What personal information does Event Ready collect from the people that visit our blog, website or app?
+ When inquiring about or services on our site, as appropriate, you may be asked to enter your name, email address, phone number or other details to help you with your experience.
When do we collect information on our site?
+ We collect information from you when you fill out and submit a form or enter information on our site.
How do we use your information?
+ We may use the information we collect from you when you inquire about our services, sign up for our newsletter, respond to a survey or marketing communication, browse the website, or use certain other site features to follow up with them after correspondence (chat, email or phone call inquiries)
How do we protect your information?
- We do not use vulnerability scanning and/or scanning to PCI standards.
- We only provide articles and information. We never ask for credit card numbers.
- We do not use Malware Scanning.
- Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
We implement a variety of security measures when a user enters, submits, or accesses their information to maintain the safety of your personal information.
All transactions are processed through a gateway provider and are not stored or processed on our servers.
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser’s Help Menu to learn the correct way to modify your cookies.
If you turn cookies off, some of the features that make your site experience more efficient may not function as intended.
We do not trade, sell or otherwise transfer information to outside parties your Personally Identifiable Information unless we provide users with advance notice. This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or serving our users, so long as those parties agree to keep this information confidential. We may also release information when it’s release is appropriate to comply with the law, enforce our site policies, or protect ours or others’ rights, property or safety.
Non-personally identifiable visitor information (anonymous) may be provided to other parties for marketing, advertising, or other uses.
We do not include or offer third-party products or services on our website.
We do, for the sake of understanding our audience, have Demographics and Interests Reporting turned on in Google Analytics to better understand our target market.
California Online Privacy Protection Act (CalOPPA)
According to CalOPPA, we agree to the following:
- Users can visit our site anonymously.
How does our site handle Do Not Track signals?
We honor ‘Do Not Track’ signals and ‘Do Not Track’, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
Does our site allow third-party behavioral tracking?
It’s also important to note that we do not allow third-party behavioral tracking
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices, should a data breach occur, we will notify you via email within 7 business days. We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.