The website address is: https://twooldguystalking.com.
Who We Are
The pronoun “we” is used in this document to refer to the copyright holder, Paul Fulford, and / or to the data collection capabilities of this website.
Posts and Contact Data Collection
We DO collect the data a visitor provides making a post and in the contact form. If you leave a post or contact form data, the post or contact form data and its metadata are retained indefinitely. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
We DON’T retain the visitor’s IP address and browser info.
Where we send your data
Visitor comments may be checked through an automated spam detection service.
When you log in, we will set up several cookies to save your login information and your screen display choices. If you log out of your account, the login cookies will be removed.
If you upload media to the website, you should avoid uploading media with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from media on the website. If you upload media, you are explicitly declaring that you have a legal right to the uploaded media and furthermore that you are giving this site the right to use and display the uploaded media as it chooses.
Embedded content from other websites
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
How we protect your data
All communication between our server and your data is SSL/TLS encypted.
What data breach procedures we have in place
We use highly reputable third-party (ie: not just our own) security and firewall tools. We make regular site backups. Furthermore, our backend hosting company is ranked in the top 10 webhosting services by techradar.com.