Who we are

Our website address is: https://kinkyintrovert.com. We are a BDSM related blog. Privacy is important to us. We won’t be dicks with your data.

What personal data we collect and why

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. Gravatar is a service provided by Automattic. Please see the Automattic privacy policy for more information. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

If you submit a contact form, the information you enter into the form will be sent to the recipient via email. The email may be transmitted to and stored indefinitely on third party servers in a unencrypted form. Information sent via the “Contact my Owner” form will be delivered to Her email directly. Kinky Introvert will only see it if She decides to share it with him.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

We generally avoid embedding content from other websites, as we prefer to create O/our own. If we do embed content from other sources, we will only include content from reputable sources with clear privacy policies.

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Social media sharing buttons

We use AddToAny to generate the social media sharing buttons at the bottom of posts. For more information on the data that AddToAny collects and how it is used, please see their privacy policy.

Analytics

Like many sites, we use Google Analytics to find out where our visitors are coming from, how they are getting here, and what types of devices, operating systems, and user agents are in use. We also look at aggregated data regarding what pages are visited and the general flow of user activity throughout the site. IP addresses are anonymized. We do not use Google Analytics Advertising Features. For more information about what information Google Analytics collects, how it is collected, and how it is used, please see Google’s article on the subject. If you want to opt out of Google Analytics data collection, you can use Google’s browser plugin.

Who we share your data with

We don’t share your data with third-parties in a way as to reveal any of your personal information like email, name, etc. We will disclose your personally identifiable information to a third-party when legally required to do so.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through the automated spam detection service Akismet. Please see the Akismet privacy page for more information.

We use Google’s reCAPTCHA to protect against bots. Please see Google’s Privacy Policy for more information.

Contact information

If you have any questions or comments regarding our privacy policy, please use our contact form.

Additional information

How we protect your data

All access to this website is done over HTTPS. This encrypts our user’s communications with the website so personal identifiable information can not be intercepted by third parties.

What data breach procedures we have in place

Should there be a potential or real data breach, upon becoming aware of such an occurrence, we will immediately notify users who’s data may be at risk, via email. We will take the necessary steps to upgrade our data protection and improve our security further, including resetting user passwords and deleting user information if required.