Who we are
Our website address is: https://www.tutorettes.com
NeverHateOnlyLove (“TUTS”) operates tutorettes.com and may operate other websites. It is TUTS’s policy to respect your privacy regarding any information we may collect while operating our websites.
Like most website operators, TUTS collects non-personally-identifying information of the sort that web browsers and servers typically make available, such as the browser type, language preference, referring site, and the date and time of each visitor request. TUTS’s purpose in collecting non-personally identifying information is to better understand how TUTS’s visitors use its website. From time to time, TUTS may release non-personally-identifying information in the aggregate, e.g., by publishing a report on trends in the usage of its website. TUTS also collects potentially personally-identifying information like Internet Protocol (IP) addresses for logged in users and for users leaving comments on tutorettes.com blogs/sites. TUTS only discloses logged in user and commenter IP addresses under the same circumstances that it uses and discloses personally-identifying information as described below, except that commenter IP addresses and email addresses are visible and disclosed to the administrators of the blog/site where the comment was left.
Gathering of Personally-Identifying Information
Certain visitors to TUTS’s websites choose to interact with TUTS in ways that require TUTS to gather personally-identifying information. The amount and type of information that TUTS gathers depends on the nature of the interaction. For example, we ask visitors who sign up at tutorettes.com to provide a username and email address. Those who engage in transactions with TUTS are asked to provide additional information, including as necessary the personal and financial information required to process those transactions. In each case, TUTS collects such information only insofar as is necessary or appropriate to fulfill the purpose of the visitor’s interaction with TUTS. TUTS does not disclose personally-identifying information other than as described below. And visitors can always refuse to supply personally-identifying information, with the caveat that it may prevent them from engaging in certain website-related activities.
TUTS may collect statistics about the behavior of visitors to its websites. TUTS may display this information publicly or provide it to others. However, TUTS does not disclose personally-identifying information other than as described below.
Protection of Certain Personally-Identifying Information
TUTS discloses potentially personally-identifying and personally-identifying information only to those of its employees, contractors and affiliated organizations that (i) need to know that information in order to process it on TUTS’s behalf or to provide services available at TUTS’s websites, and (ii) that have agreed not to disclose it to others. Some of those employees, contractors and affiliated organizations may be located outside of your home country; by using TUTS’s websites, you consent to the transfer of such information to them. TUTS will not rent or sell potentially personally-identifying and personally-identifying information to anyone. Other than to its employees, contractors and affiliated organizations, as described above, TUTS discloses potentially personally-identifying and personally-identifying information only in response to a subpoena, court order or other governmental request, or when TUTS believes in good faith that disclosure is reasonably necessary to protect the property or rights of TUTS, third parties or the public at large. If you are a registered user of an TUTS website and have supplied your email address, TUTS may occasionally send you an email to tell you about new features, solicit your feedback, or just keep you up to date with what’s going on with TUTS and our products. If you send us a request (for example via email or via one of our feedback mechanisms), we reserve the right to publish it in order to help us clarify or respond to your request or to help us support other users. TUTS takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally-identifying and personally-identifying information.
If TUTS, or substantially all of its assets, were acquired, or in the unlikely event that TUTS goes out of business or enters bankruptcy, user information would be one of the assets that is transferred or acquired by a third party. You acknowledge that such transfers may occur, and that any acquirer of TUTS may continue to use your personal information as set forth in this policy.
What personal data we collect and why we collect it
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
As a systematic computational analysis of data and statistics, analytics is used for the discovery, interpretation, and communication of meaningful patterns in data, so we keep it to the minimum and just for the right processes of optimization of our infrastructure.
Who we share your data with
If you request a password reset, your IP address will be included in the reset email.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor comments may be checked through an automated spam detection service.
CCPA & GDPR
Technology is used to collect people’s personal data and information without full consent, which obviously, is not exactly ideal; now legislation is emerging so individuals have the right to privacy, in an attempt to limit what companies can and cannot do with the information they gather. In order to protect people’s right to privacy, laws like the California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR) were instituted. These laws seek to protect people’s private information and prevent businesses from exploiting this information under any interest, same as the inconvenient implications that a negative disclosure might cause.
- People have the right to know what type of personal data and information companies are collecting about them.
- They should know if their personal information is being sold or disclosed to another party. They also have the right to know to whom their information is being disclosed.
- People have the right to refuse the sale of their personal data and private information.
- They should be able to access their own personal data.
- They have the right to request businesses to remove and delete any information related to them as a consumer.
- They should not be discriminated against for exercising their right to privacy and private information.
Removal of information
If you have any question related with your information or if you want to remove all of it from our website, please contact us.
PO Box 421327. Los Angeles, CA 90042. USA
How we protect your data
All our system foundation performs on enterprise level basis, so the security resides in a global community of computing experts that has tested and verified the tightest level of security.
What data breach procedures we have in place
A staff member who has identified a suspected data breach should immediately notify. The notification must include information about the time and date the suspected breach was discovered, the type of information involved, the cause and extent of the breach, and the context of the affected information and the breach.
Assessment and confirmation.
It is a must to assess and determine whether a data breach has occurred. If any suspicion that a breach has occurred, then it must immediately be notified via email.
Documenting and processing.
Contain the breach and do an assessment to evaluate the risks associated with the breach. Proper notification to the parts involved. Prevention of future breaches. Law Enforcement Reporting. When appropriate, we will notify the appropriate law enforcement authorities, of a suspected or confirmed breach. The appropriate law enforcement authorities, will determine whether further law enforcement investigation is warranted.
What third parties we receive data from
None. We strive to keep our community as private as possible. but we do if required by law enforcement agency in support for resolution of legal matters.
What automated decision making and/or profiling we do with user data
None. All our final decisions are always verified and authorized by our staff members.
Industry regulatory disclosure requirements
To reduce the chance that proprietary information is mistakenly disclosed, we have implemented a standardized system. We enforce consistent regulatory compliance processes to match our policies and procedures. We have designed workflow automation that allow us to build compliance but always supervised by our staff so regulatory disclosure processes are met.