Privacy Policy

1) Who am I and what I do

This is Venkatesh Vanjaku’s tech blog (Privacy Policy) and we are located at https://venkatesh-vanjaku.tech. Venkatesh Vanjaku shares his tech knowledge.

2) What data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

If visitors want to communicate/register a complaint with the owner of this blog they can complain through Contact Me. Through this form, we will collect the Full Name, email address, phone number, message, IP Address & system generated submission date. We will only use this information to contact the person or to resolve his/her query. This data will not be stored with us, however, we will get this information by email only.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

We use Google Analytics to maintain statistical information about the blog readership through location-based, time-based and some other factors. If you would like to know about Google Policies please click here 

3) Who we share your data with

We are maintaining strict standards, where we won’t share any details about the visitor to any 3rd party organization or individual. Meanwhile, the Government, Law & Enforcement has all the rights order for the visitor information in such cases which are unavoidable, so we may disclose at that time. Emails collected from newsletters we use for marketing purposes and we share them without trusted marketing partners temporarily.

4) How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

5) What rights you have over your data

If you have an account on this site or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes. Comments once approved may not be deleted, but we do accept deletion requests on specific situations.

6) Where we send your data

Visitor comments may be checked through an automated spam detection service. If you write any guest blog here, as an author your information will be shared with readers and search engine crawlers.

7) Your contact information

If visitors want to communicate/register a complaint with the owner of this blog they can complain through Contact Me. Through this form, we will collect the Full Name, email address, phone number, message, IP Address & system generated submission date. We will only use this information to contact the person or to resolve his/her query. This data will not be stored with us, however, we will get this information by email only.

8) Additional information

How we protect your data

Though I’m the only one who maintains this blog, I have configured security to a particular level where it’s very difficult to compromise us and get the data. We do review our security on a daily basis and weekly basis through automated scans. If something goes wrong, we will immediately report to the local police/cyber crime police.

What data breach procedures we have in place

We do have a good practice of Incident Response. Where if something goes wrong, we will immediately pull all the logs, traces and we will submit those data to the police to investigate the case. I personally will investigate to catch the intruder. Meanwhile, we will restore the backup and we will secure the platform based on logs how the attack happened. But we are pretty much sure that we configured the firewall in such a way that common security issues will not appear here.

What third parties we receive data from

We may receive your gravatar if you submitted any comment in our blog through a hash.

What automated decision making and/or profiling we do with user data

If a visitor submitted any comment, our system will check for the IP address, visitor cookies to check whether it’s genuine or spam. Sometimes we may use auto-approve comments if the traffic is heavy if not we will manually approve the comments.

Industry regulatory disclosure requirements

As of now, we don’t have any regulatory disclosures, etc., But we may get in the future.