Who we are
What personal data we collect and why we collect it
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor comments may be checked through an automated spam detection service.
INFORMATION YOU PROVIDE
DATA STORAGE & USE
Explore Academy uses third-party vendors to enable credit card processing, hardware, software, data exchange, analytics, networking storage and related technology required to run Explore Academy. While Explore Academy owns the code, databases, apps and all rights to the Explore Academy application, you retain all rights to your data.
Only people from Explore Academy who need work-related access are granted access.
To improve the quality of our service, Explore Academy can occasionally provide non-personal statistics about our traffic, customers, sales and patterns relevant to improve the service of third-parties. Third-party vendors are by no means permitted to use personal information for marketing purposes.access.
We follow generally accepted industry standards to protect the personally identifiable information submitted to us, both during transmission and once we receive it. No method of transmission over the Internet, or method of electronic storage, is 100% secure, however. Therefore, while we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.
For any questions in relation to our security measures, please direct questions for the security policy you might have to ‘firstname.lastname@example.org’.
Explore Academy gathers certain information automatically and stores it in log files. This information includes internet protocol addresses as well as browser, internet service provider, referring/exit pages, operating system and date/time stamp.
Explore Academy uses the information to analyze trends, administer the site, or track usage of various features within the site. We may occasionally connect personal information to data gathered in our log files to improve the quality of Explore Academy to individual customers.
We post customer testimonials on our web site which may contain personally identifiable information. We do obtain the customer’s consent via email prior to posting the testimonial to post their name along with their testimonial.
Except as described in this policy, Explore Academy will not share, give or sell any personal information to any third-party. We may disclose such information to respond to subpoenas, court orders, or legal processes, or to establish and exercise our legal rights or defend against legal claims. We may also share such information if we believe it is necessary to investigate, prevent, or take action regarding illegal activities, suspected fraud, situations involving potential threats to the physical safety of any person, or as otherwise required by law.
DEDICATED TO SECURITY & PRIVACY
Explore Academy is built with security and reliability in mind, and we consider security to be a critical component to successfully do your communications online.
All Explore Academy accounts use encrypted SSL-transmissions 256-bit via HTTPS. This is the same level of security used by online banks. No Explore Academy accounts send or receive sensitive information in plain-text. Additionally, industry-standard physical and remote security is administered at data center facilities.
ENSURING AVAILABILITY AND RELIABILITY
Explore Academy is committed to ensuring the availability of your data. We take every precaution to ensure the security and availability by employing technological, physical and administrative security safeguards, such as firewalls and carefully-developed security procedures.
Explore Academy systems and processes adhere to industry best practices in security, including the following:
- Hosting and network connectivity is provided by top carriers.
- Highly scalable and redundant online infrastructures.
- All data is protected by hardware RAID over multiple data storage units.
- Tightly firewalled and monitored servers.
- Strictly controlled access to servers or customer data.
Thank you for your interest!