no longer required.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
We use Google Analytics, which is a Google web analytics service. Google uses collected dtal to track and monitory our site’s usage. This data is shared with other Google services and Google may use the collected data to personalize and contextualize adverts within its own advertising platform.
You can opt-out having your activity available to Google Analytics. To do so install Google Analytics’ opt-out browser add-on at https://tools.google.com/
Who we share your data with
Data we collect and store relating to you is first and foremost utilized to allow us to provide better services to you. Also, we rely on these lawful grounds to collect and process any personal info you have provided:
- Legitimate Organizational Interests – To give you the details requested of use about our services or products and to give info on additional products we think may interest you if you have consented to receive this type of information.
- Notifications – To tell you about any modifications to our website, including changes to products or services, which can alter our provided services. If you are already a customer, we might contact you about similar goods or services that you previously bought.
- Contractual Obligations – To perform and meet our contractual obligations to you.
- When You Consent – To give you details about unrelated products and services that we think you might like, we may use your data or allow third parties to use your data. We/they may contact you about these products or services via any method you consented to when the data was collected. For new customers, we will only contact you when you gave us consent and only by ways you provided consent for us to do so; the same holds true for use of your data by third-parties. If you do not want us or third parties using your data, you can withhold this consent via the form that we utilize to collect your data.
- Note about Our Advertisers – We do not reveal details about identifiable persons to our advertisers but we might, occasionally, give them aggregate statistical data about our visitors; one possible example is your geographical area of residence.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor comments may be checked through an automated spam detection service. We do not sell, trade or transfer in another way your personally identifiable information to third-parties. Exempt from this statement are third parties who help us operate this website, carry out our business, or service you, as long as those parties agree to keep these details private. We may also release data when we believe it to be in compliance with the law, carry out our website policies, or for the protection of rights (ours or others’ rights), safety, or property. But non-personally identifiable details may be given to third parties specifically for marketing, advertising, or another specific usage.
Where you have given us consent, you have the right to withdraw that consent at any time by emailing us through our Contact Us page, but withdrawing consent won’t affect its validity up to the time when you withdraw it.
How we protect your data
We use several security measures to keep your personal details safe as we believe personal data deserves extra safeguards. We diligently ensure data undergoes encryption while in transit and storage. Also, access to this data is severely limited to a small number of persons and subject to confidentiality guidelines.
We will take all reasonable steps needed to ensure your data is treated securely and in line with this Policy. However, transmitting data by way of the Internet is not totally safe. While we can do our best to protect your personal data, we can’t guarantee your personal details transmitted to our site. This transmission is at your own risk. When we receive your details, we will utilize security-minded processes and features to try to prevent unauthorized access.
What data breach procedures we have in place
Our data breach procedures are in place to protect us against possible data security risks, such as breaches of confidentiality, failing to offer choice, and reputation-related damage. Everyone who works for or with whenwomeninspire.com has some responsibility for making sure that data collection, storage and handling is appropriately done in line with this Policy.
The procedures are the processes that whenwomeinspire.com staff follow in the event whenwomeninspire.com has a data breach or thinks there may have been a data breach.
If a privacy data breach has occurred or is suspected to have occurred, any whenwomeninspire.com staff who is aware of it must within 24 hours tell the whenwomeninspire.com Owner in the first instance. The following details, if known at the time, must be shared with the Owner:
a) When did the breach occur?
b) What type of breach is it?
c) What caused the breach?
d) Which systems are affected?
e) Which part of the organization does it involve?
f) Have any steps been taken to correct the issue and, if so, what are they?
After receiving this information, the Owner must assess and figure out the possible impact of the privacy data breach and how significant it may be. If the Owner cannot figure out these details on their own then they must reach out in confidence to a member of the team of the Owner’s choosing to get advice on the actual or suspected breach. Upon receiving this information, the team will take a first look at the issue to craft pre-emptive instructions as to how best to take corrective action, depending on the nature and severity of the breach. If the chosen team member cannot make sense of the breach, whether real or suspected, then the Owner will outsource the corrective action. Again, all details will be kept in confidence in the best interests privacy-wise for all involved parties.
The corrective action might include retrieving or recovering personal details, stopping unauthorized access, and total system shut-down or shut-down of part of the system. Actions to contain the breach must occur as quickly as possible after the initial assessment of the situation is given to the Owner. Where feasibly, a report of the breach or suspected breach, actions taken, outcome of action, and suggestions to prevent this scenario from happening again will be submitted to the Owner by related individuals analyzing the issue. When providing the Owner with a copy of the report, the relevant individual will end it by saying that no further action is required. The Owner will log this information into a shared document with the appropriate staff.
Please note that there is no single way to respond to a data breach and each situation must be responded to on a case-by-case basis, given factors such as circumstances and related risks.
If practicable, this website must tell each person to whom the related personal details relates. If doing so is not practical, this website must also take reasonable steps to make the statement public, including publishing at the site. The Owner will log this statement and also review lessons learned from the issue and, if necessary, review relevant processes and policies with the appropriate staff.
What third parties we receive data from
We do not receive data from external third parties.
What automated decision making and/or profiling we do with user data
Currently, we utilize user data only to offer services on this website and target users for ads to remind them of services we offer.
Industry regulatory disclosure requirements
Aside from breach notifications, we are not aware of any regulatory disclosures we need to provide. If you are aware of any, please feel welcome to let us know via the Contact Us page.
This policy was last modified on 8/09/2018.