Privacy Policy

Who we are

Our website address is: http://3z6.737.myftpupload.com

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms / Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Analytics Who we share your data with How long we retain your data.

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Your contact information
Additional information
How we protect your data
What data breach procedures we have in place
What third parties we receive data from
What automated decision making and/or profiling we do with user data
Industry regulatory disclosure requirements

Illegal content

We do not allow content that:

  • is illegal, promotes illegal activity, or infringes on the legal rights of others.

Intellectual property abuse

We do not allow content that:

  • infringes copyright. It is our policy to respond to notices of alleged infringement that comply with the Digital Millennium Copyright Act (DMCA). You can file a counter-notification via this form.
  • sells or promotes the sale of counterfeit products. Counterfeit goods contain a trademark or logo that is identical to or substantially indistinguishable from the trademark of another. They mimic the brand features of the product in an attempt to pass themselves off as a genuine product of the brand owner.

Endangered or threatened species

We do not allow content that:

  • promotes the sale of products obtained from endangered or threatened species. Examples: Sale of tigers, shark fins, elephant ivory, tiger skins, rhino horn, dolphin oil

Dangerous or derogatory content

We do not allow content that:

  • incites hatred against, promotes discrimination of, or disparages an individual or group on the basis of their race or ethnic origin, religion, disability, age, nationality, veteran status, sexual orientation, gender, gender identity, or other characteristic that is associated with systemic discrimination or marginalization. Examples: Promoting hate groups or hate group paraphernalia, encouraging others to believe that a person or group is inhuman, inferior, or worthy of being hated
  • harasses, intimidates, or bullies an individual or group of individuals. Examples: Singling out someone for abuse or harassment, suggesting a tragic event did not happen or that victims or their families are actors or complicit in a cover-up of the event
  • threatens or advocates for physical or mental harm to oneself or others. Examples: Content advocating suicide, anorexia, or other self-harm; promoting or advocating for harmful health or medical claims or practices; threatening someone with real-life harm or calling for the attack of another person; promoting, glorifying, or condoning violence against others; content made by or in support of terrorist groups or transnational drug trafficking organizations, or content that promotes terrorist acts, including recruitment, or that celebrates attacks by transnational drug trafficking or terrorist organizations
  • exploits others through extortion. Examples: Predatory removals, revenge porn, blackmail

Enabling dishonest behavior

We do not allow content that:

  • helps users to mislead others. Examples: Creating fake or false documents such as passports, diplomas, or accreditation; sale or distribution of term papers, paper-writing or exam-taking services; information or products for passing drug tests
  • promotes any form of hacking or cracking and/or provides users with instructions or equipment that tampers with or provides unauthorized access to software, servers, or websites. Examples: Pages or products that enable illegal access of cell phones and other communications or content delivery systems or devices; products or services that bypass copyright protection, including circumvention of digital rights management technologies; products that illegally descramble cable or satellite signals in order to get free services; pages that assist or enable users to download streaming videos if prohibited by the content provider

Misrepresentative content

We do not allow content that:

  • misrepresents, misstates, or conceals information about you, your content or the primary purpose of your web destination.
  • entices users to engage with content under false or unclear pretenses.
  • engages in “phishing” for users’ information.
  • promotes content, products, or services using false, dishonest, or deceptive claims. Example: “Get Rich Quick” schemes
  • makes claims that are demonstrably false and could significantly undermine participation or trust in an electoral or democratic process. Examples: information about public voting procedures, political candidate eligibility based on age or birthplace, election results, or census participation that contradicts official government records
  • falsely implies having an affiliation with, or endorsement by, another individual, organization, product, or service. Examples: Impersonating Google products, misusing company logos
  • deceives users through manipulated media related to politics, social issues, or matters of public concern.
  • is about politics, social issues, or matters of public concern directed at users in a country other than your own, if you misrepresent or conceal your country of origin or other material details about yourself.

Malicious or unwanted software

We do not allow content that:

  • contains malicious software or “malware” that may harm or gain unauthorized access to a computer, device, or network. Examples: Computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, rogue security software, and other malicious programs or apps
  • violates Google’s Unwanted Software policy. Examples: Failure to be transparent about the functionality that the software provides or the full implications of installing the software; failing to include Terms of Service or an End User License Agreement; bundling software or applications without the user’s knowledge; making system changes without the user’s consent; making it difficult for users to disable or uninstall the software; failing to properly use publicly available Google APIs when interacting with Google services or products

Sexually explicit content

We do not allow content that:

  • includes graphic sexual text, image, audio, video, or games. Examples: Sex acts such as genital, anal, and/or oral sex; masturbation; cartoon porn or hentai; graphic nudity
  • contains non-consensual sexual themes, whether simulated or real. Examples: Rape, incest, bestiality, necrophilia, snuff, lolita or teen-themed pornography, underage dating
  • may be interpreted as promoting a sexual act in exchange for compensation. Examples: Prostitution, companionship and escort services, intimate massage, cuddling sites

Mail order brides

We do not allow content that:

  • facilitates marriage to a foreigner. Examples: Mail order brides, international marriage brokers, romance tours

Adult themes in family content

We do not allow content that:

  • is made to appear appropriate for a family audience, but contains adult themes including sex, violence, or other depictions of children or popular children’s characters that are unsuitable for a general audience.

Child sexual abuse material and pedophilia

We do not allow content that:

  • promotes the sexual exploitation of minors. Examples: Child sexual abuse imagery or other content that visually depicts, encourages, or promotes sexual attraction by adults toward minors

Google absolutely prohibits monetization of content related to child sexual abuse imagery or pedophilia. Google has always been at the forefront in the fight against online child abuse, and an avid supporter of family safety online. Under United States federal law, child sexual abuse imagery is defined as visual depictions of minors (i.e., under 18) engaged in a sexual act such as intercourse, oral sex, or masturbation as well as the lascivious depictions of the genitals (covered or uncovered). This definition extends to photographs, videos, cartoons, drawings, paintings, and sculptures. The image can involve a real child; a computer-generated, morphed, composite or otherwise altered image that appears to be a child (think “Photoshop”). This also includes soliciting minors for sexual acts, which is also known as “enticement.” Pedophilia is any content or behavior (images, texts, videos, etc.) that depicts, encourages, or promotes sexual attraction by adults toward minors (i.e., under 18).

Privacy related policies

Privacy disclosures

Publishers must:

  • have and abide by a privacy policy that clearly discloses any data collection, sharing and usage that takes place on any site, app, email publication or other property as a consequence of your use of Google products. The privacy policy must disclose to users that third parties may be placing and reading cookies on your users’ browsers, or using web beacons to collect information as a result of ad serving on your website. To comply with this disclosure obligation with respect to Google’s use of data, you have the option to display a prominent link to How Google uses data when you use our partners’ sites or apps.