Who we are
Our website address is: http://www.mdstaffpointe.com.
What personal data we collect and why we collect it
Comments
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.
Media
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
Contact forms
We retain your email address only as long as necessary to fulfill the purposes for which it was collected.
Cookies
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.
Who we share your data with
If you leave a comment, the comment and its metadata are contained on our site. User data is not shared.
Mobile information will not be shared with third parties/affiliates for marketing/promotional purposes. All the above categories exclude text messaging originator opt-in data and consent; this information will not be shared with any third parties.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor comments may be checked through an automated spam detection service.
Your contact information
- We collect your mobile number for communication purposes only. Your number will not be shared with third parties or used for any marketing activities.
- Standard message and data rates from your mobile carrier may apply.
- Message frequency may vary.
- You may opt out at any time by replying “STOP.” This will unsubscribe you from further communications.
- You may reply Reply “HELP” to our messages to receive our support and website information.
Additional information
How we protect your data
Data Encryption (We use encryption protocols (such as SSL/TLS) to secure data during transmission between your device and our servers. Sensitive information, including personal details and payment data, is stored in an encrypted format.)
What data breach procedures we have in place
We take data security seriously and have established procedures to address any potential data breaches promptly and effectively. Our data breach response plan includes the following steps:
Immediate Investigation – Upon discovering a potential data breach, our team will initiate an immediate investigation to determine the nature and extent of the breach, including identifying the affected data and systems
Containment Measures – We will take swift action to contain the breach, which may involve isolating affected systems, disabling compromised accounts, and implementing additional security measures to prevent further unauthorized access.
Assessment and Analysis – We will conduct a thorough assessment to evaluate the impact of the breach on personal information and determine the risk to affected individuals.
Notification Procedures for Affected Individuals – If your personal data is compromised, we will notify you as soon as possible and within the timeframe required by applicable laws, typically within 72 hours.
Regulatory Authorities – We will report the breach to relevant regulatory authorities if required, including providing details about the nature of the breach and the data involved.
Remediation and Support – We will take appropriate remediation steps to address any vulnerabilities that led to the breach. Additionally, we may provide affected individuals with resources to help protect against identity theft or fraud.
Documentation and Review – We will document the breach and our response actions to ensure compliance with legal and regulatory requirements. Following the incident, we will conduct a review of our security practices and response procedures to identify areas for improvement.
Training and Awareness – We will ensure that our employees are trained on data protection and breach response protocols, reinforcing the importance of reporting suspicious activity and potential vulnerabilities.
Commitment to Transparency – We are committed to maintaining transparency regarding our data breach procedures and will keep you informed about any significant updates or changes to our practices.
What third parties we receive data from
Our site does not receive user information from third parties.
What automated decision making and/or profiling we do with user data
Our site does not utilize any automated decision making or profiling of user data.
Industry regulatory disclosure requirements
Our site follows the guidelines set forth by NALTO..
Recent Comments