For brevity’s sake, I’ll sum up the important Privacy Policy parts:

  • All I collect on this website are anonymous browsing data from Google Analytics such as your browsers or country, and, when you use my contact form to write to me, your name and email address.
  • I do not share your personal information with any third party, but I might be compelled to by local laws if you did something illegal and my website was somehow the only way to find you.
  • I will delete your personal info from my mailbox and server if you ask me to. You have a right to know what information I’ve collected about you. I’ll never send you any newsletter or commercial email without having explicitly collected your consent first.

Who we are

Our website address is: http://jessicaconoley.com.

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

We may ask for personal information — when you contact us — which may include one or more of the following:

  • Name
  • Email

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

Who we share your data with

We may disclose personal information to:

  • a parent, subsidiary, or affiliate of our company;
  • third-party service providers for the purpose of enabling them to provide their services, including (without limitation) IT service providers, data storage, hosting and server providers, analytics, error loggers, debt collectors, maintenance or problem-solving providers, marketing providers, professional advisors, and payment systems operators;
  • our employees, contractors, and/or related entities; our existing or potential agents or business partners;
  • credit reporting agencies, courts, tribunals, and regulatory authorities, in the event you fail to pay for goods or services we have provided to you;
  • courts, tribunals, regulatory authorities, and law enforcement officers, as required by law, in connection with any actual or prospective legal proceedings, or in order to establish, exercise, or defend our legal rights; third parties, including agents or sub-contractors, who assist us in providing information, products, services, or direct marketing to you;
  • third parties to collect and process data;
  • an entity that buys, or to which we transfer all or substantially all of our assets and business.

Third parties we currently use include:

  • Google Analytics
  • Mailchimp
  • Calendly

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Contact Us

For any questions or concerns regarding your privacy, you may contact us using the following details:

Lelsh, LLC

12742 W. 110th Ter, Overland Park, KS 66210, USA

jessica [at] jessicaconoley.com

Limits of Our Policy

Our website may link to external sites that are not operated by us. Please be aware that we have no control over the content and policies of those sites, and cannot accept responsibility or liability for their respective privacy practices.

 

Summary of Terms of Use:

  • The contents of this website are provided as-is. You browse at your own risk, and I cannot be held responsible for any harm that would somehow come to you or your computer while doing so.
  • I do my best to keep the information on this website up-to-date, but you can’t sue me even if you find some inaccurate info in here.
  • Please don’t use this website to do anything illegal, because I won’t take any responsibility for it.
 

These Terms of Service govern your use of the website located at https://jessicaconoley.com and any related services provided by jessicaconoley.com.

By accessing https://jessicaconoley.com, you agree to abide by these Terms of Service and to comply with all applicable laws and regulations. If you do not agree with these Terms of Service, you are prohibited from using or accessing this website or using any other services provided by jessicaconoley.com.

We, jessicaconoley.com, reserve the right to review and amend any of these Terms of Service at our sole discretion. Upon doing so, we will update this page. Any changes to these Terms of Service will take effect immediately from the date of publication.

These Terms of Service were last updated on 21 December 2022.

Limitations of Use

By using this website, you warrant on behalf of yourself, your users, and other parties you represent that you will not:

  • modify, copy, prepare derivative works of, decompile, or reverse engineer any materials and software contained on this website;
  • remove any copyright or other proprietary notations from any materials and software on this website;
  • transfer the materials to another person or “mirror” the materials on any other server;
  • knowingly or negligently use this website or any of its associated services in a way that abuses or disrupts our networks or any other service jessicaconoley.com provides;
  • use this website or its associated services to transmit or publish any harassing, indecent, obscene, fraudulent, or unlawful material;
  • use this website or its associated services in violation of any applicable laws or regulations;
  • use this website in conjunction with sending unauthorized advertising or spam;
  • harvest, collect, or gather user data without the user’s consent; or
  • use this website or its associated services in such a way that may infringe the privacy, intellectual property rights, or other rights of third parties.

Intellectual Property

The intellectual property in the materials contained in this website are owned by or licensed to jessicaconoley.com and are protected by applicable copyright and trademark law. We grant our users permission to download one copy of the materials for personal, non-commercial transitory use.

This constitutes the grant of a license, not a transfer of title. This license shall automatically terminate if you violate any of these restrictions or the Terms of Service, and may be terminated by jessicaconoley.com at any time.

Liability

Our website and the materials on our website are provided on an ‘as is’ basis. To the extent permitted by law, jessicaconoley.com makes no warranties, expressed or implied, and hereby disclaims and negates all other warranties including, without limitation, implied warranties or conditions of merchantability, fitness for a particular purpose, or non-infringement of intellectual property, or other violation of rights.

In no event shall jessicaconoley.com or its suppliers be liable for any consequential loss suffered or incurred by you or any third party arising from the use or inability to use this website or the materials on this website, even if jessicaconoley.com or an authorized representative has been notified, orally or in writing, of the possibility of such damage.

In the context of this agreement, “consequential loss” includes any consequential loss, indirect loss, real or anticipated loss of profit, loss of benefit, loss of revenue, loss of business, loss of goodwill, loss of opportunity, loss of savings, loss of reputation, loss of use and/or loss or corruption of data, whether under statute, contract, equity, tort (including negligence), indemnity, or otherwise.

Because some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages, these limitations may not apply to you.

Accuracy of Materials

The materials appearing on our website are not comprehensive and are for general information purposes only. jessicaconoley.com does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on this website, or otherwise relating to such materials or on any resources linked to this website.

Links

jessicaconoley.com has not reviewed all of the sites linked to its website and is not responsible for the contents of any such linked site. The inclusion of any link does not imply endorsement, approval, or control by jessicaconoley.com of the site. Use of any such linked site is at your own risk and we strongly advise you make your own investigations with respect to the suitability of those sites.

Right to Terminate

We may suspend or terminate your right to use our website and terminate these Terms of Service immediately upon written notice to you for any breach of these Terms of Service.

Severance

Any term of these Terms of Service which is wholly or partially void or unenforceable is severed to the extent that it is void or unenforceable. The validity of the remainder of these Terms of Service is not affected.

Governing Law

These Terms of Service are governed by and construed in accordance with the laws of the United States of America. You irrevocably submit to the exclusive jurisdiction of the courts in that State or location.

Acceptable Use Policy

This acceptable use policy covers the products, services, and technologies (collectively referred to as the “Products”) provided by jessicaconoley.com under any ongoing agreement. It’s designed to protect us, our customers, and the general Internet community from unethical, irresponsible, and illegal activity.

jessicaconoley.com customers found engaging in activities prohibited by this acceptable use policy can be liable for service suspension and account termination. In extreme cases, we may be legally obliged to report such customers to the relevant authorities.

This policy was last reviewed on 21 December 2022.

Fair use

We provide our facilities with the assumption your use will be “business as usual”, as per our offer schedule. If your use is considered to be excessive, then additional fees may be charged, or capacity may be restricted.

We are opposed to all forms of abuse, discrimination, rights infringement, and/or any action that harms or disadvantages any group, individual, or resource. We expect our customers and, where applicable, their users (“end-users”) to likewise engage our Products with similar intent.

Customer accountability

We regard our customers as being responsible for their own actions as well as for the actions of anyone using our Products with the customer’s permission. This responsibility also applies to anyone using our Products on an unauthorized basis as a result of the customer’s failure to put in place reasonable security measures.

By accepting Products from us, our customers agree to ensure adherence to this policy on behalf of anyone using the Products as their end users. Complaints regarding the actions of customers or their end-users will be forwarded to the nominated contact for the account in question.

If a customer — or their end-user or anyone using our Products as a result of the customer — violates our acceptable use policy, we reserve the right to terminate any Products associated with the offending account or the account itself or take any remedial or preventative action we deem appropriate, without notice. To the extent permitted by law, no credit will be available for interruptions of service resulting from any violation of our acceptable use policy.

Prohibited activity

Copyright infringement and access to unauthorized material

Our Products must not be used to transmit, distribute or store any material in violation of any applicable law. This includes but isn’t limited to:

any material protected by copyright, trademark, trade secret, or other intellectual property right used without proper authorization, and

any material that is obscene, defamatory, constitutes an illegal threat or violates export control laws.

The customer is solely responsible for all material they input, upload, disseminate, transmit, create or publish through or on our Products, and for obtaining legal permission to use any works included in such material.

SPAM and unauthorized message activity

Our Products must not be used for the purpose of sending unsolicited bulk or commercial messages in violation of the laws and regulations applicable to your jurisdiction (“spam”). This includes but isn’t limited to sending spam, soliciting customers from spam sent from other service providers, and collecting replies to spam sent from other service providers.

Our Products must not be used for the purpose of running unconfirmed mailing lists or telephone number lists (“messaging lists”). This includes but isn’t limited to subscribing email addresses or telephone numbers to any messaging list without the permission of the email address or telephone number owner, and storing any email addresses or telephone numbers subscribed in this way. All messaging lists run on or hosted by our Products must be “confirmed opt-in”. Verification of the address or telephone number owner’s express permission must be available for the lifespan of the messaging list.

We prohibit the use of email lists, telephone number lists or databases purchased from third parties intended for spam or unconfirmed messaging list purposes on our Products.

This spam and unauthorized message activity policy applies to messages sent using our Products, or to messages sent from any network by the customer or any person on the customer’s behalf, that directly or indirectly refer the recipient to a site hosted via our Products.

Unethical, exploitative, and malicious activity

Our Products must not be used for the purpose of advertising, transmitting, or otherwise making available any software, program, product, or service designed to violate this acceptable use policy, or the acceptable use policy of other service providers. This includes but isn’t limited to facilitating the means to send spam and the initiation of network sniffing, pinging, packet spoofing, flooding, mail-bombing, and denial-of-service attacks.

Our Products must not be used to access any account or electronic resource where the group or individual attempting to gain access does not own or is not authorized to access the resource (e.g. “hacking”, “cracking”, “phreaking”, etc.).

Our Products must not be used for the purpose of intentionally or recklessly introducing viruses or malicious code into our Products and systems.

Our Products must not be used for purposely engaging in activities designed to harass another group or individual. Our definition of harassment includes but is not limited to denial-of-service attacks, hate-speech, advocacy of racial or ethnic intolerance, and any activity intended to threaten, abuse, infringe upon the rights of, or discriminate against any group or individual.

Other activities considered unethical, exploitative, and malicious include:

Obtaining (or attempting to obtain) services from us with the intent to avoid payment;

Using our facilities to obtain (or attempt to obtain) services from another provider with the intent to avoid payment;

The unauthorized access, alteration, or destruction (or any attempt thereof) of any information about our customers or end-users, by any means or device;

Using our facilities to interfere with the use of our facilities and network by other customers or authorized individuals;

Publishing or transmitting any content of links that incite violence, depict a violent act, depict child pornography, or threaten anyone’s health and safety;

Any act or omission in violation of consumer protection laws and regulations;

Any violation of a person’s privacy.

Our Products may not be used by any person or entity, which is involved with or suspected of involvement in activities or causes relating to illegal gambling; terrorism; narcotics trafficking; arms trafficking or the proliferation, development, design, manufacture, production, stockpiling, or use of nuclear, chemical or biological weapons, weapons of mass destruction, or missiles; in each case including any affiliation with others whatsoever who support the above such activities or causes.

Unauthorized use of jessicaconoley.com property

We prohibit the impersonation of jessicaconoley.com, the representation of a significant business relationship with jessicaconoley.com, or ownership of any jessicaconoley.com property (including our Products and brand) for the purpose of fraudulently gaining service, custom, patronage, or user trust.

About this policy

This policy outlines a non-exclusive list of activities and intent we deem unacceptable and incompatible with our brand.

We reserve the right to modify this policy at any time by publishing the revised version on our website. The revised version will be effective from the earlier of:

the date the customer uses our Products after we publish the revised version on our website; or

30 days after we publish the revised version on our website.