Who we are
Our website address is: https://www.tr-softwares.com.
What personal data we collect and why we collect it
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Who we share your data with and why
Also, we legitimately share information with different government organisations, charities, and companies if they are using it to perform public functions, or they are fulfilling a legislated obligation.
We use a range of organisations to either store personal information or help deliver our services to you. Where we have these arrangements there is always an agreement in place to make sure that the organisation complies with data protection law.
We don’t share your data with third-parties in a way as to reveal any of your personal information like email, name, etc. However, some data is transferred and/or stored with third-party services we use, like cloud-based services and payment processors. This is done as a way to provide you with a better overall service and user experience.
Here are the services we use to make our own service better for you:
- PayPal – we use Paypal as one of our payment processor. During checkout, a client will provide login information and credit card info. This information is processed directly within this gateway payment and we do not save it on our sites.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor comments may be checked through an automated spam detection service.
Collection of your Personal Information
In order to better provide you with products and services offered on our Site, Side TR-Softwares may collect personally identifiable information, such as your:
First and Last Name
Please keep in mind that if you directly disclose personally identifiable information or personally sensitive data through https://www.tr-softwares.com’s public message boards, this information may be collected and used by others.
How we protect your data
We’ll do what we can to make sure we hold records about you – on paper and electronically – in a secure way, and we’ll only make them available to those people who have a right to see them.
Examples of our security measures include:
- We make every effort to keep all the personal data we hold secure, whether held electronically or as paper copies. We also ensure that only members of staff with a legitimate reason to access your information have permission to do so.
- All employees are provided with relevant training in the correct use of information processing facilities and security procedures, including monitoring for and responding to data security incidents and weaknesses.
- IT facilities and support infrastructures are physically protected from unauthorised access, theft, damage and interference.
Our legal duties and obligations
Sometimes we have a legal duty to provide personal information to other organisations. This is often because we need to give that data to courts, including if:
- We take a child into care and the court orders that we provide the information.
- Someone is taken into care under mental health law.
We may also share your personal information for the following reasons:
- In order to find and stop crime and fraud.
- If there are serious risks to the public, our staff or to other professionals.
- To protect a child.
- To protect adults who are thought to be at risk, for example if they are frail, confused or cannot understand what is happening to them.
For all of these reasons the risk must be serious before we can override your right to privacy. We will make sure that we record what information we share and our reasons for doing so.
What data breach procedures we have in place
We protect customer data with the following site features:
- We are entirely using SSL/HTTPS throughout all our sites. This encrypts our user communications with the servers so personal identifiable information is never captured by third parties without authorization.
In case of a data breach, System administrators will immediately go through affected users and will attempt to reset passwords if needed after informing the user.