What personal information do we collect from the people that visit our blog, website or app?
The information we collect depends on the type of interaction a visitor chooses to have with our site. To read our blog no information will be collected by us (although, please note, we do use Google Analytics software to count visitors and demographics data, when allowed by your browser; additionally, any conduct violative of policy will immediately trigger a tracking, recording, and storing response – in which case, a wrong doer or person violating our policies can have no expectation of privacy from us). All activities are monitored for compliance, and non-compliant activities and behavior trigger a response, which removes privacy protection from a wrong doer, policy violator, or bad acting individuals and entities.
We will collect emails, first and last names or a business name, and payment information from visitors of our site if they access our shop, make a purchase, or click on any link connected to a payment or communication option. (In the event that we have items available for sale which must be shipped to a purchaser, we will also collect the addresses associated with that order.)
We collect the name, email address, and publicly available information of visitors who contact us through forms on our site or who communicate with us by email, social media, or other social networks.
When do we collect information?
We collect information from you when you fill out a form or enter information on our site, or provide us with feedback on our products or services, via your browser’s cookies, and when you voluntarily contact us for any purpose, including when you enter and browse our site shop or comment on our brand or business online. The information we collect is up to you, the visitor. Note: actions violative of site agreements, policies, rules, and notices (e.g. hacking attempts or spam) will trigger a collecting, tracking, investigating, reporting and recording response: our site is monitored for compliance and protection. Non-compliant actions trigger a response leading to the collecting of information about the wrong doer or policy violator. No expectation of privacy is guaranteed by us to those who use our site incorrectly, or in violation of our Terms, Policies, Agreements, Rules, Guidance, and clearly established protocols and protections.
How do we use your information?
We use the information we collect from you when you make a purchase or use certain other site features, for example: to follow up with you after correspondence (live chat, email, or comments) for analytics data, sending you information or items which you solicited, and to make our site run, operate, and perform better. We also store communications that violate policies to protect, enforce, and defend our legal rights and the rights of others using our site.
We may send or refer your data to law enforcement if your actions violate the law. Targeting individuals who use our site (such as harassing someone or replying to comments) may trigger a response beyond our control (e.g. the individual targeted may have or seek additional recourse against you). Also, we may, at our discretion, choose to not remove harassing comments so that the person targeted has sufficient proof that such activity occurred.
A person harassed or treated in a manner which violates or is inconsistent with policies in place to protect their individual rights and dignity may always request that we remove any site posts which offends them. However, a person who commits or has committed a policy violation should have no expectation of similar treatment based on any policy or agreement.
How do we store your information?
We store your electronic data on secured online cloud servers. We access that data in New York, NY, USA, and at select U.S. locations used by our elected analytics firms located in the USA.
Non-compliant activity and accompanying data may be downloaded to local servers, printed, and transferred to legal, enforcement, or reporting agencies, and such third-parties will have different ways of managing that data. Non-compliant parties’ actions may be handled by security experts located in international territories: When we see non-compliant behavior, we will use the strongest measures available to us to handle, redress, and bring to justice individuals who violate our Agreements and Notices – and this may require us to seek qualified experts from abroad to assist in the prosecution of the wrongdoers. (We have a strong personal and professional network in various different locations across the globe. When something goes wrong with our business or brand, we mount a robust campaign using all sources of knowledge and redress available to us to make right that wrong. This can include receiving aid from that international network of professionals.)
How do we protect your information?
· We use regular Malware Scanning
· We use an SSL certificate when checking out at our shop
· We scrutinize our payment methods and select methods which are commonly known to be safe and reputable. Presently, we accept funds via PayPal, PayPal.me, Certified Bank Check at the addresses and online payment sites clearly communicated in writing on our sites. Also, Stripe is enabled on this site to accept and process credit card payments.
· At present, we do not allow for the storing of payment information on our site (an added protection for you, as we install, test, and monitor safety officers, systems, and protocols)
· We limit the data which we collect and store on you to better protect your information
· We do not send newsletters, marketing or advertising emails en masse: you can be sure that anyone contacting you in this regard claiming to be from our site is perpetrating a fraud. Instead, in our shop, we offer limited time, FREE options where you – the customer – can elect to receive limited and select data from us at your election.
· We do not share your data between our affiliated, Bella Caveat entity sites: only by accessing that site will that site have access to your data (we respect your privacy) – this is why you may see the same or similar blog post or item on a separate Bella Caveat entity site: we serve different segments of the population, and we do not assume that a reader of RapeBaitandNegroGirls.Info also Reads and Uses BellaCaveat.com or TheresaGiovanna.com, although some customers use several of our sites
· For your protection, we again remind you to read and accept our Terms when you make a purchase or solicit information from us;
· We routinely review our policies and post updates to our site; you should routinely review site policies and terms and conditions so that you can avoid potential scammers fraudulently pretending to act on our behalf: for example, we do not/would not
o Recommend a Go-Fund-Me page,
o Solicit donations by phone, email, or newsletter, or
o Ask for money over the phone
*You can be sure that all financial requests from or on our behalf will be handled in writing from an account specifically named and described across our web pages; please read our Terms, Policies, Guidance, Notices, and Rules for more information about how we safeguard your information and our networks
Do we use 'cookies'?
What are Cookies?
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since each browser is a little different, look at your browser's Help Menu to learn the correct way to modify your cookies.
If you turn cookies off, it may affect your site experience with our site.
We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information unless we provide users with advanced notice. This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or serving our users, so long as those parties agree to keep this information confidential. Exception: We will release information when it's release is appropriate to comply with the law, enforce our site policies, or protect our or others' rights, property or safety. (For example: we may participate in a law enforcement sting if someone targets our customers’ data and attempts to steal information from our site or its users.)
However, non-personally identifiable visitor information may be provided in the aggregate to other parties for other business uses, such as if a potential purchaser of our business requests data on how many site visitors we have.
Occasionally, we may include or offer third-party products or services on our website. These third-party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and we welcome constructive feedback about these sites. Be advised: Harassing, threatening, or otherwise harmful communications are strictly prohibited.
We may employ Google Ads technology on our site. Allowing Ads on our sites provide a small stream of revenue for us. However, we will keep our customer experience in mind when choosing to deploy and accept Google ads (we have already limited and blocked ads from appearing on top ad real estate on our most visited sites, and this is because we believe in putting customers first).
Google's advertising requirements can be summed up by Google's Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en
We use Google AdSense Advertising on our website.
We have implemented the following:
• Remarketing with Google AdSense
• Demographics and Interests Reporting
We, along with third-party vendors such as Google use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with ad impressions and other ad service functions as they relate to our website.
Users can set preferences for how Google advertises to you using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising Initiative Opt Out page or by using the Google Analytics Opt Out Browser add on.
California Online Privacy Protection Act
According to CalOPPA, we agree to the following:
Users can visit our site anonymously.
How does our site handle Do Not Track signals?
We honor Do Not Track signals and Do Not Track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place.
Does our site allow third-party behavioral tracking?
It's also important to note that we do not allow third-party behavioral tracking (except as described in this policy)
We make every effort to comply with the GDPR mandates. Although, we do not specifically target the European Union, we welcome visitors from across the globe (and will frequently offer you the greeting of the day in an EU language or dialect, as we have a strong network of personal and professional relationships in EU nations.)
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under the age of 13 years old, the Children's Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States' consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children's privacy and safety online.
We do not specifically market to children under the age of 13 years old.
We do not let third-parties, including ad networks or plug-ins collect PII from children under 13
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify you via email
• Within 10 business days
We will notify the users via in-site notification
• Within 10 business days
We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.
Please see our Terms and Conditions for more information about your legal rights.
How to Contact Us
Bella Caveat LLC
232 West 116th Street, Unit #354
New York, NY 10026
Last edited November 4, 2020