{"id":1135,"date":"2023-01-02T08:33:15","date_gmt":"2023-01-02T13:33:15","guid":{"rendered":"https:\/\/www.amp.legal\/blog\/?page_id=1135"},"modified":"2023-01-02T09:04:49","modified_gmt":"2023-01-02T14:04:49","slug":"privacy-policy","status":"publish","type":"page","link":"https:\/\/www.amp.legal\/blog\/privacy-policy\/","title":{"rendered":"Privacy Policy"},"content":{"rendered":"\n<p>Last updated: 01\/02\/2023<\/p>\n\n\n\n<h2>Who we are<\/h2>\n\n\n\n<p>The Cyber Law Blog (&#8220;blog&#8221; or &#8220;website&#8221;) is located at: <a href=\"https:\/\/www.amp.legal\/blog\">https:\/\/www.amp.legal\/blog<\/a>. The blog is a free resource that covers interesting news in the areas of technology law. The articles on this blog examine legal developments that apply to the state of Florida in the United States of America.<\/p>\n\n\n\n<p>The protection of your privacy is important to us. Please read the following policy for information regarding how we collect and share your personal data.<\/p>\n\n\n\n<h2>What data we collect and why we collect it<\/h2>\n\n\n\n<p>We collect personal data for the following reasons:<\/p>\n\n\n\n<h3>Media<\/h3>\n\n\n\n<p>If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.<\/p>\n\n\n\n<h3>Contact form<\/h3>\n\n\n\n<p>You may access the contact form on the Alice M. Porch, P.A. d\/b\/a AMP Legal website (&#8220;AMP.legal&#8221;). The types of personal information collected on the form are name, address, email address, phone number, payment information (when applicable), etc. We also collect non-personal information that web browsers and servers commonly make available to identify a user, such as the IP Address, browser type, language preference, referring site, and the date and time of each user request.<\/p>\n\n\n\n<h3>Comments<\/h3>\n\n\n\n<p>When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor\u2019s IP address and browser user agent string to help spam detection.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/automattic.com\/privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Gravatar<\/a><\/strong> &#8211; An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https:\/\/automattic.com\/privacy\/. After approval of your comment, your profile picture is visible to the public in the context of your comment.<\/p>\n\n\n\n<h3>Cookies<\/h3>\n\n\n\n<p>If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.<\/p>\n\n\n\n<p>If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.<\/p>\n\n\n\n<p>When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select &#8220;Remember Me&#8221;, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.<\/p>\n\n\n\n<p>If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.<\/p>\n\n\n\n<h3>Embedded content from other websites<\/h3>\n\n\n\n<p>Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.<\/p>\n\n\n\n<p>These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.<\/p>\n\n\n\n<h3>Third party service providers<\/h3>\n\n\n\n<p><strong><a href=\"https:\/\/support.heateor.com\/gdpr-and-our-plugins\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Sassy Social Share<\/a><\/strong> &#8211; We use the Sassy Social Share plugin to allow users to share our articles. <\/p>\n\n\n\n<h3><strong>Third party links <\/strong><\/h3>\n\n\n\n<p>Our blog includes links to third party websites. We cannot control how third parties may use personal information that you disclose to them or is automatically collected. You should carefully review the privacy policy of any third party website before using it or disclosing your personal information to its provider.<\/p>\n\n\n\n<h3>Analytics<\/h3>\n\n\n\n<p>Our website uses cookies to collect data for Google Analytics. For more information about the storing and accessing of cookies on your device, visit:&nbsp;<br><a rel=\"noreferrer noopener\" href=\"https:\/\/policies.google.com\/technologies\/partner-sites\" target=\"_blank\">https:\/\/policies.google.com\/technologies\/partner-sites<\/a>.<\/p>\n\n\n\n<h2>Who we share your data with<\/h2>\n\n\n\n<p>We automatically collect user data, such as cookies, to operate our website. We do not sell any of your information.<\/p>\n\n\n\n<h3><strong>Do Not Track<\/strong><\/h3>\n\n\n\n<p>We do not respond to Do Not Track (\u201cDNT\u201d) signals in web browsers because no DNT standard has been adopted. The DNT concept has been promoted by regulatory authorities, including the USA\u2019s Federal Trade Commission (\u201cFTC\u201d), to develop and implement a mechanism for allowing Internet users to control the tracking of their online activities across websites. Various browsers offer a DNT option that relies on a technology known as a DNT header that sends a signal to websites about the user&#8217;s DNT preference. You can usually access your browser&#8217;s DNT option in your browser&#8217;s settings.<\/p>\n\n\n\n<h2>How long we retain your data<\/h2>\n\n\n\n<p>If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.<\/p>\n\n\n\n<p>For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.<\/p>\n\n\n\n<h2>What rights you have over your data<\/h2>\n\n\n\n<p>If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.<\/p>\n\n\n\n<h2>Where we send your data<\/h2>\n\n\n\n<p>Visitor comments may be checked through an automated spam detection service.<\/p>\n\n\n\n<h3><strong>External Data Storage\nSites<\/strong> <\/h3>\n\n\n\n<p>We may store your data on servers provided by third party\nhosting vendors with whom we have contracted. <\/p>\n\n\n\n<h2>Your contact information<\/h2>\n\n\n\n<p>We only collect your personal information when you send it to us, such as using the contact form. All data that is collected automatically is used for operating and securing the website.<\/p>\n\n\n\n<h2>Additional information<\/h2>\n\n\n\n<h3>How we protect your data<\/h3>\n\n\n\n<p>We monitor the website to keep it secure and prevent unauthorized access.<\/p>\n\n\n\n<h3>What data breach procedures we have in place<\/h3>\n\n\n\n<p>We follow the breach notification requirements under Florida law and any other applicable laws.<\/p>\n\n\n\n<h3>What third parties we receive data from<\/h3>\n\n\n\n<p>You may access third party web resources directly from our website. This Privacy Policy does not apply when you access third party web resources. We cannot control how third parties may use personal information that you disclose to them or is automatically collected. You should carefully review the privacy policy of any third party web resource before using it or disclosing your personal information to its provider.<\/p>\n\n\n\n<h3>What automated decision making and\/or profiling we do with user data<\/h3>\n\n\n\n<p>You have the ability to accept or decline cookies. Most Web browsers automatically accept cookies, but you can usually modify your browser setting to decline cookies if you prefer. If you choose to decline cookies, you may not be able to fully experience the interactive features of our services or websites you visit. <\/p>\n\n\n\n<h2><strong>Privacy rights<\/strong><\/h2>\n\n\n\n<p>We would like to make sure you are fully aware of your data protection rights. Every user has the following rights:<\/p>\n\n\n\n<ul><li><strong>The right to know<\/strong> \u2013 You have the right to know about the personal information a business collects about you and how it is used and shared.<\/li><li><strong>The right to delete<\/strong> \u2013 You have the right to delete personal information collected from you (with some exceptions).<\/li><li><strong>The right to opt-out<\/strong> \u2013 You have the right to opt-out of the sale of your personal information.<\/li><li><strong>The right to non-discrimination<\/strong> \u2013 You have the right to non-discrimination for exercising your privacy rights.<\/li><li><strong>The right to access<\/strong> \u2013 You have the right to request copies of your personal data. We may charge you a small fee for this service.<\/li><li><strong>The right to rectification<\/strong> \u2013 You have the right to request that we correct any information you believe is inaccurate. You also have the right to request us to complete information you believe is incomplete.<\/li><li><strong>The right to erasure (the right to be forgotten)<\/strong> \u2013 You have the right to request that we erase your personal data, under certain conditions.<\/li><li><strong>The right to restrict processing<\/strong> \u2013 You have the right to request that we restrict the processing of your personal data, under certain conditions.<\/li><li><strong>The right to object to processing<\/strong> \u2013  You have the right to object to our processing of your personal data, under certain conditions.<\/li><li><strong>The right to data portability<\/strong> \u2013 You have the right to request that we transfer the data that we have collected to another organization, or directly to you, under certain  conditions.<\/li><li><strong>The right not to be subject to a decision that is based solely on automated processing<\/strong> \u2013  You have the\u00a0right not to be subject to a decision by us  that is based solely on automated processing. However, there are some\u00a0exceptions to this rule, such as when you give your explicit consent to the automated decision.<\/li><li><strong>The right to restrict use of sensitive personal information<\/strong> \u2013 You may request to limit the use and disclosure of your sensitive data for specific secondary purposes, including disclosure to third parties. <\/li><li><strong>The right to lodge a complaint with a supervisory authority or other relevant authority.<\/strong><\/li><\/ul>\n\n\n\n<p>If we are relying on\nyour consent to process your personal information, you have the right to\nwithdraw your consent at any time. Please note, however, that this will not\naffect the lawfulness of the processing before its withdrawal, nor will it\naffect the processing of your personal information conducted in reliance on\nlawful processing grounds other than consent.<\/p>\n\n\n\n<p>If you make a\nrequest, we have one month to respond to you. If you would like to exercise any\nof these rights, please contact us.<\/p>\n\n\n\n<h3><strong>Right to deletion<\/strong> <\/h3>\n\n\n\n<p>Subject to certain exceptions set out below, on receipt of a\nverifiable request from you, we will: <\/p>\n\n\n\n<ul><li>Delete your personal information from our records; and <\/li><li>Direct any service providers to delete your personal information from their records. <\/li><\/ul>\n\n\n\n<p>Please note that we may not be able to comply with requests\nto delete your personal information if it is necessary to: <\/p>\n\n\n\n<ul><li>Complete the transaction for which the personal information was collected, fulfill the terms of a written warranty or product recall conducted in accordance with federal law, provide a good or service requested by you, or reasonably anticipated within the context of our ongoing business relationship with you, or otherwise perform a contract between you and us; <\/li><li>Detect security incidents, protect against malicious, deceptive, fraudulent, or illegal activity; or prosecute those responsible for that activity; <\/li><li>Debug to identify and repair errors that impair existing intended functionality; <\/li><li>Exercise free speech, ensure the right of another consumer to exercise his or her right of free speech, or exercise another right provided for by law; <\/li><li>Comply with the California Electronic Communications Privacy Act; <\/li><li>Engage in public or peer-reviewed scientific, historical, or statistical research in the public interest that adheres to all other applicable ethics and privacy laws, when our deletion of the information is likely to render impossible or seriously impair the achievement of such research, provided we have obtained your informed consent; <\/li><li>Enable solely internal uses that are reasonably aligned with your expectations based on your relationship with us; <\/li><li>Comply with an existing legal obligation; or <\/li><li>Otherwise use your personal information, internally, in a lawful manner that is compatible with the context in which you provided the information. <\/li><\/ul>\n\n\n\n<h2><strong>Children under thirteen<\/strong> <\/h2>\n\n\n\n<p>We do not knowingly collect personally identifiable information from children under the age of thirteen. If you are under the age of thirteen, you must ask your parent or guardian for permission to use this website.<\/p>\n\n\n\n<h2>Contact information<\/h2>\n\n\n\n<p>If you have any questions, you may contact us at: manager@amp.legal.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last updated: 01\/02\/2023 Who we are The Cyber Law Blog (&#8220;blog&#8221; or &#8220;website&#8221;) is located at: https:\/\/www.amp.legal\/blog. The blog is a free resource that covers interesting news in the areas of technology law. The articles [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Privacy Policy - Cyber Law Blog<\/title>\n<meta name=\"description\" content=\"The Cyber Law Blog is a free resource to explore new developments in technology law. The protection of your privacy is important to us.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.amp.legal\/blog\/privacy-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy Policy - Cyber Law Blog\" \/>\n<meta property=\"og:description\" content=\"The Cyber Law Blog is a free resource to explore new developments in technology law. The protection of your privacy is important to us.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.amp.legal\/blog\/privacy-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Law Blog\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-02T14:04:49+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.amp.legal\/blog\/privacy-policy\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/privacy-policy\/\",\"name\":\"Privacy Policy - Cyber Law Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\"},\"datePublished\":\"2023-01-02T13:33:15+00:00\",\"dateModified\":\"2023-01-02T14:04:49+00:00\",\"description\":\"The Cyber Law Blog is a free resource to explore new developments in technology law. The protection of your privacy is important to us.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/privacy-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.amp.legal\/blog\/privacy-policy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.amp.legal\/blog\/privacy-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.amp.legal\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#website\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"name\":\"Cyber Law Blog\",\"description\":\"Exploring technology law in cyberspace\",\"publisher\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.amp.legal\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#organization\",\"name\":\"Alice M. Porch, P.A.\",\"url\":\"https:\/\/www.amp.legal\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"contentUrl\":\"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png\",\"width\":1104,\"height\":1114,\"caption\":\"Alice M. Porch, P.A.\"},\"image\":{\"@id\":\"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy Policy - Cyber Law Blog","description":"The Cyber Law Blog is a free resource to explore new developments in technology law. The protection of your privacy is important to us.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.amp.legal\/blog\/privacy-policy\/","og_locale":"en_US","og_type":"article","og_title":"Privacy Policy - Cyber Law Blog","og_description":"The Cyber Law Blog is a free resource to explore new developments in technology law. The protection of your privacy is important to us.","og_url":"https:\/\/www.amp.legal\/blog\/privacy-policy\/","og_site_name":"Cyber Law Blog","article_modified_time":"2023-01-02T14:04:49+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.amp.legal\/blog\/privacy-policy\/","url":"https:\/\/www.amp.legal\/blog\/privacy-policy\/","name":"Privacy Policy - Cyber Law Blog","isPartOf":{"@id":"https:\/\/www.amp.legal\/blog\/#website"},"datePublished":"2023-01-02T13:33:15+00:00","dateModified":"2023-01-02T14:04:49+00:00","description":"The Cyber Law Blog is a free resource to explore new developments in technology law. The protection of your privacy is important to us.","breadcrumb":{"@id":"https:\/\/www.amp.legal\/blog\/privacy-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.amp.legal\/blog\/privacy-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.amp.legal\/blog\/privacy-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.amp.legal\/blog\/"},{"@type":"ListItem","position":2,"name":"Privacy Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.amp.legal\/blog\/#website","url":"https:\/\/www.amp.legal\/blog\/","name":"Cyber Law Blog","description":"Exploring technology law in cyberspace","publisher":{"@id":"https:\/\/www.amp.legal\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.amp.legal\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.amp.legal\/blog\/#organization","name":"Alice M. Porch, P.A.","url":"https:\/\/www.amp.legal\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","contentUrl":"https:\/\/www.amp.legal\/blog\/wp-content\/uploads\/2017\/08\/AMP-Logo.png","width":1104,"height":1114,"caption":"Alice M. Porch, P.A."},"image":{"@id":"https:\/\/www.amp.legal\/blog\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/pages\/1135"}],"collection":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/comments?post=1135"}],"version-history":[{"count":10,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/pages\/1135\/revisions"}],"predecessor-version":[{"id":1145,"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/pages\/1135\/revisions\/1145"}],"wp:attachment":[{"href":"https:\/\/www.amp.legal\/blog\/wp-json\/wp\/v2\/media?parent=1135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}