Your privacy is very important to us. At e-Strategy Media we have a few fundamental principles that we follow:
- We don't ask you for personal information unless we truly need it. (We can't stand services that ask you for things like your gender or income level for no apparent reason.)
- We don't share your personal information with anyone except to comply with the law, develop our products, or protect our rights.
- We don't store personal information on our servers unless required for the on-going operation of our site.
- e-Strategy Media ("e-Strategy") operates several websites including e-strategymedia.com, e-strategyblog.com, trends.e-strategyblog.com, estrategy.tv, e-strategy.com, beyondsocialmediashow.com, thereputationalgorithm.com, audiolicious.tv and minnesotavikingschat.com. It is e-Strategy's policy to respect your privacy regarding any information we may collect while operating our websites.
Like most website operators, e-Strategy collects non-personally-identifying information of the sort that web browsers and servers typically make available, such as the browser type, language preference, referring site, and the date and time of each visitor request. e-Strategy's purpose in collecting non-personally identifying information is to better understand how e-Strategy's visitors use its website. From time to time, e-Strategy may release non-personally-identifying information in the aggregate, e.g., by publishing a report on trends in the usage of its website.
e-Strategy also collects potentially personally-identifying information like Internet Protocol (IP) addresses for logged in users and for users leaving comments on our blogs. e-Strategy only discloses logged in user and commenter IP addresses under the same circumstances that it uses and discloses personally-identifying information as described below, except that blog commenter IP addresses are visible and disclosed to the administrators of the blog where the comment was left.
Gathering of Personally-Identifying Information
Certain visitors to e-Strategy's websites choose to interact with e-Strategy in ways that require e-Strategy to gather personally-identifying information. The amount and type of information that e-Strategy gathers depends on the nature of the interaction. For example, we ask visitors who comment on our blog to provide a username and email address. Those who wish to receive updates via email, we collect their emails. In each case, e-Strategy collects such information only insofar as is necessary or appropriate to fulfill the purpose of the visitor's interaction with e-Strategy. e-Strategy does not disclose personally-identifying information other than as described below. And visitors can always refuse to supply personally-identifying information, with the caveat that it may prevent them from engaging in certain website-related activities.
e-Strategy may collect statistics about the behavior of visitors to its websites. For instance, e-Strategy may monitor the most popular pages on the e-strategyblog.com site or use spam screened by the Akismet service to help identify spam. e-Strategy may display this information publicly or provide it to others. However, e-Strategy does not disclose personally-identifying information other than as described below.
Protection of Certain Personally-Identifying Information
e-Strategy discloses potentially personally-identifying and personally-identifying information only to those of its employees, contractors and affiliated organizations that (i) need to know that information in order to process it on e-Strategy's behalf or to provide services available at e-Strategy's websites, and (ii) that have agreed not to disclose it to others. Some of those employees, contractors and affiliated organizations may be located outside of your home country; by using e-Strategy's websites, you consent to the transfer of such information to them. e-Strategy will not rent or sell potentially personally-identifying and personally-identifying information to anyone. Other than to its employees, contractors and affiliated organizations, as described above, e-Strategy discloses potentially personally-identifying and personally-identifying information only in response to a subpoena, court order or other governmental request, or when e-Strategy believes in good faith that disclosure is reasonably necessary to protect the property or rights of e-Strategy, third parties or the public at large. If you are a registered user of an e-Strategy website and have supplied your email address, e-Strategy may occasionally send you an email to tell you about new features, solicit your feedback, or just keep you up to date with what's going on with e-Strategy and our products. We primarily use our various product blogs to communicate this type of information, so we expect to keep this type of email to a minimum. If you subscribe to one of our newsletters, the frequency of those newsletters will be communicated at the point of subscription. If you send us a request (for example via a support email or via one of our feedback mechanisms), we reserve the right to publish it in order to help us clarify or respond to your request or to help us support other users. e-Strategy takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally-identifying and personally-identifying information.
If e-Strategy, or substantially all of its assets were acquired, or in the unlikely event that e-Strategy goes out of business or enters bankruptcy, user information would be one of the assets that is transferred or acquired by a third party. You acknowledge that such transfers may occur, and that any acquirer of e-Strategy may continue to use your personal information as set forth in this policy.
Articles on e-Strategy sites may include embedded content (e.g. videos, images, articles, social media posts, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Comments and other content submitted to Akismet anti-spam service are not saved on our servers unless they were marked as false positives, in which case we store them long enough to use them to improve the service to avoid future false positives.
Third Party Services We Use
- Google Analytics
- Google Tag Manager
- Google Optimize
- Google Ads
- Google AdSense
- Social Media Advertising (e.g. Facebook, Instagram, Twitter, LinkedIn, Pinterest)