Who I am
I’m Rob. This website address is: https://shimmeringtrashpile.com.
The personal data I collect and why I collect it
I embed media players from other sites, such as youtube.com, vimeo.com, spotify.com and others. I can’t control the tracking they do. If I hear about some particularly gross stuff they are doing to compromise your privacy, I will do my best to block it or try to get media from other sources. See the Embedded Content section of this document for more information.
I try to avoid uploading photos of people with embedded location data (EXIF GPS) included. Visitors (most likely bots) to the website can download these images and extract this location data from photos on the website. This data could be used to compromise a person’s privacy. Not good.
If you visit this site’s login page… you’ve done something weird and probably by accident… (or you are a bot trying to brute force my login page). Should this happen, I will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
Embedded content from other websites
Things I post on this site often include embedded content (e.g. videos, sound files, images, pdfs, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited this other website.
For example, if I embed a youtube.com video you can expect youtube.com to be tracking you. I don’t access this data, but I want to be clear that my web pages are exposing you to tracking by third parties.
I don’t run Google Analytics. I do run the Jetpack performance tools.
Who I share your data with
I don’t knowingly share, sell, or trade your data.
How long I retain your data
My website traffic logs are deleted weekly.
Your rights over your data
You can request that I erase any personal data I hold about you. Just email me, and I’ll flush my logs. This does not include any data I am obliged to keep for administrative, legal, or security purposes.
Where I send your data
Data breach procedures
Should my server get hacked, it is possible, but not likely, that my web server logs would get extracted.
Third-party data I receive
Automated decision-making and/or profiling I do