Who We Are
Our website address is: https://whenwomeninspire.com.
What Personal Data We Collect and Why We Collect It
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
Visitors to the website can download and extract any location data from images on the website.
Some of our website’s services enable you to contact us via email. We will use the information you give us, such as your email, only to respond to your question or other inquiry. Please bear in mind that email transmissions do not automatically undergo encryption, so we suggest you do not include sensitive data such as credit card numbers or bank account details in the contact forms. We offer security via HTTPS across the entire website.
All electronic messages we receive are deleted when no longer required. There is no log kept on this website of the messages sent through the embedded contact forms.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment.
Cookies are also collected when you use this website as per the GDPR banner shown on the first visit to this website. These cookes last for 365 days or 1 year. There is an opt-out option on this banner, and you can revoke your cookies by sending an email to email@example.com at any time. You will receive a response to your message within a reasonable time.
This website may serve advertisements and content from third parties, collect information from visitors directly, and place or recognize cookies on browsers of visitors. We also may provide details about opting out of online ads where the law recognizes it.
This site uses Google Analytics to track overall website usage for a better visitor experience. This stores no personally identifying information. Certain cookies load due to the configuration of our website with Google Analytics; we use them to collect data. The default expiration dates for said cookies as laid out by Google Analytics Cookie Usage. You can opt out of Google Analytics by installing this browser plugin.
Embedded Content from Other Websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Who We Share Your Data With
Data we collect and store relating to you is first and foremost utilized to allow us to provide better services to you. Also, we rely on these lawful grounds to collect and process any personal info you have provided:
- Legitimate Organizational Interests – To give you the details requested of use about our services or products and to give info on additional products we think may interest you if you have consented to receive this type of information.
- Notifications – To tell you about any modifications to our website, including changes to products or services, which can alter our provided services. If you are already a customer, we might contact you about similar goods or services that you previously bought.
- Contractual Obligations – To perform and meet our contractual obligations to you.
- When You Consent – To give you details about unrelated products and services that we think you might like, we may use your data or allow third parties to use your data. We/they may contact you about these products or services via any method you consented to when the data was collected. For new customers, we will only contact you when you gave us consent and only by ways you provided consent for us to do so; the same holds true for use of your data by third-parties. If you do not want us or third parties using your data, you can withhold this consent via the form that we utilize to collect your data.
- Note about Our Advertisers – We do not reveal details about identifiable persons to our advertisers but we might, occasionally, give them aggregate statistical data about our visitors; one possible example is your geographical area of residence.
How Long We Retain Your Data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What Rights You Have Over Your Data
If you have an account on this site, or have left comments, you can request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where We Send Your Data
Visitor comments may be checked through an automated spam detection service. We do not sell, trade or transfer in another way your personally identifiable information to third parties. Exempt from this statement are third parties who help us operate this website, carry out our business, or service you, as long as those parties agree to keep these details private.
Where you have given us consent, you have the right to withdraw that consent at any time by emailing us through our Contact page, but withdrawing consent won’t affect its validity up to the time when you withdraw it.
How We Protect Your Data
We use several security measures to keep your personal details safe as we believe personal data deserves extra safeguards. Access to this data is severely limited to a small number of persons and subject to confidentiality guidelines.
We will take all reasonable steps needed to ensure your data is treated securely and in line with this Policy. However, transmitting data by way of the Internet is not totally safe. While we can do our best to protect your personal data, we can’t guarantee your personal details transmitted to our site. This transmission is at your own risk. When we receive your details, we will utilize security-minded processes and features to try to prevent unauthorized access.
What Data Breach Procedures We have in Place
Our data breach procedures are in place to protect us against possible data security risks, such as breaches of confidentiality, failing to offer choice, and reputation-related damage. Everyone who works for or with whenwomeninspire.com has some responsibility for making sure that data collection, storage, and handling appropriately follows this Policy.
The procedures are the processes that whenwomeinspire.com staff follow in the event whenwomeninspire.com has a data breach or thinks there may have been a data breach.
If a privacy data breach has occurred or is suspected to have occurred, any whenwomeninspire.com staff who is aware of it must within 24 hours tell this site’s Owner in the first instance. The following details, if known at the time, must be shared with the Owner:
a) When did the breach occur?
b) What type of breach is it?
c) What caused the breach?
d) Which systems are affected?
e) Which part of the organization does it involve?
f) Have any steps been taken to correct the issue and, if so, what are they?
After receiving this information, the Owner must assess and figure out the possible impact of the privacy data breach and how significant it may be. If the Owner cannot figure out these details on their own then they must reach out in confidence to a member of the team of the Owner’s choosing to get advice on the actual or suspected breach. Upon receiving this information, the team will take a first look at the issue to craft pre-emptive instructions as to how best to take corrective action, depending on the nature and severity of the breach. If the chosen team member cannot make sense of the breach, whether real or suspected, then the Owner will outsource the corrective action. Again, all details will be kept in confidence in the best interests privacy-wise for all involved parties.
The corrective action might include retrieving or recovering personal details, stopping unauthorized access, and total system shut-down or shut-down of part of the system. Actions to contain the breach must occur as quickly as possible after the initial assessment of the situation is given to the Owner. Where feasibly, a report of the breach or suspected breach, actions taken, outcome of action, and suggestions to prevent this scenario from happening again will be submitted to the Owner by related individuals analyzing the issue. When providing the Owner with a copy of the report, the relevant individual will end it by saying that no further action is required. The Owner will log this information into a shared document with the appropriate staff.
Please note that there is no single way to respond to a data breach and each situation must be responded to on a case-by-case basis, given factors such as circumstances and related risks.
If practicable, this website must tell each person to whom the related personal details relates. If doing so is not practical, this website must also take reasonable steps to make the statement public, including publishing at the site. The Owner will log this statement and also review lessons learned from the issue and, if necessary, review relevant processes and policies with the appropriate staff.
What Third Parties We Receive Data From
What Automated Decision Making and/or Profiling We Do with User Data
Currently, we utilize user data only to offer services on this website and target users for ads to remind them of services and products we offer.
Industry Regulatory Disclosure Requirements
Aside from breach notifications, we are not aware of any regulatory disclosures we need to provide. If you are aware of any, please feel welcome to let us know via the Contact page.