• Skip to main content
  • Skip to primary sidebar

This view of service management...

On the origin and the descent of managing services. We put meat on the bones.

  • Kanban Software
  • Services
    • Kanban Software Solutions
    • Consulting & Coaching
    • Training and Seminars
  • Posts
  • Events
    • Events – Agenda View
    • Events – Calendar View
  • Publications
    • Our Publications
    • Notable Publications
    • Quotes
  • About us

Personal Data FAQ

The information provided on this page represents part of our official data protection and security policies. For additional information, please visit our description of rights and duties.

Who are we?

We are a service consultancy and training organization. We provide information and service both on line and face to face.

Do we record personal data?

Yes.

Do we record sensitive personal data?

No.
Sensitive personal data, such as your race, your religion, your medical characteristics, or your political beliefs, are not recorded.

What personal data do we record?

The exact personal data recorded depends on the type of service used or the type of contact made. Please see the matrix below for the details.

personal data types matrix

Mandatory: User must enter these data
Optional: User may enter these data, or they may be added from external sources
System: The system automatically records these data
Not recorded: These data are not recorded or are completely ignored

What are the sources of the personal data recorded?

The personal data comes from three sources:

  • the data that you, yourself, provide
  • the data that is automatically recorded by the information system (such as IP addresses)
  • the data about your visits to our site, such as what pages you visit, how long you stay there, from which pages you are coming to which pages you are going; and how you interact with a page, such as whether you purchase a service from us or not
  • the data about you that is available on public sources or from sources where you have already given permission to make the data visible.

The principal sources of data are LinkedIn and Twitter. The data visible there is under the control of the user.

What do we do with your personal data?

We use your personal data to send you information to which you have subscribed and additional information about our services. We may use that data to segment our communications, such as by language or by geographical region, to avoid sending you irrelevant communications. We use your credentials for controlling access to our services. We may ask you for further information about our services to adapt them to your needs. If we find that our services are being used in a way that does not conform to our policies, we may use personal data in an attempt to identify the perpetrators of that misuse and correct any dysfunctions.

Your interactions with our sites may trigger other communications to you, such as a reminder that you have left a service in a shopping cart.

How can you get a copy of whatever data is recorded?

Send a request by email to the email address in the footer of this page. We may ask for further information to ensure your identity.

How can you be forgotten?

Send a request by email to the email address in the footer of this page. You may be asked for further proof of your identity.

How do you correct errors in personal data that we store?

Any personal data that you have entered yourself, such as when subscribing to our mailing list, you may modify yourself at any time. A link for making changes is provided in the footer of every email sent via this mailing list. You may be asked to provide additional information to ensure your identity.

You may request that other data be changed by sending your request to the email address in the footer of this page.

How is the personal data used?

Your personal data is used in various ways:

  • As connection credentials to our web sites
  • To send you messages, if you have subscribed to our mailing list
  • To submit payment information to a third party service, such as PayPal or Stripe, in case you purchase a service
  • To segment the subscribers on the mailing list to avoid sending you inappropriate messages, such as segmentation by preferred language or by country of residence
  • To offer you benefits, such as discounts on services, based on your interactions with our services
  • To optimize our way of presenting information, such as via A/B tests or counts of visits to our web site pages.
With which third parties do we share your personal data?

Your personal data may be visible to the following third parties:

  • Payment gateways (PayPal or Stripe)
  • Mailing providers (MailChimp)
  • Web tracking services (Google)
  • Web site hosting (Infomaniak)

Please refer to their respective sites for additional information on how they handle personal data.

We do not share any personal data with any other third parties.

If, however, at some time in the future we plan to share your data in this way, it will only be following your explicit permission to do so.

What personal data do we not store?

In addition to sensitive personal data, we do not store any financial information, such as credit card numbers. We neither seek nor collect nor store any government identification numbers. We make no attempt to identify site visitors based on such data as the browser or client used to connect with our web sites. Thus, while the IP addresses of connections to our web sites are logged, we make no attempt to correlate those addresses with any persons. They remain anonymous.

How do we ensure the security of your information?

Access to your personal information is limited to our personnel and to whoever controls the email address under which you are identified. You are responsible for controlling access to that email address.

Note that this web site is excluded from the Google FLoC system.

If we have any reason to believe that a third party is attempting to use your email address without your consent, we may ask for additional information to help confirm you identity.

In technical terms, access to our web site and to our mailing list is controlled by two factor authentication. All communications to our web site and our third party services are made using https. Access to our web site is controlled using an application firewall and state of the art web server security modules. Data is backed up regularly and stored using the same controls as the production data.

We choose our partners with whom your personal information might be shared based on their reputations for compliance with regulatory requirements and their approach to maintaining the security of the information to which they have access. Beyond the diligence with which we select partners, we do not take responsibility for any failures that might occur

Summary
Personal Information FAQ
Article Name
Personal Information FAQ
Description
Information about how we handle your personal information and compliance with regulatory authorities.
Author
Robert S. Falkowitz
Publisher Name
Concentric Circle Consulting
Publisher Logo
Concentric Circle Consulting

Primary Sidebar

Kanban eLearning

Kanban training online

Recent Posts

  • Verbs, nouns and kanban board structure
  • The role of the problem manager
  • The Three Indicators

Tag Cloud

incident process definition service management tools flow efficiency manifesto for software development process ITIL agile rigidity flow value stream Incident Management leadership service request kanban board priority statistical control chart kanban context switching bias risk waste process metrics cause lean management manifesto knowledge management impact service manager problem Cost of Delay lean automation ITSM tools resource liquidity change management incident management tools histogram knowledge work
  • Kanban Software
  • Services
  • Posts
  • Events
  • Publications
  • Subscribe
  • Rights & Duties
  • Personal Data

© 2014–2023 Concentric Circle Consulting · All Rights Reserved.
Concentric Circle Consulting Address
Log in

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}