Who We Are
Taylor South Eastside Project
Our website address is: https://www.taylorsoutheastside.com.
This Policy may be amended or updated from time to time, so please check it regularly for updates.
What personal data we collect and why we collect it
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
We use a Contact Form plugin to manage contact form submissions. The information is sent as email messages that only a select few are allowed to access. The information is also stored in the database on our hosting server for backup and later reference purposes. We use the Mail Chimp plugin to safely manage this data.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded Content From Other Websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Who we share your data with
We do not rent or sell your personal contact information (such as your email address associated with your account registration) to third parties to use for their own marketing purposes. We share information in the following ways:
Corporate Affiliates and Business Transfers
Third Party Plug-ins, Widgets, and Links
We do use some WordPress plugins on this website that may pass data, including personal information, to external servers to process, such as Akismet Anti-Spam or Jetpack by WordPress.com.
We only use WordPress plugins and themes that are hosted by WordPress.org. WordPress.org’s guidelines clearly prohibit tracking users without their explicit informed consent.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor comments may be checked through an automated spam detection service.
Your contact information
We collect information that you provide us, from third parties, and automatically when you use our Website. We collect information associated with your device using cookies and similar technologies. We may also receive information about your location.
Information You Provide Us
We collect information that you provide us, including your account and profile information, content you submit or post to our Website, your communications, and information you provide to us as part of surveys and contests.
We may receive information about you from third-party websites that obtain your permission to share this information with us. If you choose to sign-up for our Website through Facebook or Google or upload your contacts from your third-party email service, you will be asked to share certain information with us as identified by those third-party websites.
Automatically Collected Information
We collect information about your use of our Website, including your search activity, the pages you view, the date and time of your visit, and if you use our browser extensions, content you interact with on third-party sites. We also collect information that your device provides to us in connection with your use of our Website, such as your browser type, type of device, browser language, IP address, mobile carrier, unique device identifier, location, and requested and referring URLs.
How we protect your data
We use reasonable and appropriate measures to protect your personal information from loss, misuse, unauthorized access, disclosure, alteration, and destruction, taking into account the risks involved in the processing and the nature of the personal information.
What data breach procedures we have in place
1. When a security incident is detected or reported, key first steps are to (1) contain the incident, (2) initiate an investigation of its scope and origins, and (3) decide if it qualifies as a Breach.
2. The identification phase of incident response has as its goal the discovery of potential security incidents and the assembly of an incident response team that can effectively contain and mitigate the incident.
3. The verification phase and has the primary goal of confirming that the compromise is genuine and presents sufficient risk to engage the process.
4. The containment phase represents the beginning of the monitoring of the attacker’s activities and to determine whether interesting data is leaking during the investigation. Whenever possible, this is done by performing network quarantine at the time of detection. This is the most time-sensitive and also the most contextually dependent phase of the investigation.
5. The analysis phase is where in-depth investigation of the available network-based and host-based evidence occurs. The primary goal of analysis is to establish whether there is reasonable belief that the attacker(s) successfully accessed Restricted Data or GDPR Data on the compromised system.
6. The primary goal of the recovery phase is to restore the compromised host to its normal business function in a safe manner.
7. For incidents involving GDPR Data, we will address each accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, GDPR Data.