Privacy Policy
Black Bohemia.org (“Black Bohemia”) is dedicated to serving the Black Bohemia community. Black Bohemia is committed to protecting the privacy of our users and strives to provide a safe, secure user experience. This Privacy Policy sets forth the online data collection and usage policies and practices that apply to this website.
Who We Are
BlackBohemia.org
In this Privacy Policy, we use “we,” “us,” or “our” to refer to BlackBohemia.org and “you” or “your” to refer to you, the user, member or visitor to our web sites.
Our website address is: https://blackbohemia.org
This Policy may be amended or updated occasionally, so please check it regularly for updates.
What personal data do we collect, and why do we collect it
Comments
When visitors leave comments on the site, we collect the data shown in the comments form, as well as the visitor’s IP address and browser user agent string, to help detect spam.
Media
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors can download and extract any location data from images on the website.
Contact Forms
We use a Contact Form plugin to manage contact form submissions. The information is sent as emails that only a select few can access. The information is also stored in the database on our hosting server for backup and later reference purposes. We use the Mail Chimp plugin to manage this data safely.
Cookies
If you leave a comment on our site, you may opt-in to save your name, email address, and website in cookies. These are for your convenience, so you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you have an account and log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will set up several cookies to save your login information and screen display choices. Login cookies last two days, and screen options cookies last a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
Suppose you edit or publish an article; an additional cookie will be saved in your browser. This cookie includes no personal data and indicates the post ID of the article you just edited. It expires after 1 day.
Embedded Content From Other Websites
Articles on this site may include embedded content (e.g., videos, images, articles, etc.). Embedded content from other websites behaves the same way as if the visitor had visited the other website.
These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracing your interaction with the embedded content if you have an account and are logged in to that website.
Analytics
Who we share your data with
We do not rent or sell your personal contact information (such as your email address associated with your account registration) to third parties to use for their own marketing purposes. We share information in the following ways:
Corporate Affiliates and Business Transfers
We may share information from or about you with a potential or actual acquirer, successor, or assignee as part of any reorganization, merger, sale, joint venture, assignment, transfer, or other disposition of all or any portion of our business, assets, or stock (including in bankruptcy or similar proceedings). In these cases, their use will be subject to this Privacy Policy.
Investigations
We may investigate and disclose information from or about you, as permitted by applicable law if we believe that such investigation or disclosure is (a) reasonably necessary to comply with legal processes and law enforcement instructions and orders, such as a search warrant, subpoena, statute, judicial proceeding, or other legal process served on us; (b) helpful to prevent, investigate, or identify possible wrongdoing in connection with our Website; (c) helpful to protect our rights, reputation, property, or that of our visitors, users, corporate affiliates, or the public; or (d) to enforce compliance with our agreements with you. (for example, the Terms of Use).
Third-Party Plug-ins, Widgets, and Links
Our Website may include third-party social media features and other third-party plug-ins and widgets. When these features are displayed on our Website, they are operated or hosted by third parties and are subject to their privacy policies instead of this Privacy Policy. Our website also contains links to third-party sites we do not control or operate. Please be aware that we are not responsible for the privacy practices of such other sites.
We use some WordPress plugins on this website that may pass data, including personal information, to external servers to process, such as Akismet Anti-Spam or Jetpack by WordPress.com.
We only use WordPress plugins and themes that WordPress.org hosts. WordPress.org’s guidelines prohibit tracking users without their explicit informed consent.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This allows us to recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
We store the personal information provided by users who register on our website (if any) in their user profiles. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights do you have over your data
If you have an account on this site or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we must keep for administrative, legal, or security purposes.
Where do we send your data
Visitor comments may be checked through an automated spam detection service.
Your contact information
We collect information you provide us with from third parties and automatically when you use our website. We collect information associated with your device using cookies and similar technologies. We may also receive information about your location.
Information You Provide Us
We collect information you provide us with, including your account and profile information, content you submit or post to our website, your communications, and information you provide as part of surveys and contests.
Other Websites
We may receive information about you from third-party websites that obtain your permission to share this information with us. If you choose to sign up for our Website through Facebook or Google or upload your contacts from your third-party email service, you will be asked to share certain information with us as identified by those third-party websites.
Additional information
Automatically Collected Information
We collect information about your use of our Website, including your search activity, the pages you view, the date and time of your visit, and if you use our browser extensions, content you interact with on third-party sites. We also collect information that your device provides to us in connection with your use of our Website, such as your browser type, type of device, browser language, IP address, mobile carrier, unique device identifier, location, and requested and referring URLs.
How we protect your data
We use reasonable and appropriate measures to protect your personal information from loss, misuse, unauthorized access, disclosure, alteration, and destruction, taking into account the risks involved in the processing and the nature of the personal information.
What data breach procedures we have in place
- When a security incident is detected or reported, the key first steps are to (1) contain the incident, (2) initiate an investigation of its scope and origins, and (3) decide if it qualifies as a Breach.
- The identification phase of incident response aims to discover potential security incidents and assemble an incident response team that can effectively contain and mitigate them.
- The verification phase’s primary goal is to confirm that the compromise is genuine and presents sufficient risk to engage the process.
- The containment phase represents the beginning of monitoring the attacker’s activities and determining whether interesting data is leaking during the investigation. Whenever possible, this is done by performing network quarantine at the time of detection. This is the most time-sensitive and contextually dependent phase of the investigation.
- The analysis phase involves an in-depth investigation of the available network-based and host-based evidence. The primary goal of the analysis is to establish whether there is a reasonable belief that the attacker(s) successfully accessed Restricted Data or GDPR Data on the compromised system.
- The primary goal of the recovery phase is to safely restore the compromised host to its normal business function.
- For incidents involving GDPR Data, we will address each accidental or unlawful destruction, loss, alteration, or unauthorized disclosure of or access to GDPR Data.
UPDATING OUR PRIVACY POLICY
We may change our Privacy Policy from time to time. We will notify you of any changes by posting the updated Policy on our Website and inserting a new “Effective Date.”
CONTACTING US
If you would like to send us a request as indicated above or have any other questions or concerns regarding our Privacy Policy, you may contact us by using our contact form or email us at privacy@blackbohemia.org.
EFFECTIVE DATE:
This Privacy Policy is effective as of January 28th, 2025