Who We Are
RunnersChoice.net. provides information about running shoes and reviews.
For any privacy-related questions, you can reach us at email@example.com.
What Personal Data We Collect And Why We Collect It
We do not sell our users’ private personal information.
Whenever you comment on this blog you will be required to leave your email address.
We only collect this so we can email you about your comment if need be. However if you leave your name and email in the opt-in form box, you will then be sent a confirmation email from Aweber, and if you click that, then your email will be moved to my Aweber email marketing list, so I can send you important updates.
We will never ever sell your contact info or give it away to anyone, period.
What Are Cookies?
Under no circumstance can any content on this website be copied or reproduced in any way. This includes any of the reviews and videos that are hosted on the domain, runnerschoice.net. If any person or company does use the owner of this websites name, video, or blog content without getting written consent from the site then legal action may be undertaken against the offending parties.
Publishing Content (Comments, Pages, Posts)
Your Profile Picture (Gravatar), Display Name, Website (URL) (if any) and Biographical Info (if any) may be visible to visitors to the website (e.g. if you leave a comment, forum post, or contribute an article/post).
If you author an article/post, your Username, User ID, Profile Picture (Gravatar), Display Name, Website (URL) (if any) and Biographical Info (if any) are provided to any visitor using the website’s REST API interface.
If you upload media (e.g. images) to the website (in forums, posts, or comments), you should avoid uploading images with EXIF GPS location data included. Visitors to the website can download and extract any location data included in images on the website. Visitors using the website’s REST API interface can correlate uploaded media to a particular user. This may allow such visitors to map a user to a particular time and location if EXIF GPS location data was included in the uploaded media.
If you edit or publish an article/post, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
When visitors leave comments on one of our sites we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
Comments may require manual approval by one of our employees or site owners. If you leave a comment on a site you may opt-in to saving your name, email address and website in cookies so we can recognise you as a commenter. These cookies will persist for one year.
Embedded Content From Other Websites
IP addresses are used by your computer every time you are connected to the Internet. Your IP address is a number that is used by computers on the network to identify your computer. IP addresses are automatically collected by our web server as part of demographic and profile data known as traffic data so that data (such as the Web pages you request) can be sent to you.
Sharing and Selling Information
We do not share, sell, lend or lease any of the information that uniquely identify a subscriber (such as email addresses or personal details) with anyone except to the extent it is necessary to process transactions or provide services that you have requested.
How Can You Access and Correct Your Information?
You may request access to all your personally identifiable information that we collect online and maintain in our database by emailing us at the usual address.
What About Legally Compelled Disclosure of Information?
We may disclose information when legally compelled to do so, in other words, when we, in good faith, believe that the law requires it or for the protection of our legal rights. We may also disclose account information when we have reason to believe that disclosing this information is necessary to identify, contact or bring legal action against someone who may be violating our Terms of Service or to protect the safety of our users and the Public.
What About Other Web Sites Linked to Our Web Site?
We are not responsible for the practices employed by Web sites linked to or from our Website or the information or content contained therein. Often links to other Websites are provided solely as pointers to information on topics that may be useful to the users of our Web site.
Our Commitment To Data Security:
Please note that your information will be stored and processed on our computers in the United States. The laws on holding personal data in the United States may be less stringent than the laws of your Country of residence or citizenship. To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.
This site allows visitors to unsubscribe so that they will not receive future messages. After unsubscribing we will discontinue sending the particular messages as soon as technically feasible.
A Special Note About Children
Children are not eligible to use our services unsupervised and we ask that children (under the age of 14) do not submit any personal information to us. If you are a minor, you can use this service only in conjunction with permission and guidance from your parents or guardians.
Acquisition or Changes in Ownership
In the event that the website (or a substantial portion of its assets) is acquired, your information would be considered part of those assets, and may be part of those assets that are transferred.
How We Protect Your Data
The security and reliability of our service is our number one priority.
See wordpress.org/about/security for details on the security of the WordPress core itself.
Prevention is best when it comes to security, and as a first step, we follow all WordPress Code Standards in the plugins that we build and use.
All staff only have access to systems that are directly required to complete the functions of their job.
All staff (including any contractors) undergo initial training to ensure proper understanding of all security-related processes.