Identification of Entity
Jacey Holbrand is an author. All information about her books, creations, and materials are presented on her website at jaceyholbrand.wordpress.com.
Identification of Term
Throughout this document the name “JACEY” covers the identification of the entity listed above for the content or engagement Jacey provides users. This includes but is not limited to: email; newsletters; promotional emails; contests; free downloads, purchases of books or short stories; social media interactions on Facebook, Twitter, Pinterest, Goodreads, Instagram, and other social media accounts.
Collection and Use of Information
Any information collected by Jacey is used only by Jacey. Information is never sold to a third-party or made available for sale. The primary use of the information is to understand readers/customers and provide an appropriate experience. The information collected or received, such as your email address, is used for direct communication. Emails may be sent containing information you requested, prize offerings, etc, regarding the reason for communication.
Information supplied directly
Your real name and email address may be supplied when you contact Jacey through the contact information provided on her site. By contacting Jacey, it is understood you are electing to receive/are giving express consent to be contacted in return in regard to that particular matter and any follow-up required. This pertains to directly emailing Jacey or contact via any social media sites. The messages you send may be retained and/or used to operate, maintain, and provide to you the features and functionality of the services Jacey provides, for instance, social media interfaces and blog comments. Your name is not published publicly unless you choose to do so when commenting on a public blog, Facebook, Twitter page, etc.
Information from third-parties
Jacey may receive information about you from third-parties. For example, if you comment or like anything on Jacey’s website, it will be through WordPress. If you comment or like anything of hers on any social media sites (e.g., Twitter, Facebook, Instagram, etc.), the information will be handled through those social media sites. If you want to purchase a book through any of the links via the sites listed above, your purchase will be handled by the vendor you select (e.g., Amazon, Kobo, Nook, Apple, Google Play, any publishers, etc). If you want to engage with Jacey for any on-line events, those will be handled by a third-party site (e.g., blogger/review sites, Rafflecopter, publishers, etc). Any third-party sites Jacey utilizes, and you therefore use, please note, they maintain their own separate information about you that is NOT shared. The third-party may pass along certain information about your use of its service. This information could include, but is not limited to, the user ID associated with your account (for example, your Facebook UID), an access token necessary to access that service, any information that you have permitted the third-party to share with her, and any information you have made public in connection with that service.
Links to Other Websites and Services
Analytics, Log file, Clear gifs/web beacons, Device identifiers information
The third-party sites listed above and any others you may use, may directly collect analytics data to help measure traffic and usage trends. These tools collect information sent by your browser or mobile device, including the pages you visit and other information, that assists others in improving their services. They may provide this information to Jacey in collective form such that it cannot reasonably be manipulated to identify any individual user.
Third-party sites should be running secure sites with scanning, virus checks, malware identification, etc. As part of that set up, log file information is automatically reported by your browser or mobile device each time you access a site. These server logs may include anonymous information such as your web request, Internet Protocol (“IP”) address, browser type, referring / exit pages and URLs, number of clicks and how you interact with links, domain names, landing pages, pages viewed, and other such information. They may provide this information to Jacey in collective form such that it cannot reasonably be manipulated to identify any individual user. Jacey takes secure measures such as scanning and use of fire walls.
Third-party sites may employ clear gifs (also known as web beacons) which are used to anonymously track the online usage patterns of users. In addition, they may also use clear gifs in HTML-based emails sent to users to track which emails are opened and which links are clicked by recipients. The information allows for more accurate reporting and improvement of the content provided. This information may be provided to Jacey in collective form such that it cannot reasonably be manipulated to identify any individual user.
When you access third-party sites by or through a mobile device (including but not limited to smart-phones or tablets), they may access, collect, monitor and/or remotely store one or more “device identifiers,” such as a universally unique identifier (“UUID”). Device identifiers are small data files or similar data structures stored on or associated with your mobile device, which uniquely identify your mobile device. A device identifier may be data stored in connection with the device hardware, data stored in connection with the device’s operating system or other software, or data sent to the device by the site. Their device identifiers may convey information to others about how you browse and use sites. A device identifier may remain persistently on your device, to help you log in faster and enhance your navigation through the site.
Again, you should always review, and if necessary, adjust your privacy settings on third-party websites and services. You should also review the third-party’s policies to understand what exactly they do with your information and how you can handle your information through them.
Sharing of Your Information
Jacey will not share, rent, or sell your information to any third-parties without your consent, except as noted below:
Who can see User Content: Any User Content that you voluntarily disclose (e.g., Facebook, Twitter, on blogs open to public reading) and made available to your friends or the public cannot be removed by Jacey. Check your settings carefully and be aware of how your posts are being made public or not. Once you make a post on one of Jacey’s sites, blogs, or comments pages, or Facebook or Twitter feeds, etc, User Content may not be completely removed even though it has been deleted from the site. It is possible that content will remain viewable in cached and archived pages of Internet search engines and on other sites that have republished the posts, or if other Users have copied or saved that information. If you do not wish your User Content to be available to the public, please don’t post it to Jacey’s sites, blogs, comment pages, or social media sites, or any other entity’s sites, which are all public.
Who can see your IP address: If you post User Content on any public site, even if not logged in, it is possible your IP address will be published with your User Content in order to attribute your contribution to the site. This means people behind the scenes of those sites have the ability to review IP addresses of users to reduce abusive behavior. This information may be provided to Jacey. Please note, IP addresses are part of public domain. For more information, visit: https://www.arin.net/
Instances where Jacey may be required to share your information:
Jacey will disclose your information where required to do so by law or subpoena or if Jacey reasonably believes that such action is necessary to (a) comply with the law and the reasonable requests of law enforcement; (b) to protect the security, quality or integrity of Jacey’s site(s); and/or (c) to exercise or protect the rights, property, or personal safety of Users, or others.
(Thank you to the authors who allowed other authors, like C.R. Moss whom I obtained this from, to use their privacy policies for their own.)