Privacy Policy

Who we are

Our website addresses are:


What personal data we collect and why we collect it


When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help detect and eliminate spam.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. After approval of your comment, your profile picture is visible to the public in the context of your comment.


If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact Forms

When you use our contact form we collect your name, email address, subject and message. Please do not provide any information such as login, password, or personally sensitive information.  Information you provide may be sent by us to a third party for support purposes only.  We will not use the information for marketing purposes.


If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment.

If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. If you select “Remember Me”, your login will persist until they expire or you delete them from your browser. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.


Who we share your data with

If you opt-in for news articles and information via email we may share your email address with 3rd party email distribution providers.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website, we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

How We Protect Your Information

Your account and associated information is important to us and we use various means to protect it from unauthorized disclosure and use.

Data In Transit

All information passed between your browser and our website is securely encrypted using standard Transport Layer Security (TLS).  It is not transmitted in clear readable text.

Data At Rest

Information you provide to us is stored in secure databases using private encryption.  Theft of our databases will not result in unauthorized disclosure.

Auditing and Logging

Every transaction between you and our systems are logged and stored using private encryption.  In the event of a security breach we will perform forensic analysis to identify the event and stop the attacker.

Malicious Attacks

We monitor authentication attempts to identify password guessing and other brute force denial of service attacks.  When login attempts exceed a threshold we block any further attempts for a time and alert administrators of the issue.