Privacy Policy

Last updated April 9, 2024

Welcome to EdTech Masters! This privacy policy outlines how we collect, use, and protect your personal information. By accessing or using our services, you agree to the terms outlined in this policy. Please read it carefully.

1. Purpose

Our privacy policy serves several important purposes:

  1. Transparency: We believe in transparency and want you to understand how we handle your data. This policy explains what information we collect, why we collect it, and how we use it.
  2. Legal Compliance: We comply with applicable data protection laws and regulations. This policy ensures that we meet legal requirements regarding user privacy.
  3. User Consent: By using our website, you consent to the collection and processing of your personal information as described in this policy. We respect your choices and provide options for managing your data.
  4. Universal Application: This policy applies to all users, including visitors, clients, and learners. Whether you’re browsing our site, seeking consulting services, or using our learning management systems (LMS), these terms govern your interactions with us.


Your Rights Before proceeding: we encourage you to review your rights as outlined in this policy. You have the right to access, correct, and delete your personal data. If you have any questions or concerns, please contact our privacy team at privacy@edtechmasters.us.

2. Information Collection

We collect various types of personal information from users to enhance their experience on our website and provide our services effectively. Below are the categories of data we collect:

  1. Contact Details: When users interact with our website, they may voluntarily provide contact information such as their name, email address, and phone number. We use this information to communicate with users, respond to inquiries, and deliver personalized services.
  2. User Account Information: To create and manage user accounts, we collect details such as username, password, and any other information necessary for account setup. This allows users to access specific features, track progress, and customize their experience.
  3. Billing Information: When users engage in transactions (e.g., purchasing consulting services or subscribing to LMS hosting), we collect relevant billing information. This includes credit card details, billing addresses, and payment history.
    1. history. We use this data solely for billing purposes and to fulfill contractual obligations.
    2. Usage Data: Our website automatically collects certain usage data as users navigate through pages. This includes:
      1. IP addresses: These help us identify users’ approximate geographic location and diagnose technical issues.
      2. Browser type: We analyze browser data to optimize website compatibility.
      3. Device information: We collect details about the device used to access our services (e.g., operating system, screen resolution).
      4. Cookies: We use cookies (small text files stored on users’ devices) to enhance functionality, personalize content, and improve overall user experience. Cookies may collect additional data related to user preferences and behavior.
    3. Collection Methods – We collect information through various methods:
      1. User Input: Users provide data directly through forms, registration processes, and communication channels.
      2. Automated Tracking: Our website uses cookies and similar technologies to gather usage data automatically.
      3. Third-Party Services: We may integrate third-party tools (e.g., analytics services) that collect data on our behalf.

    By using our website, users consent to the collection of this information. We take privacy seriously and ensure that data is processed securely and in accordance with applicable laws

3. Use of Information

We value your privacy and are committed to using the collected data responsibly. Here’s how we utilize the information we gather:

  • Providing Education Technology Consulting Services:
  • We use your personal information to deliver high-quality education technology consulting services. This includes assessing your needs and tailoring our recommendations to enhance your educational technology infrastructure, offering strategic guidance on implementing effective solutions, and collaborating with you to optimize existing systems or adopt new technologies.
  • Hosting and Managing Learning Management Systems (LMS) – If you utilize our LMS hosting services, we process data to:
  • Set up and maintain your LMS platform securely.
  • Ensure smooth functionality, scalability, and reliability.
  • Monitor performance, troubleshoot issues, and provide technical support.
  • Personalizing User Experiences: We analyze user behavior and preferences to create personalized experiences within our services. This may involve:
  • Customizing LMS interfaces based on user roles (e.g., students, instructors, administrators).
  • Recommending relevant educational content or resources.
  • Adapting learning pathways to individual needs.
  • Sending Relevant Communications:

We communicate with users through newsletters, updates, and announcements. Our communications include:

  • Important service-related information (e.g., system maintenance, feature enhancements).
  • Educational content (e.g., webinars, best practices).
  • Marketing materials (only if you’ve opted in).
  • Improving Our Services:

We continuously enhance our offerings based on user feedback and data insights. This involves:

  • Analyzing usage patterns to identify areas for improvement.
  • Conducting research and development to innovate our consulting services and LMS hosting.
  • Enhancing security measures to protect user data.

Remember that you have control over your data. You can manage communication preferences and exercise your rights as outlined in our privacy policy. If you have any questions or need further clarification, feel free to reach out to our privacy team.

4. Data Sharing and Disclosures

Our company does not share user data with third parties unless explicitly authorized by the user. 

  • We prioritize user privacy and adhere to the “No Disclosure without Consent” rule established by the Privacy Act.
  • Exceptions to this rule include situations where sharing is necessary for the provision of services (e.g., with service providers), analytics purposes, or marketing platforms. However, even in these cases, we ensure that user consent is obtained or that the sharing aligns with legal requirements.
  • Legal Obligations and Requests:
  • We recognize that legal obligations may arise, such as court orders or requests from law enforcement agencies. 
  • In such instances, we may be compelled to disclose user data. However, we handle such requests with utmost care, ensuring that they comply with applicable laws and regulations. Transparency and user rights remain our priority.

Remember that our commitment to safeguarding user data remains unwavering, and we take all necessary precautions to protect your privacy and confidentiality.

5. Use of Cookies, Web Beacons and Similar Technologies

  • Our website employs various tracking technologies to enhance user experience, personalize content, and analyze site performance. Here’s a breakdown of these technologies:
  • Cookies: These are small text files sent to your browser by the website you visit. Cookies help the site remember information about your visit, such as language preferences, session details (like items in your shopping cart), and user-specific settings. For instance, our services may use cookies to remember your preferred language or SafeSearch filter settings.
  • Web Beacons (Pixel Tags): These are tiny, transparent images embedded in web pages or emails. They allow us to track user interactions, such as email opens or page views. Web beacons help us understand user behavior and improve our services.
  • Local Storage: Similar to cookies, local storage allows websites to store data on your device. It’s useful for maintaining session information and improving performance.
  • Unique Identifiers: These identifiers help recognize your device or app. They play a role in personalization and analytics.
  • Our use of these technologies is guided by privacy principles, and we prioritize transparency and user control.
  • Managing Cookie Preferences: We respect your preferences regarding cookies. Here’s how you can manage them:
  • Browser Settings: Most web browsers allow you to control cookies. You can adjust settings to block or delete cookies. Keep in mind that some features may not work correctly if you disable cookies.
  • Privacy Tools: Visit our privacy tools page at g.co/privacytools to manage cookie preferences.
  • Device Settings: Some technologies can be managed directly in your device settings or within specific apps.

Remember that opting out of certain cookies may impact your experience on our site. We encourage you to review our full Privacy Policy for comprehensive details on data handling and protection. Feel free to explore our privacy tools and customize your cookie preferences according to your comfort level.

6. Data Protection and Security

Your Data, Our Priority: We understand the critical importance of safeguarding user data. Our commitment is unwavering, and we take every measure to protect your information.

  • Encryption: All data transmitted between your device and our servers is encrypted using industry-standard protocols. This ensures that even if intercepted, the data remains unreadable to unauthorized parties.
  • Access Controls: Access to user data is strictly limited to authorized personnel who require it for legitimate purposes. We maintain robust access controls, ensuring that only those with a valid need can access sensitive information.
  • Regular Security Audits: Our security practices undergo regular audits. These audits evaluate our systems, processes, and vulnerabilities, allowing us to proactively address any potential risks.
  • Incident Response: In the unlikely event of a security breach, we have a well-defined incident response plan. Our team promptly investigates incidents, mitigates damage, and notifies affected users as required by law.
  • Training: Our team members receive training on data security, privacy, and ethical handling of user information. We emphasize the importance of confidentiality and compliance.
  • Physical Security: We host our data with providers equipped with stringent physical security measures, including access controls, surveillance, and environmental safeguards.
  • Continuous Improvement: Security is an ongoing process. We continuously monitor threats, adapt to emerging risks, and enhance our defenses.
  • User Responsibility: While we take every precaution, user cooperation is essential. We encourage you to:
  • Use strong, unique passwords.
  • Keep your devices and software updated.
  • Be cautious of phishing attempts and suspicious links.
  • Report any security concerns promptly.

 

Rest assured, your trust is our greatest asset, and we remain steadfast in our commitment to protecting your data.

7. User Rights

As part of our commitment to transparency and data protection, we want to ensure that you are aware of your rights regarding your personal data. Below are the rights you have as a user:

  1. Access to Personal Data: You have the right to request access to the personal data we hold about you. If you would like to know what information we have collected, please contact us using the details provided in the “Contact Us” section.
  2. Correction of Inaccuracies: If you believe that any of the personal data we hold about you is inaccurate or incomplete, you can request corrections. We will promptly update any incorrect information. 
  3. Deletion of Personal Data: You have the right to request the deletion of your personal data. If you no longer want us to process your information, please let us know, and we will take appropriate steps to delete it.
  4. Opting Out of Marketing Communications: You can choose to opt out of receiving marketing communications from us. If you no longer wish to receive promotional emails or newsletters, follow the instructions provided in the communication or contact us directly.

 

Please note that while exercising these rights, we may need to verify your identity to ensure the security of your data. If you have any questions or wish to exercise any of these rights, please reach out to us using the contact details provided in this policy.

8. COPPA Compliance

We comply with the Children’s Online Privacy Protection Act (COPPA) and other relevant regulations.

  1. Our services are not directed at children under 13 years old unless we have obtained verifiable parental consent.
  2. Data Collection from Children:
    1. We do not knowingly collect personal information from children under a certain age without explicit parental consent.
    2. If we discover that we have inadvertently collected data from a child without proper consent, we promptly take steps to delete that information.
  3. Parental Rights:
    1. Parents or legal guardians have the right to review, correct, or delete any personal information we hold about their children.
    2. If you are a parent or guardian and believe that your child’s information has been collected without your consent, please contact us using the details provided in this policy.

We are committed to creating a safe and secure online environment for children, and we encourage parents to actively participate in their children’s online activities. If you have any questions or concerns regarding our children’s privacy practices, please reach out to us.

9. Changes to the Privacy Policy

We recognize that privacy practices evolve over time, and we may need to update our privacy policy periodically. Here’s how we handle changes:

  • Updates and Revisions: 
  • Our privacy policy is subject to regular review and updates.
  • We will notify users of any material changes to the policy.
  • Notification of Significant Changes:
  • When we make significant modifications to our privacy practices, we will provide clear and prominent notice.
  • This notice may be through email, website banners, or other appropriate channels.
  • Review the Updated Policy: Whenever we update the privacy policy, we encourage users to review the revised version.
  • By continuing to use our services after any changes, you agree to the updated terms.

 

We value transparency and want to keep you informed about how we handle your data. If you have any questions about policy changes, feel free to reach out to us using the contact details provided.

10. Contact Information

If you have any questions or concerns regarding our privacy practices, please feel free to reach out to us. We value transparency and are committed to addressing your inquiries promptly. You can contact us through the following channels:

 

Email: privacy@edtechmasters.us

Contact Form: Visit our website and fill out the contact form here.

 

We appreciate your trust and take your privacy seriously. Thank you for choosing our services!