Privacy Policy

Privacy Policy

Because we value your patronage, we want to address any privacy concerns you may have. To that end, we have set forth our privacy policy for handling the information you share with us online. We want your decision to visit with us to be an informed one.

Who We Are

Taylor South Eastside Project

In this Privacy Policy, we use “we,” “us,”  “our,” or  “TSEP” to refer to Taylor South Eastside Project and “you” or “your” to refer to you, the user, member or visitor to our web sites.

Our website address is:

This Policy may be amended or updated from time to time, so please check it regularly for updates.

What personal data we collect and why we collect it


When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.


If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact Forms

We use a Contact Form plugin to manage contact form submissions. The information is sent as email messages that only a select few are allowed to access. The information is also stored in the database on our hosting server for backup and later reference purposes. We use the Mail Chimp plugin to safely manage this data.


If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded Content From Other Websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracing your interaction with the embedded content if you have an account and are logged in to that website.


Who we share your data with

We do not rent or sell your personal contact information (such as your email address associated with your account registration) to third parties to use for their own marketing purposes. We share information in the following ways:

Corporate Affiliates and Business Transfers

We may share information from or about you with a potential or actual acquirer, successor, or assignee as part of any reorganization, merger, sale, joint venture, assignment, transfer, or other disposition of all or any portion of our business, assets, or stock (including in bankruptcy or similar proceedings). In these cases, their use will be subject to this Privacy Policy.


We may investigate and disclose information from or about you, as permitted by applicable law, if we believe that such investigation or disclosure is (a) reasonably necessary to comply with legal process and law enforcement instructions and orders, such as a search warrant, subpoena, statute, judicial proceeding, or other legal process served on us; (b) helpful to prevent, investigate, or identify possible wrongdoing in connection with our Website; (c) helpful to protect our rights, reputation, property, or that of our visitors, users, corporate affiliates, or the public; or (d) to enforce compliance with our agreements with you. (for example, the Terms of Use).

Third Party Plug-ins, Widgets, and Links

Our Website may include third-party social media features and other third-party plug-ins and widgets. When these features are displayed on our Website, they are operated or hosted by third parties and are subject to their own privacy policies instead of this Privacy Policy. Our Website also contains links to third-party sites that are not controlled or operated by us. Please be aware that we are not responsible for the privacy practices of such other sites.

We do use some WordPress plugins on this website that may pass data, including personal information, to external servers to process, such as Akismet Anti-Spam or Jetpack by

We only use WordPress plugins and themes that are hosted by’s guidelines clearly prohibit tracking users without their explicit informed consent.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Your contact information

We collect information that you provide us, from third parties, and automatically when you use our Website. We collect information associated with your device using cookies and similar technologies. We may also receive information about your location.

Information You Provide Us

We collect information that you provide us, including your account and profile information, content you submit or post to our Website, your communications, and information you provide to us as part of surveys and contests.

Other Websites

We may receive information about you from third-party websites that obtain your permission to share this information with us. If you choose to sign-up for our Website through Facebook or Google or upload your contacts from your third-party email service, you will be asked to share certain information with us as identified by those third-party websites.

Additional information

Automatically Collected Information

We collect information about your use of our Website, including your search activity, the pages you view, the date and time of your visit, and if you use our browser extensions, content you interact with on third-party sites. We also collect information that your device provides to us in connection with your use of our Website, such as your browser type, type of device, browser language, IP address, mobile carrier, unique device identifier, location, and requested and referring URLs.

How we protect your data

We use reasonable and appropriate measures to protect your personal information from loss, misuse, unauthorized access, disclosure, alteration, and destruction, taking into account the risks involved in the processing and the nature of the personal information.

What data breach procedures we have in place

1.     When a security incident is detected or reported, key first steps are to (1) contain the incident, (2) initiate an investigation of its scope and origins, and (3) decide if it qualifies as a Breach.

2.     The identification phase of incident response has as its goal the discovery of potential security incidents and the assembly of an incident response team that can effectively contain and mitigate the incident.

3.     The verification phase and has the primary goal of confirming that the compromise is genuine and presents sufficient risk to engage the process.

4.     The containment phase represents the beginning of the monitoring of the attacker’s activities and to determine whether interesting data is leaking during the investigation. Whenever possible, this is done by performing network quarantine at the time of detection. This is the most time-sensitive and also the most contextually dependent phase of the investigation.

5.     The analysis phase is where in-depth investigation of the available network-based and host-based evidence occurs. The primary goal of analysis is to establish whether there is reasonable belief that the attacker(s) successfully accessed Restricted Data or GDPR Data on the compromised system.

6.     The primary goal of the recovery phase is to restore the compromised host to its normal business function in a safe manner.

7.     For incidents involving GDPR Data, we will address each accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, GDPR Data.


We may, from time to time, change our Privacy Policy. We will notify you of any changes by posting our updated Privacy Policy on our Website and inserting a new “Effective Date.”


If you would like to send us a request as indicated above, or if you have any other questions or concerns regarding our Privacy Policy, you may contact us by using our contact form or email mailing us at


This Privacy Policy is effective as of March 23rd, 2018