What personal data do we collect and why?
Built-in content from other sites
Articles on this site may contain embedded content (eg videos, images, articles, etc.). Built-in content from other sites behaves in exactly the same way as if the visitor visited the other site.
We use the "Google Analytics" platform to analyze and optimize traffic to our website. This platform gives us aggregate statistics on traffic to our website and traffic sources, as well as information that helps analyze how you visited our site. The data created by these cookies regarding the use of our website is anonymous (using the appropriate settings).
Who do we share your data with?
How long do we keep your ties?
If you leave a comment, the comment and its metadata are kept indefinite. This is done so that we can automatically recognize and approve the comments that follow, instead of keeping them in a queue.
For users who register on our website, we also store personal data that they enter in their user profile. All users can view, edit or delete their personal data at any time (except to be able to change their username). Managers of this site may also view and edit this information.
What rights do you have in your data?
If you have an account on this site or have left comments, you may request that you obtain an extracted file of personal data that we hold about you, including any data you have provided to us. You can also request that we delete the personal data we hold about you. This does not include data that we are required to comply with for administrative, legal or security reasons.
Where will your data be sent?
Visitor comments may be checked via an automated unwanted mail system.
How we protect your data
SERVRSS has taken and implemented appropriate technical and organizational security measures to ensure the protection and confidentiality of your personal data. We use various security techniques such as secure servers, encryption and protection programs, etc.
What procedures have we adopted for data breach?
In case of violation, the following methodology is followed: data on the violation are collected, which in the second year are handed over to the competent authorities, the violation is stopped by technical means, the authorities and the parties may be informed that they may have been affected by the violation. range of infringement, so that it is properly reported to any party that has a legitimate interest. It also provides all the facilities required by law to investigate breaches of communications and personal data.
From which third parties do we receive data?
We do not receive information about our visitors from third parties.
What automatic decision making and / or profile creation we do with user data
To protect our website, we use multiple security measures that make automated decisions about the nature of each visit in order to secure the programming code and the integrity of our database. These systems may block your access to our website. In the event that this happens, you can contact us to remove the blockage.
Regulatory Publication Requirements
Personal Data may be disclosed to third parties if requested in accordance with applicable law, court decision or governmental act or if such disclosure is necessary to support any criminal or other legal investigation in East Africa or abroad.