Who We Are
This Web site, “Full Scale agile™” (“FuSca™”) is found at “https://fullscaleagile.com.” It is owned by Full Scale agile, a dba of AmRevNC, LLC, based in Durham, North Carolina, USA.
The Short Version
- The only information we get that identifies you personally is what you provide if you use our Contact Form. We retain that to refer back to when providing customer service and for our own marketing to you, but we never share that with anyone else unless legally required to.
- We may get and share with advertisers aggregated, anonymous data, like the number of clicks on their ads and the regions people clicked from. We do not share any personally identifiable information like IP addresses.
- We prioritize high-privacy third-party providers. They may collect and retain other information, so check their privacy policies (linked from “Providers” below) if you have concerns.
- We are happy to send you the little bit of data we have on you, if any, and to delete it.
What Personal Data We Collect and Why
Contact
When visitors use our Help page, we collect the data shown in the contact form. To help us block spam, our service checks the visitor’s IP address and browser user agent string, but we do not retain that information.
Cookies
Full Scale agile places no cookies on your computer, though some of our third-party vendors may (see below). If you leave a contact message on our site you may opt-in to saving your name, email address and other information in cookies. These are for your convenience so that you do not have to fill in your details again when you make another contact. You can delete them from your browser anytime.
How We Use Your Information
Future Marketing
Although we have no plans for e-mail marketing at this time, Full Scale agile may add your e-mail address (if you gave it to us) to contact lists for that purpose in the future. If so, you will be able to opt-out permanently with a few clicks. We will never share or sell those lists. See also “Our Data Breach Procedures” below.
We will never conduct paper mail or telephone campaigns.
Automated Decision-making and Profiling with User Data
None. Aggregated, anonymous data (only) are used to make manual decisions about page content, security, marketing, etc.
Who We Share Your Data With
No one, unless a court requires us to. FuSca does not sell or share personally identifiable data. We may provide aggregated, anonymous data to advertisers as part of our marketing.
Where We Send Your Data
Visitor contacts may be checked through automated spam or robot detection services.
Other Providers
We place a high priority on privacy protection when selecting our service providers, though they in turn may use vendors that collect personalized data. Please see our providers’ privacy policies for more information:
- Cloudflare
- Heator (social media share buttons)
- Koko Analytics (see relevant questions at the bottom of the linked page)
How Long We Retain Your Data
If you contact us, the generated e-mail and related metadata (see above) are retained indefinitely. This is for legal purposes and to maintain continuity of service if you contact us again in the future.
What Rights You Have Over Your Data
You can request an exported file of the personal data we hold about you through our Contact form, including any data you have provided to us. You can also request that we erase any personal data we hold about you. We will do so immediately, confirm by e-mail, and then delete your e-mail address. This does not include any data we are obliged to keep for legal or security purposes.
Data Protection
How We Protect Your Data
We rely on the security built into WordPress, our website platform, and provided by Cloudflare, through which the site is proxied.
Our Data Breach Procedures
Within one hour of learning our contact e-mail addresses have been hacked or third-party user accounts have been breached, we will:
- Request any affected provider to force password changes on all related accounts.
- Notify users which data have been compromised.
- Begin an investigation with our security providers (see previous section) to determine if we did anything that allowed the breach.
When the Step 3 investigation is complete, we will:
- Take all steps recommended by our security providers to prevent a recurrence.
- Report the results to all users.