Privacy Policy 

 

Who We Are
Our website address is: http://brandmarketers.com



Brand Marketers, Inc (“we”, “our”, or “us”) is committed to protecting your privacy. This Privacy Policy describes how we collect, use, disclose, and protect your information when you visit our website,  www.brandmarketers.com(“Website”), or interact with us in any other manner.

Information We Collect

We may collect the following types of information from you:

Personal Information: When you contact us through our Website, phone, or email, we may collect personal information that you provide, including your full name, phone number, email address, and mailing address.

 

Comments

When visitors leave comments, we collect the data shown in the comment form, as well as the visitor’s IP address and browser user agent string to help detect spam.
An anonymized hash of your email address may be provided to the Gravatar service to check if you’re using it. Their privacy policy: https://automattic.com/privacy/. After approval, your profile image may be publicly visible next to your comment.

Media
If you upload images, avoid including embedded location data (EXIF GPS). Visitors can extract this data from images on the site.

Contact Forms
Data submitted through contact forms is retained for customer service purposes and is never used for marketing unless explicitly requested.

Cookies

  • Leaving a comment: May opt-in to saving your name, email, and site in cookies for convenience. These last for one year.

  • Visiting the login page: A temporary cookie checks browser compatibility and is discarded when you close your browser.

  • Logging in: Sets login cookies (2 days) and display preference cookies (1 year). “Remember Me” extends login to 2 weeks. Logout removes login cookies.

  • Editing or publishing an article: An additional cookie (expires in 1 day) stores the article’s post ID.

Embedded Content from Other Websites
Articles may include embedded content (e.g. videos, articles). This content behaves as if you visited the original site, which may collect data, use cookies, and track your interactions, including if you’re logged in on that site.


Who We Share Your Data With
No one, ever.


How Long We Retain Your Data

  • Comments: Retained indefinitely, including metadata, for automatic approval of follow-ups.

  • Registered users: Personal information in profiles is stored indefinitely. Users can view, edit, or delete their data anytime (username cannot be changed). Admins can also edit this data.


Your Data Rights
If you have an account or have left comments, you may request an exported file of your personal data or request its deletion. This excludes data we are required to retain for administrative, legal, or security purposes.


Where Your Data Is Sent
Visitor comments may be checked via an automated spam detection service.


How We Protect Your Data
All data is encrypted.


Data Breach Procedures

Detection and Identification

  • Monitor all systems for suspicious access attempts or anomalies

  • Use security software alerts and audit logs

  • Flag unusual transfers, login attempts, or unauthorized file access

Containment

  • Immediately isolate affected systems

  • Disable compromised accounts

  • Suspend vulnerable services

Assessment

  • Determine scope and type of compromised data

  • Identify affected parties and timelines

  • Assess legal and regulatory obligations

Notification

  • Notify internal leadership and legal counsel

  • Inform affected individuals and regulatory bodies (CCPA, HIPAA, GDPR)

  • Notify law enforcement if necessary

Remediation

  • Apply patches and replace credentials

  • Restore clean backups

  • Conduct post-incident system audit

Communication

  • Use pre-approved external messages

  • Assign one communication lead

  • Maintain transparency while avoiding unnecessary exposure

Documentation

  • Log timeline, affected assets, notifications, and remediation

  • Archive all related records

  • Retain for legal and compliance purposes

Post-Incident Review

  • Debrief with stakeholders

  • Update protocols and controls

  • Re-train staff

  • Reevaluate third-party relationships

Ongoing Monitoring

  • Increase post-breach monitoring

  • Use threat intelligence to track follow-up threats

  • Reaudit permissions and apply least privilege principles


Third Parties We Receive Data From
None.


Automated Decision-Making or Profiling
None.


Industry Regulatory Disclosure Requirement (GDPR Reference)

  • Timeline: Notify supervisory authority within 72 hours

  • Threshold: Required if breach poses a risk to individuals’ rights or freedoms

  • Notification to individuals: Required if risk is high

  • Penalties: Up to €20 million or 4% of annual global turnover