Privacy policy
AGREEMENT TO TERMS
Our Privacy Policy is designed to safeguard the privacy rights of every visitor to our website promindfulnotes.com, ensuring the protection of personal data and any information shared with us. We prioritize the security of your personal information and strive to be transparent about how we collect and process it, as well as your rights concerning the information you provide. Your privacy is paramount to us, and we are committed to taking all necessary measures to ensure its safety. By publishing this privacy policy, we aim to foster trust and transparency in our relationship with our visitors and clients, as your cooperation is integral to our operations.
What is PERSONAL DATA?
Personal Data refers to any information concerning an identified or identifiable individual; an identifiable individual is someone who can be directly or indirectly identified, particularly by reference to an identifier like a name, an identification number, location data, an online identifier, or by one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, behavioral, or social identity of that individual.
What INFORMATION WE MAY COLLECT from you?
Information we receive from you when you submit inquiries: Examples of personal data that we may collect include your full name, communication records, email address, phone number, and location.
When you contact us through the contact form, we retain a record of your communication to address your concerns promptly and effectively. Your email address may be used to update you on our services, such as informing you about upcoming changes or enhancements.
Additionally, we may process personal information obtained directly from you or from other sources. Such data may include:
- Information related to the operations of our collaborative efforts, such as details about products developed, services provided or received, and technical specifications, may be collected.
- Additionally, we may need to process other personal data to conclude or execute agreements with you.
- If our website is used solely for informational purposes and you do not submit additional information, we only collect technical data sent by your browser to our servers. This includes:
- Your IP address
- Date and time of your website visit
- Duration of your visit
- Pages visited and time spent on them
- Access status/HTTP status code
- Amount of data transmitted
- Internet browser and version
- Operating system and user interface
- Domain name of your Internet service provider
- Referring website
- Demographic information
- Source and medium of acquisition
Other (TOOL, RESOURCES & SERVICE PROVIDERS)
In pursuit of effective operations and ongoing enhancements, we may gather and manage your personal data using various tools, resources, and service providers. Rest assured, we uphold stringent security measures to safeguard your personal information and ensure that none of your rights are infringed upon.
We may process your personal data for several reasons
The processing of personal data may be justified under the following legal bases:
- Consent: When the data subject has given explicit consent for specific purposes.
- Contractual necessity: When processing is necessary for the performance of a contract with the data subject or for pre-contractual measures at the data subject's request.
- Legal obligation: When processing is necessary to comply with a legal obligation imposed on the data controller.
- Vital interests: When processing is necessary to protect the vital interests of the data subject or another individual.
- Public interest: When processing is necessary for tasks carried out in the public interest or in the exercise of official authority vested in the controller.
- Legitimate interests: When processing is necessary for the legitimate interests pursued by the controller or a third party, except where such interests are overridden by the rights and freedoms of the data subject, particularly in the case of a child.
THIRD PARTY SITES
This policy specifically covers our activities conducted on our servers. However, it's important to note that other websites, including those linked within advertisements, articles, or through co-branded services, may have their own policies that we do not control. As such, these external policies are not addressed by this policy.
PRIVACY RIGHTS
Right to information
This right provides the data subject with the ability to ask for information about what personal data (about him or her) is being processed and the rationale for such processing.
Right to access
This right provides the data subject with the ability to get access to his or her personal data that is being processed. This request provides the right for data subjects to see or view their own personal data, as well as to request copies of the personal data.
Right to rectification
This right provides the data subject with the ability to ask for modifications to his or her personal data in case the data subject believes that this personal data is not up to date or accurate.
Right to withdraw consent
This right provides the data subject with the ability to withdraw a previously given consent for the processing of their personal data for a purpose. The request would then require a halt to the processing of the personal data that was based on the consent provided earlier. You can revoke your consent to personal data processing via every email we send to you.
Right to object
This right provides the data subject with the ability to object to the processing of their personal data.
Right to object to the automated processing
This right provides the data subject with the ability to object to a decision based on the automated processing.
Right to be forgotten
Also known as a right to erasure, this right provides the data subject with the ability to ask for the deletion of their data.
Right of data portability
This right provides the data subject with the ability to ask for transfer of his or her personal data.
SECURITY
We employ industry-standard measures to safeguard your personally identifiable information against unauthorized access. These methods typically include storing such information on a secure computer behind our firewall in a controlled location. Additionally, access to this data is often restricted internally to a limited number of authorized employees.