- Children Under the Age of 13
Our Website is not intended for children under 13 years of age . No one under age 13 may provide any information through the Website. We do not knowingly collect personal information from children under 13. If you are under 13, do not use or provide any information on or through this Website or on or through any of its features, make any purchases through the Website, use any of the interactive or public comment features of this Website or provide any information about yourself to us, including your name, address, telephone number, e-mail address or any screen name or user name you may use. If we learn we have collected or received personal information from a child under 13 without verification of parental consent, we will delete such information. If you believe we might have any information from or about a child under 13, please email us at privacy@FlexBooker.com.
- Information We Collect About You and How We Collect It
Through the Website we may collect the following kinds of information about you: (a) information that you provide that personally identifies you and/or your customers; (b) information that does not personally identify you and/or your customers; and (c) information about your internet connection, the equipment you use to access our Website and usage details (“Website Usage Information”) that we automatically collect when you visit our Website or that you provide us .
- Personally Identifiable Information
Consent. We may use your personal information as described in this Policy subject to your consent. To withdraw your consent, please contact us at email@example.com. You may also refrain from providing, or withdraw, your consent for cookies.
Performance of a contract. We may need to collect and use your personal information of FlexBooker users, as applicable, to perform our contractual obligations.
Legitimate Interests. We may use your personal information for our legitimate interests to provide our Platform and services and to improve our services and the content on our Platform. We process information on behalf of our customers who have legitimate interests in operating their businesses. We may use technical information as described in this Policy and use personal information for our marketing purposes consistent with our legitimate interests and any choices that we offer or consents that may be required under applicable law.
- Non-Personal Information
Our definition of non-personal information is any information that does not personally identify you or your customers. Non-personal information can include certain personally identifiable information that has been de-identified; that is, information that has been rendered anonymous. We and/or our third party service providers obtain non-personal information about you from information that you provide us, either separately or together with your personally identifiable information. We and/or our third party service providers also automatically collect certain non-personal information from you when you access our Website.
- Website Usage Information
In addition to any personally identifiable information or other information that you choose to provide to us through the Website, we and our third-party service providers may use a variety of technologies, now and hereafter devised, that automatically collect certain web site usage information whenever you visit or interact with the Website. This information may include the page served, the time, information about your computer and internet connection, including browser type, operating system and IP address, the source of the request, the preceding page view, details of your visit to our Website, and other similar information.
[ We also may use these technologies to collect information about your online activities over time and across third-party websites or other online services (behavioral tracking). Click here [INCLUDE AS LINK TO DO NOT TRACK DISCLOSURES] for information on how you can opt out of behavioral tracking on this website and how we respond to web browser signals and other mechanisms that enable consumers to exercise choice about behavioral tracking. ]
The information we collect automatically may include personal information, or we may maintain it or associate it with personal information we collect in other ways or receive from third parties. FlexBooker does not control third parties’ tracking technologies contained at some content or applications, including advertisers, ad networks and servers, or how they should be used. If you have any questions about an advertisement or other targeted content you may contact the responsible provider directly.
The technologies we use for automatic data collection may include:
Web Beacons. Small graphic images or other web programming code called web beacons (also known as “1x1 GIFs” or “clear GIFs”) may be included in our web pages, various aspects of Website functionality and e-mail messages. Web beacons may be invisible to you, but any electronic image or other web programming code inserted into a web page or e-mail can act as a web beacon. Web beacons or similar technologies may be used for a number of purposes, including, without limitation, to count visitors to the Website, to monitor how users navigate the Website and to count how many e-mails that were sent were actually opened.
Cookies. A cookie is a data file placed on a Computer when it is used to visit the Website. Cookies may be used for many purposes, including, without limitation, tracking user preferences and web pages visited while using the Website. You may be able to remove, reject and/or disable some types of cookies using your browser’s preferences or other programs. Some features of the Website may not function properly or may operate slowly if you disable, delete, or refuse to accept cookies. Some of the cookies we use may be “Flash” cookies. A Flash cookie is a data file placed on a Computer via the Adobe Flash plug-in that may be built-in to or downloaded by you to your Computer. While they are harmless, depending on your browser, these cookies may not be deleted when your cookies are deleted or disabled and, in some instances, they may cause your cookies to reappear in your browser. Please check your browser to determine where these types of cookies are stored and how they may be deleted or disabled.
Mobile Device Identifiers. Certain mobile service providers uniquely identify mobile devices and we or our third-party service providers may receive such device information if you access the Website through mobile devices. Certain features of our Website may require collection of mobile phone numbers, and we may associate that phone number to mobile device identification information. Additionally, some mobile phone service providers operate systems that pinpoint the physical location of devices that use their service. Depending on the provider, we or our third-party service providers may receive this information.
Embedded Scripts. An embedded script is programming code that is designed to collect information about your interactions with the Website, such as functions of the Website that you use and links you click on. The code is temporarily downloaded onto your Computer from our web server or a third-party service provider, is active only while you are connected to the Website, and is deactivated or deleted thereafter.
Passive Means. Information collected through passive means may be non-identifying or may be associated with you. In the latter case it will be treated as personally identifiable information. We use non-personal information in a variety of ways, including to help analyze site traffic, understand customer needs and trends, carry out targeted promotional activities and to improve our services. We may use your non-personal information by itself or aggregate it with information we have obtained from others. We may share your non-personal information with our affiliated companies and third parties to achieve these objectives and others, but remember that aggregate information is anonymous information that does not personally identify you. We may provide our analysis and certain non-personal information to third parties (who may in turn use this information to provide advertisements tailored to your interests), but this will not involve disclosing any of your personally identifiable information.
Your Rights and Choices Account. In order to keep your personal information accurate and complete, you can log in to review and update your account information, including contact and billing information, via your account settings page. You may also contact us to request information about the personal data we have collected from you and to request the correction, modification or deletion of such personal information. We will do our best to honor your requests subject to any legal and contractual obligations. If you would like to make a request, cancel your account or request we delete or no longer use your account information to provide you Services, contact us at firstname.lastname@example.org or the address set forth at the end of this Policy. Subject to applicable law, we will retain and use your account information only as necessary to comply with our legal obligations, resolve disputes and enforce our agreements. E-mail. As described above, if you do not wish to receive promotional emails from us, you may opt out at any time by following the opt-out link contained in the email itself. Please note that it may take up to ten (10) days to process your request. Please also note that if you opt out of receiving marketing communications from us, we may continue to send to you service-related emails which are not available for opt-out. If you do not wish to receive any service-related emails from us, you have the option to deactivate your account. Cookies. You may also refrain from providing, or withdraw, your consent for cookies. Your browser’s help function should contain instructions on how to set your computer to accept all cookies, to notify you when a cookie is issued, or to not receive cookies at any time. Third Party Analytics Services. Some of the services used provide the ability to opt-out. You may opt-out of Google Analytics’ and Mixpanel’s services using Opt-Out Features on their respective websites.
- How We Share
We may disclose aggregated information about our users, and information that does not identify any individual, without restriction.
- How We Use
- Personally Identifiable Information
- Website Usage Information and Non-Personal Information
We may use the non-personal information for a variety of purposes, including to enhance or otherwise improve the Website. In addition, we may collect your IP address and other unique identifiers for the particular device you use to access the Internet, as applicable (collectively, referred to herein as a “Device Identifier”). A Device Identifier is a number that is automatically assigned to your Computer. When analyzed, usage information helps us determine how our Website is used, such as what components of the Website are used most frequently. We may associate your Device Identifier or non-personal information with the personally identifiable information you provide, but we will treat the combined information as personally identifiable information.
- Information You Provide About A Third Party
If you send someone else a communication from the Website, such as sending Website-related content or functionality to your customers, the information you provide (e.g., names, e-mail addresses, etc.) is used to facilitate the communication and is not used for any other marketing purpose unless we obtain consent from that person or we otherwise indicate. Please be aware that when you send correspondence to customers and other third parties through the Website, your e-mail address and other personally identifiable information may be included in such communication.
- Information Third Parties Provide About You
- Other Uses
We may use the information we have collected from you to enable us to display advertisements to our advertisers' target audiences. Even though we do not disclose your personal information for these purposes without your consent, if you click on or otherwise interact with an advertisement, the advertiser may assume that you meet its target criteria.
- E-mail Communications
If you send us an e-mail with questions or comments, we may use your personally identifiable information to respond to your questions or comments, and we may save your questions or comments for future reference. For security reasons, we do not recommend that you send non-public personally identifiable information, such as passwords, social security numbers, credit card or bank account information, to us by e-mail. Further, we may send you e-mail under the following circumstances: (a) if you request a particular service or sign up for a feature that involves e-mail communications; (b) if it relates to purchases you have made with us (e.g., payment of monthly license fees, Website updates, customer support, etc.); (c) if we are sending you information about our other products and services; (d) if you consented to being contacted by e-mail for a particular purpose; (e) if you send us an e-mail, post information on the Website or otherwise submit information to us electronically, we may e-mail you to follow-up or otherwise communicate with you with respect thereto; (f) to provide you legal notices or notices with respect to your use of the Website; or (g) to otherwise facilitate a transaction between us. In certain instances, we may provide you with tools on the Website that will allow you to set your preferences for receiving e-mail communications from us; that is, agree to some communications but not others. Where made available to you, you may “opt out” of receiving future, third-party, commercial e-mail communications from us by clicking the “unsubscribe,” or other then applicable link, or by following the instructions included at the bottom of some e-mails we send; provided, however, we reserve the right to send you transactional e-mails such as customer service communications and billing-related information and notifications.
Residents of the State of California, under certain provisions of the California Civil Code including but not limited to California Civil Code Section § 1798.83, have the right to request from companies conducting business in California a list of all third parties to which the company has disclosed certain personally identifiable information as defined under California law during the preceding year for third party direct marketing purposes. To make such a request, please send an email to privacy@FlexBooker.com or write to us at the below address. In your request, please attest to the fact that you are a California resident and provide a current California address for our response.
225 W 1st Ave
Columbus, OH 43201
Attn: California Privacy Request
- Keeping Your Information Secure
We have implemented security measures that are in compliance with applicable laws and that we consider reasonable and appropriate to protect against the loss, misuse, disclosure and alteration of the information under our control. Please be advised, however, that while we strive to protect your personally identifiable information and privacy, we cannot guarantee or warrant the security of any information you disclose or transmit to us online and are not responsible for the theft, destruction or inadvertent disclosure of your personally identifiable information. In the unfortunate event that your “personally identifiable information” (as the term or similar terms are defined by any applicable law requiring notice upon a security breach) is compromised, we may notify you by e-mail (at our sole and absolute discretion) to the last e-mail address you have provided us; provided, however, delays in notification may occur while we take necessary measures to determine the scope of the breach and restore reasonable integrity to the system as well as for the legitimate needs of law enforcement if notification would impede a criminal investigation. From time to time we evaluate new technology for protecting information, and when appropriate, we upgrade our information security systems.
The safety and security of your information also depends on you. Where we have given you (or where you have chosen) a password for access to certain parts of our Website, you are responsible for keeping this password confidential. We ask you not to share your password with anyone. We urge you to be careful about giving out information in public areas of the Website like message boards. The information you share in public areas may be viewed by any user of the Website.
- Other Sites/Links
Our Website may link to or contain links to other third party websites that we do not control or maintain, such as in connection with purchasing services and products referenced on our Website and banner advertisements. We are not responsible for the privacy practices employed by any third party website. We encourage you to note when you leave our Website and to read the privacy statements of all third party websites before submitting any personally identifiable information.
- Third Party Applications
Third party applications may be available via the Website. The owners of these applications (“Third Party Owners”) may collect personally identifiable information from you and may have their own policies and practices. We are not responsible for how Third Party Owners or their applications use your personally identifiable information. These Third Party Owners may have their own terms of service, privacy policies or other policies and ask you to agree to the same. We are not responsible for these policies or the practices of Third Party Owners. Be sure to review any available policies before submitting any personally identifiable information to a third party application or otherwise interacting with it.
- Contact and Opt-Out Information
We will respond to your request and, if applicable and appropriate, make the requested change in our active databases as soon as reasonably practicable. Please, note that we may not be able to fulfill certain requests while allowing you access to certain benefits and features of our Website. Also, please note that it is not always possible to completely change, remove or delete all of your information from our databases and that residual data may remain on backup media or for other reasons and that our obligations with respect to deleting information is limited. Also, if you have made any public postings on or through the Website, these communications are generally not removed by us.
- Consent to Transfer of Information to the United States
The Website is stored and processed in the United States and intended for users located in the United States. If you are located in the European Union, Canada or elsewhere outside of the United States, please be aware that information we collect will be transferred to and processed in the United States. By using the Website and/or providing us with any information, you consent to this transfer and processing of your information in the United States.
- Sole Statement
- Contact Information
649 City Park Avenue
Columbus, OH 43201
or, via email at privacy@FlexBooker.com .
Thank you for visiting FlexBooker.com.
Data protection is important, since it prevents the information of an organization from fraudulent activities, hacking, phishing, and identity theft. Any organization that wants to work effectively need to ensure the safety of their information by implementing a data protection plan.How do you respond to SAR? ›
- Recognise the subject access request.
- Identify the individual making the subject access request.
- Act swiftly and clarify the subject access request.
- identify personal data to be disclosed. ...
- Identify personal data exemptions.
Yes. If an exemption applies, you can refuse to comply with a SAR (wholly or partly). Not all exemptions apply in the same way and you should look at each exemption carefully to see how it applies to a particular request.What are the 7 principles of data protection? ›
- Lawfulness, fairness and transparency.
- Purpose limitation.
- Data minimisation.
- Storage limitation.
- Integrity and confidentiality (security)
Human right to privacy
Information privacy is crucial to the broader right to privacy. It relates to an individual's ability to determine for themselves when, how, and for what purpose their personal information is handled by others. Protecting privacy is key to ensuring human dignity, safety and self-determination.
Privacy rights help maintain social boundaries. Everyone has things they don't want certain people to know. Having the right to establish boundaries is important for healthy relationships and careers. In the past, putting up boundaries simply meant choosing to not talk about specific topics.What happens if you ignore a SAR? ›
If you fail to comply with a SAR, the requester may apply for a court order requiring you to comply. It is a matter for the court to decide, in each particular case, whether to make such an order.What do you do if you have no response to SAR? ›
If you've complained to an organisation and you still do not receive any response, or remain unhappy with their handling of your subject access request, you can make a complaint to the ICO.How quickly do you have to respond to a SAR? ›
An organisation normally has to respond to your request within one month. If you have made a number of requests or your request is complex, they may need extra time to consider your request and they can take up to an extra two months to respond.What grounds can SAR be refused? ›
Under Article 12(5) GDPR, in limited circumstances, where an access request is 'manifestly unfounded or excessive', a controller may also, where appropriate, refuse to act on the request.
In most cases you cannot charge a fee to comply with a SAR. However, you can charge a 'reasonable fee' for the administrative costs of complying with a request if it is manifestly unfounded or excessive, or if an individual requests further copies of their data.Do I have the right to see emails about me? ›
At its core, data protection law is about openness and transparency – and people have the right to access their own personal data. If you withhold information, you're denying those rights. However, sometimes it might be appropriate to withhold some or all of the information that someone has asked you to provide.What are the two 2 key principles of data protection? ›
Integrity and Confidentiality: Personal data should be processed in a manner that ensures appropriate security and confidentiality of the personal data, including protection against unauthorised or unlawful access to or use of personal data and the equipment used for the processing and against accidental loss, ...What are the 8 rules of data protection? ›
|Principle 2 – purposes||Principle (b) – purpose limitation|
|Principle 3 – adequacy||Principle (c) – data minimisation|
|Principle 4 – accuracy||Principle (d) – accuracy|
|Principle 5 - retention||Principle (e) – storage limitation|
Principles of Transparency, Legitimate Purpose and Proportionality. The processing of personal data shall be allowed subject to adherence to the principles of transparency, legitimate purpose, and proportionality.Is privacy a human right yes or no? ›
Article 12 of the Universal Declaration of Human Rights, 1948, and Article 17 of the International Covenant on Civil and Political Rights (ICCPR), 1966, legally protect persons against “arbitrary interference” with their privacy, family, home, correspondence, honour and reputation.Is privacy an absolute right? ›
Your right to privacy isn't absolute. Sometimes other concerns are given priority, such as the safety of you or others, or the interests of justice. But it's important. That's why strict rules apply in these situations.Do people have a right to privacy? ›
The right to privacy is not mentioned in the Constitution, but the Supreme Court has said that several of the amendments create this right.How can we protect our privacy? ›
- Know your rights. ...
- Read privacy policies and collection notices. ...
- Always ask why, how and who. ...
- Check your credit report. ...
- Protect yourself online. ...
- Be aware of your mobile security. ...
- Use security software. ...
- Be careful what you share on social media.
Privacy is about the freedom to make choices without fear: how you want to live, what you believe in, who you are friends with, and what you want to share with whom. A lack of privacy leads to uniformity and self-censorship, which pushes our opinions to the edges and erodes our ability to engage in healthy debate.
Who is responsible for responding to a request? Controllers are responsible for complying with SARs, not processors. If you use a processor, you need to have contractual arrangements in place to guarantee that you can deal with SARs properly, irrespective of whether they are sent to you or the processor.Can a school refuse a SAR? ›
An organisation can refuse to comply with your SAR if they think it is 'manifestly unfounded or excessive.Can I request all data a company has on me? ›
You have the right to ask an organisation whether or not they are using or storing your personal information. You can also ask them for copies of your personal information, verbally or in writing. This is called the right of access and is commonly known as making a subject access request or SAR.What if a Freedom of information request is ignored? ›
The penalty is a fine. There are no financial or custodial penalties for failure to provide information on request or for failure to publish information. But you could be found in contempt of court for failing to comply with a decision notice, enforcement notice, or information notice.Are emails covered by a SAR? ›
The right of access only applies to the individual's personal data contained in the email. This means you may need to disclose some or all of the email to comply with the SAR. Just because the contents of the email are about a business matter, this does not mean that it is not the individual's personal data.What's considered personal data? ›
Personal data can cover various types of information, such as name, date of birth, email address, phone number, address, physical characteristics, or location data – once it is clear to whom that information relates, or it is reasonably possible to find out.What is personal data examples? ›
- a name and surname;
- a home address;
- an email address such as email@example.com;
- an identification card number;
- location data (for example the location data function on a mobile phone)*;
- an Internet Protocol (IP) address;
- a cookie ID*;
- the advertising identifier of your phone;
Dollar Amount Thresholds – Banks are required to file a SAR in the following circumstances: insider abuse involving any amount; transactions aggregating $5,000 or more where a suspect can be identified; transactions aggregating $25,000 or more regardless of potential suspects; and transactions aggregating $5,000 or ...Is a SAR a public record? ›
Clearly, the SAR is confidential, but is all information related to the SAR confidential? The Final Rule indicates that any document or other information that affirmatively states that a SAR has been filed constitutes information that would reveal the existence of a SAR and as such, is deemed confidential.Can you tell a customer a SAR has been filed? ›
The client is not notified that a SAR has been filed regarding their account. FinCen requires the SAR forms filed by financial institutions to identify the five essential elements of the suspicious activity being reported: Who is conducting the suspicious activity?
Organisations don't always need your consent to use your personal data. They can use it without consent if they have a valid reason. These reasons are known in the law as a 'lawful basis', and there are six lawful bases organisations can use.What information should never be emailed? ›
Examples of information you should never send via email include: Social Security numbers. Driver's License numbers. Passport numbers.Is it against the law to look at someone's email? ›
You need direct permission
Generally, accessing any account that is password protected is illegal. You can't read someone's emails or check their bank balance, for instance. If you need a password to get into that account, you're breaking the law to enter it, even if you got in by correctly guessing that password.
- Appoint a Data Protection Officer (if you need one) ...
- Review GDPR. ...
- Information audit. ...
- Determine your lawful basis for processing data. ...
- Implement processes. ...
- Establish documentation. ...
- Implement training and policies.
There are four pillars of data protection for the modern enterprise. They consist of governance, assessment, training, and response.What are the four most important data privacy rights? ›
The right to access the data a company has collected about them. The right to correct data that's been collected about them. The right to request the data collected about them is deleted. The right to data portability (that is, the right to take your data and move it to another company).What are privacy principles? ›
Safeguard personal information from unauthorized access, collection, use, disclosure, copying, modification or disposal by individuals from within and outside your organization. Protect all personal information regardless of its format, including paper, electronic, audio, and video data.What is the golden rule of data handling and privacy? ›
Golden rule 1: Handle all information with care
Most data is lost through human error. Any loss of data can have significant financial and reputational implications for the University. Think carefully about how you collect, handle and share data.
- Lawfulness, fairness and transparency.
- Purpose limitation.
- Data minimisation.
- Storage limitation.
- Integrity and confidentiality (security)
- Open and Transparent Management of Personal Information. ...
- Anonymity and Pseudonymity. ...
- Collection of Solicited Personal Information. ...
- Dealing with Unsolicited Personal Information. ...
- Notification of the Collection of Personal Information. ...
- Use or Disclosure of Personal Information.
- The 7 Foundational Principles.
- The 7 Foundational Principles.
- Proactive not Reactive; Preventative not Remedial.
- Privacy as the Default Setting.
- Privacy Embedded into Design.
- Full Functionality — Positive-Sum, not Zero-Sum.
- End-to-End Security — Full Lifecycle Protection.
- Visibility and Transparency — Keep it Open.
The Importance of Data Privacy
The lack of access control regarding personal information can put individuals at risk for fraud and identity theft. Additionally, a data breach at the government level may risk the security of entire countries.
While students are using school computers and networks for educational purposes, it can often leave their data exposed to security risks. The educational system must include rules and regulations for proper student data management. Avoiding personal data exploitation is essential in all school grades.What is data privacy Act and why it is important? ›
It (1) protects the privacy of individuals while ensuring free flow of information to promote innovation and growth; (2) regulates the collection, recording, organization, storage, updating or modification, retrieval, consultation, use, consolidation, blocking, erasure or destruction of personal data; and (3) ensures ...Is privacy important essay? ›
Privacy is important because: Privacy gives us the power to choose our thoughts and feelings and who we share them with. Privacy protects our information we do not want shared publicly (such as health or personal finances). Privacy helps protect our physical safety (if our real time location data is private).How can you protect your privacy? ›
- Use a more secure search engine. ...
- Check to see if your browser supports private browsing. ...
- Protect your data with a virtual private network. ...
- Always double-check any unfamiliar links. ...
- Be careful what you share on social media.
Privacy is a fundamental human right recognized in the UN Declaration of Human Rights, the International Convenant on Civil and Political Rights and in many other international and regional treaties. Privacy underpins human dignity and other key values such as freedom of association and freedom of speech.What is data privacy Short answer? ›
Data privacy is the branch of data management that deals with handling personal data in compliance with data protection laws, regulations, and general privacy best practices.How can students protect their privacy? ›
- Keep mobile devices and apps updated.
- Don't click random links or visit unknown websites.
- Delete or report suspicious emails to avoid granting access to accounts.
- Update and secure all home devices connected to the internet.
Internet privacy is important because it gives you control over your identity and personal information. Without that control, anyone with the intention and means can manipulate your identity to serve their goals, whether it is selling you a more expensive vacation or stealing your savings.
Principles of Transparency, Legitimate Purpose and Proportionality. The processing of personal data shall be allowed subject to adherence to the principles of transparency, legitimate purpose, and proportionality. a. Transparency.What is personal privacy? ›
Broadly speaking, privacy is the right to be let alone, or freedom from interference or intrusion. Information privacy is the right to have some control over how your personal information is collected and used.