OUR CORE BELIEFS ABOUT USER PRIVACY AND DATA PROTECTION
- User Privacy and Data Protection are your rights
- We practice a high duty of care to the people within our data
- Data is liability, it should be provided voluntarily by our customers
- We will never distribute or sell your personal information
AS CONSUMERS, YOU HAVE THE RIGHT TO:
- Access your information
- Have inaccuracies corrected
- Have information erased
- Cancel and/or Unsubscribe at any time
Along with our business and internal computer systems, this website is designed to comply with the following legislations with regards to data protection and user privacy:
PERSONAL INFORMATION THIS WEBSITE COLLECTS AND WHAT WE DO WITH IT
Any of the information we collect from you may be used in one of the following ways:
- To personalize your experience – (your information helps us to better respond to your individual needs)
- To improve our website – (we continually strive to improve our website offerings based on the information and feedback we receive from you)
- To improve customer service – (your information helps us to more effectively respond to your customer service requests and support needs)
- To process transactions – Your information, whether public or private, will not be sold, exchanged, transferred, or given to any other company for any reason whatsoever, without your consent, other than for the express purpose of delivering the purchased product or service requested.
- To administer a contest, promotion, survey or other site feature
- To send periodic emails – The email address you provide for order processing, may be used to send you information and updates pertaining to your order, in addition to receiving occasional company news, updates, related product or service information, etc.
- Note: If at any time you would like to unsubscribe from receiving future emails, we include detailed unsubscribe instructions at the bottom of each email.
HOW DO WE PROTECT YOUR INFORMATION?
We implement a variety of security measures to maintain the safety of your personal information when you place an order or enter, submit, or access your personal information.
We offer the use of a secure server. All supplied sensitive/credit information is transmitted via Secure Socket Layer (SSL) technology and then encrypted into our Payment gateway providers database only to be accessible by those authorized with special access rights to such systems, and are required to keep the information confidential.
After a transaction, your private information (credit cards, social security numbers, financials, etc.) will not be stored on our servers.
Site visitation tracking
Like most websites, this site uses Google Analytics (GA) to track user interaction. We use this data to determine the number of people using our site, to better understand how they find and use our web pages and to see their journey through the website.
Although GA records data such as your geographical location, device, internet browser and operating system, none of this information personally identifies you to us. GA also records your computer’s IP address which could be used to personally identify you but Google do not grant us access to this.
Disabling cookies on your internet browser will stop GA from tracking any part of your visit to pages within this website.
Yes (Cookies are small files that a site or its service provider transfers to your computer’s hard drive through your Web browser (if you allow) that enables the sites or service providers systems to recognize your browser and capture and remember certain information.
A cookie is a small file placed on your computer’s hard drive that enables us to monitor which pages you find useful and which you do not. Our site and third parties such as advertisers may add a cookie to help analyse web traffic or to determine targeted advertisements based on your preferences and your visit to our site and other sites on the internet.
Once you have bought one of our programs or signed up to a free offer, your information, such as; email address, first name, and your last name, are stored at the list server that delivers the Healthy You Healthy Love products access and newsletters. Those who help manage our lists in order to deliver email to those who would like to receive our newsletters, supporting products and information, can only access your information.
All of the e-newsletters that are sent to you will include an unsubscribe link in them. You can remove yourself at any time from our newsletters by clicking the unsubscribe link.
If you have purchased any of my programs, you will continue to receive mailings related to your purchase.
If you are an affiliate partner, you will continue to receive mailings associated to our affiliate program. If you would like to be removed please unsubscribe or contact support: firstname.lastname@example.org
Manychat: If you have agreed for us to communicate with you via Manychat through Facebook Messenger at that time you may have been also added to our ESP (Email Service Provider). This will always be known to you as we will have a disclaimer on the sales or optin page. You can remove yourself from both platforms at any time.
ABOUT THE WEBSITE’S SERVER
GENERAL DATA CENTER FEATURES:
Data center which are all engineered with fully redundant connectivity, power and HVAC to avoid any single point of failure, and is staffed 24 x 7 by highly trained technical support staff. In addition multiple levels of security are employed to ensure that only data center Operations Engineers are physically allowed near your routers, switches and servers. This allows us to deliver on our 100% infrastructure availability guarantee
General server administration activities:
Security monitoring & troubleshooting of server
For any online system to be conveniently accessible from multiple locations and multiple devices, it must be hosted on the internet; but every system hosted on the internet is subject to a range of security threats. As with any such server on the internet, the servers are subjected to a constant stream of attacks. The majority of these are automated attacks testing for vulnerabilities, but this can also include directed, malicious probing by motivated attackers. In such a volatile, fast-moving environment, it is not possible to rely solely on automated defenses such as firewalls and intrusion detection systems: these technologies must be actively supported by manual review of security logs and threat assessments, including case-by-case countermeasures as and when necessary.Security is always an ongoing process, not a state that can ever be achieved or completed. Without ongoing activities in this category, not only would it not be possible to prevent the server from being compromised by attackers, it would be impossible to even know if the server was compromised or not.
PERFORMANCE MONITORING OF SERVER.
The website or application system is an active, busy software system that is constantly using server resources (CPU cores, RAM, disk input/output, network connections, etc.) and based on intensity of usage, overall volume of data, timing and other factors, there are many different issues that can arise on a day-to-day basis (for example, if an unusually high number of users initiate disk-intensive activities at the same time that an automated backup process is running). Such issues can be quickly identified and resolved by server administrators who maintain constant review of resource utilization patterns. But if left unattended such issues can escalate to become serious issues that are detrimental to performance, data integrity and system reliability.
MONITORING OF SECURITY THREATS, ISSUES AND AVAILABLE UPGRADES IN SERVER SOFTWARE AND ENVIRONMENT.
It is important to understand that your website / application system is not a standalone piece of software but intricately connected to its software environment in many ways. This environment includes the server software upon which the website or application operates such as the web server, database server, operating system, programming languages, libraries, frameworks and components in use. Any of these (or any combination of these) might present security issues or vulnerabilities that need to be taken into account.
TIMELY APPLICATION OF SECURITY PATCHES, FIXES AND UPGRADES FOR SERVER SOFTWARE.
This is a companion activity to the above. One of the common types of malicious attack faced by all online systems, its attackers seeking to exploit newly discovered vulnerabilities in server software before security patches are released and applied.
MAINTAINING VALID BACKUPS AND ENSURING DISASTER PREPAREDNESS, INCLUDING EMERGENCY REDEPLOYMENT READINESS.
This is a category of activities dedicated to ensuring protection against disaster, such as physical hardware failure in the server. Part of the hosting service provided is that both the data in the system, and the server itself, are both backed up offsite, and backups are regularly verified as being correctly archived without file corruption or loss of information. Emergency redeployment readiness means that in the event of physical hardware failure of the server, we can re-deploy the server software and the website from backups to a new server, at a different datacenter if necessary, immediately. While failures of this type are not frequent, without careful preparation and planning and a team trained to respond, failures of this type can be catastrophic. Without activities in this category, there is no way for a system to recover from this type of failure.
DO WE DISCLOSE ANY OF YOUR INFORMATION TO OUTSIDE PARTIES?
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information. This does not include trusted third parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential. We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others rights, property, or safety. However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.
THIRD PARTY LINKS
Occasionally, at our discretion, we may include or offer third party products or services on our website. These third party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites.
OUR THIRD PARTY DATA PROCESSORS
In order to process your purchase your information will be collected by the following companies – Clickbank is our product retailer and they use their own merchant accounts to process your payments. Your email address and first and last name, if given, will be stored within the GetResponse our elected email management system. Paypal is also used for some purchases.
The data controller of this website is Nadine Piat-Niski under the registered business name of Calibrate Coaching – ABN 69 325 564 790.
DATA PROTECTION OFFICER
Business Owner: Nadine Piat-Niski
This policy may be changed at any time at the discretion of Calibrate Coaching. Should we update this policy, we will post the updates to this page on our Website. This policy was revised April 15, 2018.