Privacy Policy

Your privacy is very important to us. Accordingly, we have developed this Policy

in order for you to understand how we collect, use, communicate and make use

of personal information. The following outlines our Privacy Policy.

When accessing our Website, A Cross Stitch in Time will learn certain information about

you during your visit.

 

Similar to other commercial Web sites, our Web site utilizes a standard technology

called “cookies” (see explanation below, “What Are Cookies?”)

and Web server logs to collect information about how our Web site is used. Information

gathered through cookies and Web server logs may include the date and time of

visits, the pages viewed, time spent at our Web site, and the Web sites visited

just before and just after our Web site, your IP address.

 

What Are Cookies?

A cookie is a very small text document, which often includes an anonymous unique

identifier. When you visit a Web site, that site’s computer asks your computer

for permission to store this file in a part of your hard drive specifically

designated for cookies. Each Web site can send its own cookie to your browser

if your browser’s preferences allow it, but (to protect your privacy) your browser

only permits a Web site to access the cookies it has already sent to you, not

the cookies sent to you by other sites.

IP Addresses

IP addresses are used by your computer every time you are connected to the

Internet. Your IP address is a number that is used by computers on the network

to identify your computer. IP addresses are automatically collected by our web

server as part of demographic and profile data known as “traffic data”

so that data (such as the Web pages you request) can be sent to you.

Email Information

If you choose to correspond with us through email, we may retain the content

of your email messages together with your email address and our responses. We

provide the same protections for these electronic communications that we employ

in the maintenance of information received online, mail and telephone.

 

How Do We Use the Information That You Provide to Us?

Broadly speaking, we use personal information for purposes of administering

our business activities, providing customer service and making available other

items and services to our customers and prospective customers.

A Cross Stitch in Time will not obtain personally-identifying information about you when you

visit our site, unless you choose to provide such information to us, nor will

such information be sold or otherwise transferred to unaffiliated third parties

without the approval of the user at the time of collection.

We may disclose information when legally compelled to do so, in other words,

when we, in good faith, believe that the law requires it or for the protection

of our legal rights.

 

Your information will never be shared or sold for marketing purposes.

 

Activity Log

This feature only records activities of a site’s registered users, and the retention duration of activity data will depend on the site’s plan and activity type.

Data Used: To deliver log functionality and record activities around site management, the following information is captured: user email address, user role, user login, user display name, WordPress.com and local user IDs, the activity to be recorded, the WordPress.com-connected site ID of the site on which the activity takes place, the site’s Jetpack version, and the timestamp of the activity. Some activities may also include the actor’s IP address (login attempts, for example) and user agent.

Activity Tracked: Login attempts/actions, post and page update and publish actions, comment/pingback submission and management actions, plugin and theme management actions, widget updates, user management actions, and the modification of other various site settings and options. Retention duration of activity data depends on the site’s plan and activity type. See the complete list of currently-recorded activities (along with retention information).

Data Synced (?): Successful and failed login attempts, which will include the actor’s IP address and user agent.

 

 

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

 

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

 

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracing your interaction with the embedded content if you have an account and are logged in to that website.

 

Analytics

Google Analytics may be used for the propose of tracking traffic data.

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

 

Subscriptions

Data Used: To initiate and process subscriptions, the following information is used: subscriber’s email address and the ID of the post or comment (depending on the specific subscription being processed). In the event of a new subscription being initiated, we also collect some basic server data, including all of the subscribing user’s HTTP request headers, the IP address from which the subscribing user is viewing the page, and the URI which was given in order to access the page. This server data used for the exclusive purpose of monitoring and preventing abuse and spam.

Activity Tracked: Functionality cookies are set for a duration of 347 days to remember a visitor’s blog and post subscription choices if, in fact, they have an active subscription.

 

A Special Note About Children

Children are not eligible to use our web site and services and we ask that

minors (under the age of 13) do not submit any personal information to us. If

you are a minor, you can use this site only in conjunction with permission and

guidance from your parents or guardians.

 

How Do We Protect Your Information and Secure Information Transmissions?

Email is not recognized as a secure medium of communication. For this reason,

we request that you do not send private information to us by email. However,

doing so is allowed, but at your own risk. Some of the information you may enter

on our Web site may be transmitted securely via a secure medium known as Secure

Sockets Layer, or SSL. Credit Card information is never transmitted via email.

{company} may use software programs to create summary statistics, which are used

for such purposes as assessing the number of visitors to the different sections

of our site, what information is of most and least interest, determining technical

design specifications, and identifying system performance or problem areas.

For site security purposes and to ensure that this service remains available

to all users, A Cross Stitch in Time uses software programs to monitor network traffic to identify

unauthorized attempts to upload or change information, or otherwise cause damage.

 

What Rights You Have Over Your Data

If you have an account on this site, or have left comments, you can request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

 

Where We Send Your Data

Visitor comments may be checked through an automated spam detection service.

This site also uses Wordfence Security.  For information on Wordfence, please click here.

 

Policy Changes

We reserve the right to amend this privacy policy at any time with or without

notice. However, please be assured that if the Privacy Policy changes in the

future, we will not use the personal information you have submitted to us under

this Privacy Policy in a manner that is materially inconsistent with this Privacy

Policy, without your prior consent.

We are committed to conducting our business in accordance with these principles

in order to ensure that the confidentiality of personal information is protected

and maintained.

Contact

If you have any questions regarding this Policy, or your dealings with our

web site, please contact us.

A Cross Stitch in Time

Contact Us

Top