Who I Am
I'm a single person, running a 'blog to suit myself. Examine the URL field of your client if you want to learn the URI of this website.
What Personal Data I Collect and Why I Collect It
My hosting service makes available logs of visits to my domain. Sometimes I retrieve these; sometimes I do not. Generally, I look at them to see what resources have proved to be popular. For the most part, I am simply curious; but I may make decisions on what resources to provide in future based on such data.
When you come to this 'blog, the IP number of the device through which you connect is logged, as is any user-agent string delivered by your client and the URI of a site by which the client was referred to this 'blog. (Clients may be configured not to deliver this information. Some are configured to provide false information.) I identify apparent attacks. I attempt to satisfy personal curiosity. Sometimes I try to determine when someone whom I know personally has paid a visit. I look to see whether a particular link placed on another site has resulted in visits. I may make decisions on what resources to provide in future based on such data.
When visitors leave comments on the site I collect the data shown in the comments form, and also the visitor’s IP address and client user-agent string to help spam detection.
The contact form collects whatever information you give to it, uses this information to effect a communication with me, and then discards that information.
If you leave a comment on my site then you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill-in your details again when you leave another comment. These cookies will last for one year.
If you have an account and you log into this site, the software will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. When you log into this site, the software will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select
Remember Me, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
Embedded Content from Other Websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
I've not installed any analytic software, nor do I plan to install any. I reserve the right to change my plans.
With Whom I Share Your Data
I sometimes share data with subgroup of those with accounts on the 'blog. I may mention geolocations and identifiers to other friends. (For example, when someone made a personal attack in a comment, using a fictitious identifiers, to friends I provided the geolocation of the attack, the fictitious identifiers, and an explanation of what were revealed by the choices of fictitious identifiers.)
How Long I Retain Your Data
If you leave a comment, the comment and its metadata are retained indefinitely. The metadata is retained is so the software can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on my website, the software also stores the personal information that they provide in their user profile. All users can see, edit, or delete their own personal information at any time, except that they cannot change their usernames. (I'll change usernames upon request!) Website administrators can also see and edit that information.
Whither I Send Your Data
Visitor comments may be checked through an automated spam detection service.
Your Contact Information
Use the contact form if you have a privacy-specific concern.
How I Protect Your Data
I have security software installed and keep that and other software up-to-date. I rely upon my hosting service; a previous hosting service proved to be unreliable when it came to security, and I make no promises about the present host. If the measures that they or I have taken prove to be insufficient, the perhaps some villain will get what very little information my software has stored about you.
What Data Breach Procedures I Have in Place
None. I'll respond in some ad hoc manner if there's a data breach.
From What Third Parties I Receive Data
None, except in-so-far as the classification of comments as spam or otherwise may be said to be data. (See the section entitled
Whither I Send Your Data.)
What Automated Decision-Making and/or Profiling I Do with User Data
None, with the exception that my presentation software is responsively coded to present the 'blog differently for
mobile devices from how it is presented for
desktop devices. (Only the formatting is changed, with the exception that
mobile devices receive the sidebar in some cases in which
desktop devices do not.) In future, I may automate more significant decisions about content presented, based upon user data.