Last Revised: April 29, 2017
When you use our Services, we may collect Personal Information and may engage Third Party services to collect Personal Information. Personal Information may include contact information, payment information, IP addresses, service usage information, and questions or comments you submit. We use this Personal Information to effectively provide you with the Services, as well as to learn how we can improve our Services.
We do not solicit personally identifying information from children. Visitors who are under 13 years of age should not submit any personally identifying information.
We collect data that you submit directly, as well as data about the usage of our Services. Some data collection methods use Third Party services, which have their own terms and policies. The collection methods we use are outlined below.
Our web servers record information about visitors in server log files. Server logs include IP addresses, which describe the location of a computer or network on the internet. Server logs are useful for troubleshooting purposes.
When we send emails we may include small, embedded images, known as web beacons, and may uniquely encode links. These techniques allow us to track individual responses to emails and to calculate aggregate open rates and click rates to gauge the effectiveness of our communications.
We provide links to external websites that may be useful or interesting, however we do not attest to the accuracy, relevance, or completeness of any information provided on external websites.
Service Providers: We use a variety of Third Party services to provide the Site and the Service. All of these Third Party services may have indirect or direct access to pieces of Personal Information. We use the following services: Google G Suite to send and receive email; Mailgun, Postmark, and Paubox for transactional email and contact form delivery; MailChimp for sending email newsletters; Linode for cloud servers; Quantum Gateway for payment processing; OpenSRS for domain name registration.
Acquisition, Merger, or Partnership: We do not sell your Personal Information to any third party, however it is possible that in the future we may be acquired by, merge with, or partner with another business entity in which case we may share your Personal Information.
We take the following measures to help protect your sensitive Personal Information: we secure all passwords with a one-way password hashing function; we use TLS (Transport Layer Security) when collecting any information (TLS is a standard security technology for establishing an encrypted connection between a server and a client); we never store credit card numbers on our servers (credit card numbers are stored directly by the payment gateway); we never ask for, nor will we accept, payment information via email (payment information may only be submitted via the TLS encrypted billing system). In addition, we may require written authorization from you before communicating with third parties about your account. While these measures help to protect your Personal Information, they cannot eliminate the security risks inherent in transmitting information over the internet and storing information on internet connected computers. Whenever you provide Personal Information, you do so at your own risk.
Server Logs: When you visit a hosted website, your IP address will be saved in server log files. When you submit Personal Information through a contact form powered by our Service, your email address and marketing opt-in preferences may also be saved in log files. This information is used to validate that you have opted into receiving marketing emails from the website owner.
Contact Forms: Hosted websites may offer contact forms to collect information from visitors. The information you submit via a contact form powered by our Service is sent to the website owner at an email address of their choosing. Contact form submissions are secured with TLS encryption during transmission and with AES-256 encryption at rest on servers. Messages will only be delivered to the website owner if their email service provider accepts TLS transmission. TLS only encrypts the message while it is in transit across the internet, so it is possible that the recipient's email provider may store or forward the message without encryption.