Privacy Policy
Who We Are
Website URL: https://entrepreneursempowered.com
Company Name:Â Empowered Entrepreneur, LLCÂ
Address: 5114 Point Fosdick Dr, Ste F – 1075, Gig Harbor, WA 98335Â
Email: [email protected]Â
Phone: (253) 313-1243
What Personal Data We Collect and Why We Collect It
Personal Data We Collect
- Personal Account Preferences: We may collect personal account preferences to enhance your user experience.
- Transactional Data: We collect transactional data, such as purchase information, to process your orders and provide customer support.
- Technical Data: We collect technical data, including information about cookies, to improve our website’s functionality and security.
Sensitive Personal Data
We do not intentionally collect or retain sensitive personal data, such as health-related information.
Why We Collect Your Personal Data
We collect your personal data for the following purposes:
- To provide and maintain our services.
- To communicate with you regarding your orders, inquiries, and updates.
- To improve our website’s functionality and user experience.
- To fulfill legal obligations, if applicable.
- To obtain your consent for data collection, where required by law.
Comments
We collect the commenter’s name, email address, and IP address. Comment data is collected to facilitate communication and prevent spam.
Media
We note that all uploaded media files on our website are publicly accessible.
Contact Forms
We do not include a contact form by default. If we use a contact form plugin, we will provide information on the personal data captured and the retention period, if applicable.
Cookies
This Cookies Policy describes how we use cookies and similar tracking technologies on our website. By continuing to browse or use our site, you agree to our use of cookies as described in this policy.
What Are Cookies?
Cookies are small text files that are placed on your computer or mobile device when you visit a website. They are widely used to make websites work more efficiently and provide information to website owners.
How We Use Cookies
We use cookies for various purposes, including:
Essential Cookies: These cookies are necessary for the website to function properly. They enable core functionalities such as page navigation and access to secure areas of the website. You cannot opt out of essential cookies because they are required for the website to work.
Performance Cookies: These cookies help us understand how visitors use our website by collecting information about the pages they visit and any errors they encounter. We use this information to improve the website’s performance.
Functional Cookies: These cookies allow the website to remember choices you make (e.g., language preferences) and provide enhanced, more personalized features.
Advertising Cookies: We may use advertising cookies to deliver relevant advertisements to you based on your interests. These cookies may also help us measure the effectiveness of our advertising campaigns.
Analytics Cookies: We use analytics cookies to gather information about website traffic and user behavior. This data helps us analyze and improve our website’s content and user experience. We use tools such as Google Analytics for this purpose.
Third-Party Cookies
We may also allow third-party service providers to place cookies on your device for the purposes mentioned above. For example, we use social media plugins that may set their own cookies.
Managing Cookies
You can manage your cookie preferences by adjusting your browser settings. Most web browsers allow you to delete or block cookies, and you can find instructions on how to do this in your browser’s help section. Please note that if you disable cookies, some parts of our website may not function properly.
You can also opt out of some advertising cookies by visiting the following websites:
Changes to This Policy
We may update this Cookies Policy from time to time to reflect changes in our practices or for other operational, legal, or regulatory reasons. Please revisit this page regularly to stay informed about our use of cookies.
Who We Share Data With
By default, we do not share any personal data with third parties. We will provide details and links to the privacy policies of third-party providers if applicable.
How Long We Retain Your Data
We retain personal data collected or processed by our website according to the following schedule:
- Contact form entries: 24 months
- Analytics records: 12 months
- Customer purchase records: 7 years
Rights You Have Over Your Data
In this section, we explain the rights users have over their data and how to exercise them.
- Access: You have the right to access your personal data.
- Rectification: You can request corrections to your personal data.
- Erasure: You can request the deletion of your personal data.
- Data Portability: You can request the transfer of your personal data to another organization.
- Withdrawal of Consent: If we collect data based on consent, you can withdraw it at any time.
- Objection: You can object to the processing of your personal data.
To exercise these rights, please contact us using the information provided in the “Contact Information” section.
Where Your Data Is Sent
It is highly unlikely, we will need to transfer you data outside the United States. In the unlikely event this happens, we will disclose any transfers of your site data outside the United States and explain the mechanisms in place to ensure that data is protected in accordance with applicable data protection standards.
Contact Information
For privacy-specific concerns or inquiries, please contact us at [email protected].
Additional Information
If our site engages in complex collection or processing of personal data, we will include additional information in this privacy policy as required by relevant laws and regulations.
How We Protect Your Data
We gather personal data through secured third-party applications and rely on their encryption for security purposes. Our Student Portal uses the latest Moodle software, which includes its own security process. We constantly monitor the data we collect for possible breaches.
Data Breach Response and Notification Procedure
We take data security and privacy seriously. In the event of a data breach, we have established a comprehensive procedure to respond promptly, mitigate risks, and notify affected parties as required by applicable laws and regulations. This procedure outlines the steps to be taken in the event of a data breach:
1. Identification and Assessment
Immediate Response: As soon as a potential data breach is identified, the incident response team, IT personnel, and relevant stakeholders, must be notified immediately.
Investigation: The incident response team will conduct a thorough investigation to determine the nature and scope of the breach. This includes identifying the types of data compromised, the cause of the breach, and any vulnerabilities that were exploited.
2. Containment and Mitigation
Isolation: If the breach is ongoing, steps will be taken to isolate and contain it to prevent further unauthorized access or data loss.
Mitigation: Actions will be taken to mitigate the impact of the breach, which may include shutting down compromised systems, resetting passwords, and patching security vulnerabilities.
3. Assessment of Risks
Risk Evaluation: The incident response team will assess the potential risks associated with the breach, considering the sensitivity of the compromised data, the number of affected individuals, and the likelihood of harm.
Legal Obligations: Legal counsel will be consulted to determine the legal obligations, including notification requirements, under applicable data protection laws.
4. Notification
Affected Parties: If the breach poses a significant risk to individuals’ rights and freedoms, affected individuals will be notified promptly. Notifications will be made via email, postal mail, or other suitable methods, as required by law.
Regulatory Authorities: If required by law, we will notify relevant regulatory authorities about the breach, providing all necessary details as specified by applicable regulations.
5. Communication and Coordination
Internal Communication: The incident response team will maintain clear and open communication with all internal stakeholders, including management, legal counsel, IT, and public relations teams.
External Communication: External communication will be managed carefully, including press releases and updates to affected individuals. A designated spokesperson may be assigned for media inquiries.
6. Remediation and Resolution
Correction Measures: We will take corrective actions to address the vulnerabilities that led to the breach, ensuring that similar incidents are less likely to occur in the future.
Continuous Improvement: We will review the incident and our response thoroughly to identify areas for improvement in our security measures and incident response procedures.
7. Documentation and Reporting
Documentation: All actions taken during the incident response process will be documented, including the incident’s timeline, investigative findings, response actions, and communications.
Reporting: A detailed incident report will be prepared and submitted to regulatory authorities as required by law.
8. Review and Training
Incident Review: The incident response team will conduct a post-incident review to analyze the effectiveness of the response and identify lessons learned.
Training and Awareness: Staff will receive ongoing training and awareness programs to enhance their understanding of data breach prevention and response.
This Data Breach Response and Notification Procedure is designed to guide our actions in the event of a data breach. It is regularly reviewed and updated to ensure compliance with evolving data protection regulations and to enhance our data security practices.
 Third Parties We Receive Data From
We will disclose if we receive data about users from third parties, including advertisers.
Automated Decision Making and Profiling
If our website engages in automated decision making or profiling, we will provide information about the process and users’ rights in relation to it.
Industry Regulatory Disclosure Requirements
If we are subject to additional privacy laws or regulations, we will disclose that information in this section.
This Privacy Policy is effective as of [Effective Date] and will be updated as necessary to reflect any changes in our data practices. Please review it periodically for updates.