Privacy


Cyber Thoughts does not share personal information with third parties nor do we store any information about your visit to this site other than to analyze and optimize your content and reading experience through the use of cookies. You can turn off the use of cookies at anytime by changing your specific browser settings. We are not responsible for republished content from this site on other blogs or websites without our permission.



Your Personal Information and How It is Used

Cyber Thoughts is dedicated to protecting your privacy when you access our website. Accordingly, this notice describes our privacy and security practices and identifies and describes the types of information collected and how that information is used.

Cyber Thoughts does not collect any personal non-system information about a user unless the user provides that information voluntarily by submitting a contact form, a subscription request, or leaving a comment during a visit to this website.


System Information Collected When You Access the Website

When you visit this website, Cyber Thoughts automatically collects and stores the following system information about your visit:

  • User client hostname – The hostname or Internet Protocol (IP) address of the user requesting access to the Cyber Thoughts website.
  • HTTP header, “user agent” – The user agent information includes the type of browser, its version, and the operating system on which the browser is running.
  • HTTP header, “referrer” – The referrer specifies the web page from which the user accessed the current web page.
  • System date – The date and time of the user’s request.
  • Full request – The exact request the user made.
  • Status – The status code the server returned to the user.
  • Content length–The content length, in bytes, of any document sent to the user.
  • Method – The request method used.
  • Universal Resource Identifier (URI) – The location of a resource on the server.
  • Query string of the URI – Anything after the questions mark in a URI.
  • Protocol – The transport protocol and the version used.
The information collected is automatically used to improve our website content and to help us understand how users are interacting with different parts of the site. This information is collected for statistical analysis, to determine what information is of most and least interest to our users, and to improve the utility of the material available on the website. The information is not collected for commercial marketing purposes and Cyber Thoughts is not authorized to sell or otherwise disclose the information collected from the website for commercial marketing purposes.



Information Collected When You Volunteer Information

During your visit to this website, you may elect to subscribe to new posts, comment on a post, or submit a message to us via a Contact Form. You will be entering information into Cyber Thoughts HTTPS secured pages which Cyber Thoughts is bound to keep confidential under US Privacy Law. Cyber Thoughts encrypts any information you share with us using TLS/SSL so that information cannot be easily intercepted, but more about that later...


Comments
To post a comment to this site, you will need to select a profile from commonly used social media accounts including your Google Account, Live Journal, WordPress, TypePad, AIM, or OpenID. You may alternatively elect to create a custom or ad-hoc profile, or comment as Anonymous. Anonymous comments may or may not be posted.

The identify you provide will be posted next to your comment and is not retained by Cyber Thoughts in any other way other than on the web page to which you post. Cyber Thoughts monitors and approves comments prior to them being posted in order to remove inappropriate content. HTTP and other links in comments are automatically removed to discourage spam and users from being directed to malicious sites loaded with malware used for criminal purposes.


Subscription
You may elect to subscribe to email notification of new blog posts to this site, in which case you will will receive an email from our subscription service with a brief digest of the day's posts and a link to the full story.

You may unsubscribe at any time by clicking the Unsubscribe Now link at the bottom of the email and your address will be removed from future notifications within 72 hours.

Our subscription service is provided by Google Feedburner. For more details including Google's Privacy Policy see the subscription page https://www.cyberthoughts.org/p/subscribe.html


Email
During your visit to this website, you may send an encrypted email massage to Cyber Thoughts via a Comment Form. Your email address and the contents of your message will be collected. Your email address and the information included in your message will be used to respond to you, to address issues you identify, to improve this website, or to forward your message to respective authors of content that your message refers to. Your email address is not collected for commercial purposes and Cyber Thoughts is not authorized to sell or otherwise disclose your email address for commercial purposes.

Although the system regards all messages it receives from users as confidential, please be advised that because the Internet is a public domain, messages sent to us outside of a Cyber Thoughts TLS / SSL encrypted web page (signified by HTTPS in the address bar), can and may be intercepted or accessed by a third party.


Children’s Online Privacy Rule (COPR)
Cyber Thoughts does not knowingly collect personal information from children or create profiles of children through this website. Users are cautioned, however, that the collection of personal information submitted in an email will be treated as though it was submitted by an adult, and may, unless exempted from access by federal or state law, be subject to public access.

Cyber Thoughts has done its utmost to protect all electronic information. However, in the unlikely event the information is hacked, or to aid in a criminal investigation, Cyber Thoughts may share information with law enforcement agencies as needed to investigate a crime.


Cookies
This website uses Google Analytics, a web analytics service provided by Google, Inc. (“Google”). Google Analytics uses “cookies,” which are text files placed on your computer, to help the website analyze how users use the site. The information generated by the cookie about your use of the website (including your IP address) will be transmitted to and stored by Google on servers in the United States.

Google will use this information for the purpose of evaluating your use of the website, compiling reports on website activity and providing other services relating to website activity and Internet usage.

Google may also transfer this information to third parties where required to do so by law, or where such third parties process the information on Google’s behalf.

Google will not associate your IP address with any other data held by Google. You may refuse the use of cookies by selecting the appropriate settings on your browser. However please note that if you refuse the use of cookies you may not be able to use the full functionality of this website.

By using this website, you consent to the processing of data about you by Google in the manner and for the purposes set out above.



Access, Correction, Deletion

Cyber Thoughts respects your privacy rights and provides you with reasonable access to the Personal Data that you may have provided through your use of this site. If you wish to access or amend any other Personal Data we hold about you, or to request that we delete any information about you that we have obtained from an integrated service, you may contact us as set forth in the Contact Us section below. At your request, we will have any reference to you deleted or blocked in our database.

You may update, correct, or delete your personal information by following the instructions above. Please note that while any changes you make will be reflected in active user databases instantly or within a reasonable period of time, we may retain all information you submit via backups and other archiving, for the prevention of fraud and abuse, analytics, satisfaction of legal obligations, or where we otherwise reasonably believe that we have a legitimate reason to do so.

You may decline to share certain Personal Data with us, in which case we may not be able to provide to you some of the features and functionality of the site.

At any time, you may object to the processing of your Personal Data, on legitimate grounds, except if otherwise permitted by applicable law.



Data Security

The Cyber Thoughts website contains links to other websites for your information and convenience. Cyber Thoughts has no control over the privacy practices or the content of such other websites. Please review the privacy information provided by these sites.

The responsibility for the content and accuracy of information on sites accessed by linking from our website rests with those entities providing you with information. This includes any responsibility for updating information upon which visitors may rely. The inclusion of links from this site to others does not imply any endorsement by Cyber Thoughts of any product, service or vendor. Any mention of products, services, or vendors is for informational purposes only.

We follow generally accepted industry standards to protect the information submitted to us, both during transmission and once we receive it. We maintain appropriate administrative, technical and physical safeguards to protect Personal Data against accidental or unlawful destruction, accidental loss, unauthorized alteration, unauthorized disclosure or access, misuse, and any other unlawful form of processing of the Personal Data in our possession.

To help ensure that your information is protected and only available to you, Cyber Thoughts uses Secure Sockets Layer (SSL), and third-party certification.

SSL Protocol provides a method that encrypts information passed between the Cyber Thoughts server(s) and your browser to prevent others from accessing your information. This method uses a “challenge handshake” (or other such secure handshake authentication) and public/private key encryption on both sides (the server and the client) to help ensure that only your browser can translate the information being sent by Cyber Thoughts.

Third-party certification refers to a neutral third-party who has verified the authenticity of a website and has issued the owner(s) of that website a unique certificate. The Cyber Thoughts website employs an SSL/TLS certificate issued by Lets Encrypt and verified by Google Trust Services conforming to TLS version 1.2 and employing Advanced Encryption Standard AES128 and Cryptographic Hash Algorithm SHA256 to secure traffic over the Internet.

While we do our utmost to protect the confidentiality, integrity and availability of the Cyber Thoughts web site and its data, no method of transmission over the Internet or method of electronic storage is 100% secure. We cannot ensure or warrant the security of any information you transmit to us or store with us, and you do so at your own risk. We also cannot guarantee that such information may not be accessed, disclosed, altered, or destroyed by breach of any of our physical, technical, or administrative safeguards. If you believe your Personal Data has been compromised, please contact us via the Contact section.

If we learn of a security systems breach, we will inform you of the occurrence of the breach in accordance with applicable law.



Data Retention

Subject to conditions already stated, we only retain your Personal Data for as long as your subscriptions remain active, and in comments section of blog posts until such times as we receive a written request from you to remove your comment.



Contact Us
You may contact Cyber Thoughts at any time via the Contact Page.



Notice

This privacy policy is subject to change without notice and was last updated on 03 August 2018. If you have any questions please feel free to contact us.