This is the personal blog of Jim Schuyler.
What personal data is collected and why
When visitors leave comments on the site we retain the data shown in the comments form (name and email address), along with the visitor’s IP address and browser user agent string to help spam detection.
An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it.
If you upload images to the website, you may wish to avoid uploading images that contain embedded location data (EXIF GPS). Visitors to the website can download and extract location data contained in images on the website.
If you fill out a contact form, your email address, any name you give, and your contact request will be retained.
If you subscribe to our email list, your name and email address will be retained by a third-party so we can communicate with you. Each email you receive will contain an opt-out clickable link so you can remove yourself from the list. You may also request deletion from the list by emailing email@example.com telling us the email address you wish to have removed.
If you leave a comment on the site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (for example, videos, images, or articles). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
This site does not contain advertising and does not track your visit for any advertising-related purpose.
We use Google Analytics to determine what pages are being visited. The information is collected anonymously. You can turn it off by refusing scripts from this site in your browser.
Who we share your data with
If you subscribe to our email list, your email address and name are retained by a third-party email list provider. They tell us they do not share our list with anyone else.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users who register on this website we also store any personal information provided in their user profile. All users can see, edit, or delete their own personal information at any time (except they cannot change their username). Website administrators can also see and edit this information.
Server logs are typically retained less than one year.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes. Contact through firstname.lastname@example.org
Where we send your data
Visitor comments are checked through an automated spam detection service. Email list subscriptions are verified and retained by a third-party email list provider.
How we protect your data
When you are interacting with the web site, your page requests, anything you type, and the pages you view are encrypted (HTTPS).
The web server is swept at least once a day to detect any compromises. Your name and email, if retained for any of the reasons above, are stored in an unencrypted database which requires separate administrative credentials to view or modify.
When data are moved from the server to local storage in our office computers, those computers are protected by Filevault disk and volume encryption.
What data breach procedures we have in place
If we become aware of a breach we will notify affected parties by email, because email addresses and names are pretty much all we retain. If you believe our data has been breached, you may notify us at email@example.com and we will investigate. Please provide us with any evidence you have that unique information was obtained, or knowledge you may have of any specific compromise.