We will never, ever sell your personal data or personal health information.
Your information is securely stored and encrypted.
What personally identifiable information of yours is collected;
What organization is collecting the information;
How the information is used;
With whom the information may be shared;
What choices are available regarding collection, use and distribution of the information;
What kind of security procedures are in place to protect the loss, misuse or alteration of information under our control; and,
How you can correct any inaccuracies in the information.
NON-PERSONAL INFORMATION WE COLLECT ABOUT YOU
PERSONALLY IDENTIFIABLE INFORMATION WE COLLECT AND HOW IT IS USED
A. Newsletters & Emails to You
At the time of registration and at various times as you use the Site, you may be given the option of receiving recurring newsletters via email from Yossum. These emails will not contain Personal Health Information. When you sign up for our email newsletters or at any time, you may be given the option to Opt-In to receiving additional promotional emails from Yossum or our sponsors. In order to subscribe to Yossum newsletters via email, we need your contact information, like name and email address. We will provide an option to unsubscribe from any newsletters we may send, for example, by clicking on an “unsubscribe” link at the bottom of an email newsletter. If you experience difficulties with an automated unsubscribe service we provide, please use our Contact Us Form. We will manually unsubscribe you from that newsletter as soon as reasonably practical.
B. Emails You Send to Yossum
C. Message Boards and other Public Forums
As a service to our users, the Site may feature message boards and other public forums where users with similar personal development interests in Yoga, Silence, Self-Understanding and Meditation as well as Enneagram and Essential Qualities, can share information and support one another. We may also offer online discussions moderated by our teachers. Any information shared (including Personally Identifiable Information and Personal Health Information) that you reveal in a chat room, message board, posting or online discussion is by design open to the public and is not a private, secure service. In addition, any videos, images or audio files you submit may be redistributed through the Internet and other media channels and may be viewed by the general public. You should think carefully before disclosing any Personally Identifiable Information or Personal Health Information in any public forum. Anything you have written, posted or uploaded may be seen, disclosed to or collected by third parties and may be used by others in ways we are unable to control or predict, including to contact you for unauthorized purposes. As with any public forum on any site, this information may also appear in third-party search engines like Google, Yahoo, MSN, etc. Your account name may be displayed to other users when you engage in certain activities on the Site.
If you choose to add personal information to your account profile that is visible to other users (such as a profile picture, your name, gender or other details), such information may be accessible to the general public.
D. Paid Services
From time to time, Yossum may offer users the opportunity to register for paid services offered on a subscription or perpetual basis. A paid service may have its own service or member agreement that governs your use of the service and the information we collect to provide the service, including your credit card information. Any such service or member agreement will be disclosed to you at the time of registration for that paid service.
We are committed to protecting the privacy of children. Neither Yossum nor any of its services are designed or intended to attract children under the age of 13. We do not collect Personally Identifiable Information from any person we actually know is under the age of 13.
F. Research & Surveys
Protecting Your Information
A. Disclosure to Linked Sites
HOW YOSSUM HANDLES PRIVACY AND SECURITY INTERNALLY
Here are some of the security procedures that Yossum uses to protect your privacy:
Using firewalls to protect information held in our servers.
Closely monitoring the limited number of Yossum employees who have potential access to your Personally Identifiable Information.
Backing-up our systems to protect the integrity of your Personally Identifiable Information and Personal Health Information.
Despite Yossum’s efforts to protect your Personally Identifiable Information and Personal Health Information, there is always some risk that an unauthorized third party may find a way around our security systems or that transmissions of your information over the Internet may be intercepted.
UPDATING YOUR INFORMATION AND CONTACTING YOSSUM
A. Updating Your Personally Identifiable Information
If we collect and store self-reported data for certain Site functionalities, we will provide you with a method for correcting, updating or reviewing such information. We will store user submitted data (Personally Identifiable Information and/or Personal Health Information) in an active database for a certain period of time and may later transfer such data to an inactive back-up medium.
B. Removing your Personal Information
If you have a complaint or problem, please use our Contact Us Form or send us a letter via post: Yossum Foundation, Hoofdweg 11, 1058AV, Amsterdam. The Netherlands. Our customer service department respond. If you want to (1) delete your Personally Identifiable Information from our systems, (2) update the Personally Identifiable Information that you have provided to us, just explain this in our Contact Form.
C. Limitations on Removing or Changing Information
Upon your request, we will delete your Personally Identifiable Information or Personal Health Information from our active databases and where feasible from our back-up media. You should be aware that it is not technologically possible to remove each and every record of the information you have provided to Yossum from our servers.
D. Accountable Representative
A. Personally Identifiable Information
B. Personal Health Information
C. Non-Significant Changes
Browser: Short for web browser, a browser is a software application used to locate and display web (Internet) pages. The most popular browsers are AOL, FireFox, Microsoft Internet Explorer, and Netscape Navigator. In addition, most modern browsers can present multimedia information, including sound and video, though they require plug-ins for some formats.
Click Stream Information: A record of all the pages you have visited during your visit to a particular web site or the services you accessed from the Site or from an email. Click Stream Information is associated with your browser and not with you personally. It records the archives of your browser.
Cookie: A small data file that is stored on the hard drive of the computer you use to view a web site. Cookies are placed by that site or by a third party with a presence on the Site, such as an advertiser using a Web Beacon (see definition below) and are accessible only by the party or site that placed the Cookie (i.e. a Cookie placed on your computer by Yossum isn't accessed by any other site you visit but a Cookie placed on your computer by an advertiser may be accessed by any site on which that same advertiser has a presence). Cookies can contain pieces of Personally Identifiable Information (“PII”). Yossum encrypts any PII it stores in its Cookies. These Cookies often are used to make the Site easier to use. For example, if you check a box to ask that we store your user name on your computer so that you don't have to enter it each time you visit the Site, it's stored in a Cookie on your computer.
Encryption: The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. This is typically done by secure computer systems.
Firewall: A system designed to prevent unauthorized access to or from a public or private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private portions of public networks. All messages entering or leaving the network pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Nickname: On the Site, as part of your registration, you will be required to provide a Nickname in addition to a username (log-in name) and a password. The Site Nickname is the name that will appear on any of your public forum postings. This public nickname should be different from the username that you use when you log on to the Site. NOTE: Once you establish a Nickname on the Site, you cannot change it without registering with a new account.
Non-Personal Information: Information that is not traceable back to any individual and cannot be used to identify an individual. For example, Click Stream Information is Non-Personal Information, as is information such as gender, age, city and state when not linked with other Personally Identifiable Information.
Opt-In: Means you are actively indicating your preference to participate in a program, email, feature, tool, or enhancement on a web site. Typically, if you “Opt-In” you must provide certain information, usually Personally Identifiable Information, to the web site or otherwise actively indicate your choice or preference to participate in the web site program.
Opt-Out: Means that if you do not take some action you are indicating your preference to participate in a program, email, feature, tool or enhancement on a Web site. Typically, if you “Opt-Out” you must uncheck a box next to a stated preference or otherwise take some action to indicate your preference not to participate in a program.
Password: A secret series of characters, typically alphanumeric (meaning it consists of both letters and numbers) that enables you to access a file, computer, or program. You must enter your password before the computer or system will respond to commands. The password helps ensure that unauthorized users do not access the system. In addition, data files and programs may require a password. Ideally, the password should be something that nobody could guess.
Personal Health Information (“PHI”): When your Personally Identifiable Information is combined with known health characteristics. For example, if you indicated that you have a certain disease or condition, when that information is combined with your PII, it becomes Personal Health Information.
Personally Identifiable Information (“PII”) (also called Personal Information): Information that can be traced back to an individual (contrast with Non-Personal Information and Aggregate Information). Examples of PII include your name, home address, telephone number, email address, and Social Security number. If other pieces of information are linked to PII, they also become PII. For example, if you use a nickname to chat online and give out your real name while chatting, your nickname becomes PII when linked with other PII.
Server: A computer that provides services to other computers. A “web server” stores web site files and “serves” them to people who request them.
Username: A name used to gain access to a computer system or program. Usernames, and often passwords, are required in shared systems, such as the Internet. In most such systems, users can choose their own usernames and passwords (see Nickname above for additional information). Usernames are also required to post a reply on message boards and to use certain Site functionalities and services.
Olga CMS - content management system