Last updated December 31, 2019
What personal information do we collect?
You may be asked to enter your name, email address or other details to help you with your experience. If you enter your name or email address just to post a comment, we will not contact you or add you to our mailing list. We only communicate with you if you choose to subscribe or email us directly.
When do we collect information?
We collect information when you comment on a post, subscribe to our blog, or place an order. We encourage the use of pseudonyms to protect user identity in comments and email traffic. If you place an order, however, we must use the provided name and address to help the product reach its destination. We are not responsible for misdirected orders due inaccurate information being provided. We keep such PII on file only until the order has been completed and the customer is satisfied.
How do we use your information?
We use the information you provide to determine user interest in the given content based on your comments and/or response to surveys, to provide follow-up emails if specifically requested, to send emails about new blog posts if you choose to subscribe, and to efficiently process your orders and send them to the requested destination.
How do we protect your information?
Your personal information is contained behind secured networks and is only accessible by the site owner, who has special access rights to such systems, and is required to keep the information confidential. Please read on to learn more about our site security.
How do we secure our website?
Our website is scanned on a regular basis for security holes and known vulnerabilities. We use several types of malware scanning including SiteLock in order to make your visit to our site as safe as possible.
Look near the bottom of the right-hand side of your screen, and here you can see the SiteLock widget, which is updated each time a fresh scan is performed. Today’s date is displayed so you be certain that it is functioning properly.
Is our entire site HTTPS protected?
Every page on our website is secured using HTTPS protocol, unlike some sites who only employ this precaution during checkout. This ensures that our visitors can browse with the same level of security as our subscribers and customers.
How do we secure your account information?
We implement a variety of security measures when a user places an order, subscribes, creates an account, or enters, submits, or accesses their information in any way.
Your account & subscription information is transmitted using end-to-end encryption to an encrypted table within our site database, which is password protected and accessible only by the webmaster, who is legally required to keep such information confidential.
Is our payment portal secure? PCI compliant?
When you decide to make a purchase from Safe This Home, you may proceed with confidence. Our payment portal is powered by Square and is Payment Card Industry (PCI) compliant. All sensitive information you supply is transmitted with end-to-end encryption under Transport Layer Security (TLS) protocol.
Additionally, you have the option to process your payment using the PayPal or Crypto.com gateways. Both of these companies are industry leaders in financial transaction security.
As you may have already realized, all financial transactions are processed through a gateway provider and your credit card data is not stored or processed on our servers. This prevents us from offering the option to save payment info to your account; we apologize for any inconvenience this may cause.
Each browser is a little different, so look at your browser’s Help menu to learn the correct way to modify your cookies. If you disable cookies off, some features will be disabled that make your site experience more efficient and some of our services will not function properly. However, you can still place orders.
THIRD- PARTY DISCLOSURE
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information.
Any third-party links you encounter on this site have been thoroughly vetted and maintained to ensure you will arrive at the indicated destination. They exist merely to direct you to other blogs/websites that provide articles and/or products specifically dealing with online security and privacy.
We will never provide a link to a site that we have not visited and endorsed or recommend a product we have not personally used. We do not share your information with any of these sites.
Our only association with Google is our use of the Google Analytics service to enhance site security and receive at-a-glance generic data about how often and what times of the day the site is being visited. We have an aversion to the tracking and information sharing conducted by Google and other large tech companies and will never implement or allow such data collection.
When it comes to the collection of personal information from children under 13, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, the nation’s consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.
FAIR INFORMATION PRACTICES
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe.
Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We also agree to the individual redress principle, which requires that individuals have a right to pursue legally enforceable rights against data collectors and processors who fail to adhere to the law.
This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or a government agency to investigate and/or prosecute non-compliance by data processors.
The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.
Any email communication you receive from us will be CAN-SPAM compliant.