Success In Vulnerability© and
Last Revised: May 1st, 2020
Information Collection and Use
Success In Vulnerability© uses forms to collect contact information (including your name, address, telephone number, and email address) so you can place orders, request information and support, and give feedback on our products or services. For certain services, we may also request a credit card number, professional license number, or other financial information. We will then create an account. We receive and store any information you enter on our site or give us in any other way, including through email, telephone, or other communications with our business. We use your information to contact you regarding functionality changes to our products, changes to our site, newly released or soon to be released Success In Vulnerability© Instruction Modules and Clinical Examples, Success In Vulnerability© merchandise, and other offers we think you’ll find valuable including, but not limited to releasing to the email you have given us, Success In Vulnerability© contributor content including trainings, promotional offers for trainings and communications regarding newly released videos, publications, articles, books and podcasts. If you would rather not receive this information, you will be able to unsubscribe anytime in emails we send or contact us at hello@SuccessInVulnerability.com. Within our Site and Store we and our partners, affiliates, and/or analytics or service providers use technologies such as cookies, beacons, tags and scripts to analyze trends, administer the Site and Store, track users’ movements around the Site and Store, and to gather demographic information about our user base as a whole. We may receive reports based on the use of these technologies by these companies on an individual or aggregated basis. As is true of most websites, we gather certain information automatically and store it in log files. This information may include Internet protocol (IP) addresses, browser type, Internet service provider (ISP), referring/exit pages, operating system, date/time stamp and/or clickstream data. We use this information gathered about you from our Site or mobile application to help personalize search results and administer our Site and Store. We also use tracking technologies such as: CI codes (Click Tracking), ISC (Source Tracking), and ITC (Item Tracking Codes attached to purchases at an item level and used to determine where within the application a product was added. Our mobile applications automatically collect the device’s operating system, phone model, OS version, device ID, and IP address. These results are not shared with any third parties and are used solely for optimizing our applications and services for those user types. With your express consent, we may access and track location data from your mobile device in order to personalize results such as user account information and bookmarks. You may withdraw your consent for us to use location data at any time by turning off the location services setting on your device.
We use security measures to protect against the loss, misuse or alteration of the information under our control. When you enter sensitive information (such as a credit card number) on our order forms, we encrypt the transmission of that information using secure socket layer technology (SSL).
We follow generally accepted standards to protect the personal information transferred to us, both during transmission and once we receive it. Note, no method of transmission over the Internet, or method of electronic storage, is 100% secure. Therefore, we cannot guarantee absolute security. If you have any questions about the security of your personal information, you can contact us at hello@Succesinvulnerability.com.
Additionally, we may retain your information for as long as your account is active or as needed to provide you services, comply with our legal obligations, resolve disputes and enforce our agreements.
From time to time, Success In Vulnerability© or someone acting on behalf of Success In Vulnerability© may contact you to confirm your orders, send information to you, and provide you with offers or services. The contacts may occur by e-mail, telephone, or text message. By providing your email, telephone or mobile number, you consent to receive marketing telephone calls and emails from or on behalf of Success In Vulnerability©. By providing your mobile
number, additionally, you consent to receive marketing text messages from or on behalf of Success In Vulnerability© that may be sent by an automatic telephone dialing system. You understand that providing consent is not a condition of purchasing any good or service from Success In Vulnerability©. Message and data rates may apply. Note: Any information you send to us may be stored and used to improve this Site, our Store, and our products, or it may be reviewed and deleted at the discretion of or on behalf of Success In Vulnerability©.
Compliance with Laws and Law Enforcement
Success In Vulnerability© cooperates with government and law enforcement officials, as well as, private parties to enforce and comply with the law. We will disclose any information about you to government or law enforcement officials or private parties as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process (including without limitation subpoenas), to protect our property and rights or the property and rights of a third party, to protect the safety of the public or any person, or to prevent or stop activity we consider to be illegal or unethical. To the extent we are legally permitted to do so, we will take reasonable steps to notify you in the event that we are required to provide your personal information to third parties as part of legal process.