As the policy may change, we recommend you to review the current version every now and then. If we change something in the Policy, we'll update the last updated date further down the page. If you have any questions regarding this Policy or how we handle your personal information please contact us, you will find our contact details below.
What personal data we collect and why we collect it
Our analytics tool creates a cookie for each user to istinguish unique users.
If you contact us or show interest in one of our projects through any of the forms on our site, you can choose to save your name, email address and website address in cookie files.
This is for your convenience, because you will not have to fill in this information again the next time you are about to write this information.
You can block cookies completely from saving to you and clearing previous cookies. It's easy and you can read below how you do it depending on which browser you have.
Our page may include embedded content (Videos). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
We use Google Analytics. Google Analytics tool is used to evaluate the traffic on the site. It involves compiling reports of your behavior on the site in order for 2022 Initiative Foundation to improve content to better meet your needs. Collection is done anonymously, thanks to IP masking that only uses part of the IP address. Therefore, it is not possible to trace an identifiable person's activity pattern on the Internet. The collected data is used for statistical purposes only in an anonymized manner. Google will not use your abbreviated IP address with other Google data. An approval of web tracking and analysis can be revoked at any time. For that an add-on to your browser can be downloaded from the Google website and installed (https://tools.google.com/dlpage/gaoptout).
Who we share your data with
Used for handling analysis and as an email provider.
Our web host where the entire site is located with files and database.
Only those persons who need to process personal data for the above mentioned purposes have access to your personal information.
We use industry standards such as SSL / TLS and one-way hash algorithms to securely store, process and communicate sensitive information such as your personal information. We make sure to remove the data when we no longer need it.
What data breach procedures we have in place
We will report any illegal offenses on this site or in our third party data manager to all relevant persons and authorities within 72 hours after the violation has become known to us if it appears that stored identifiable personal data have been stolen or may in any way affect persons relevant.