Collection of Personal Information
Personal Information is information about you that identifies you as an individual, for example, your name, e-mail address.
We collect information that you voluntarily provide to us through Trip Planner account registration, responses to surveys, search functions, questionnaires, feedback, etc. We may also ask you to provide additional information such as your e-mail address if you want to obtain additional services, information, or to resolve complaints or concerns.
How Does Company Use Information Gathered about Online Visitors?
Before forwarding us any personal information, please be advised that any information gathered on our Site may be used in the aggregate for research and development relating to our Site and/or for future site development and, if you ask us to, to send you informational materials. In particular, we may use information gathered about you for the following purposes: to monitor interest in our range of products and to assist us to tailor the content of our Site to your needs by collecting information about your preferences through tracking of patterns page views on our Site; to create a profile relating to you in order to show you the content that might be of interest to you and to display the content according to your preferences; and, in circumstances where you have indicated that you wish to receive additional information, to send you information about us and promotional material about our products together with details of any offers we may have available from time to time.
This feature is only accessible to logged users.
Data Used: In order to process a comments, the following information is used: WordPress.com user ID/username (you must be logged in to use this feature), the local site-specific user ID (if the user is signed in to the site on which the like occurred), and a true/false data point that tells us if the user liked a specific comment.
If you perform a like action from one of our mobile apps, some
additional information is used to track the activity: IP address, user
agent, timestamp of event, blog ID, browser language, country code, and
Activity Tracked: Comments.
Contact FormData Used: If Akismet is enabled on the contact form submission data — IP address, user agent, name, email address, website, and message — is submitted to the Akismet service for the sole purpose of spam checking. The actual submission data is stored in the database of the site on which it was submitted and is emailed directly to the owner of the form (i.e. the site author who published the page on which the contact form resides). This email will include the submitter’s IP address, timestamp, name, email address, website, and message. Data Synced: Post and post meta data associated with a user’s contact form submission. If Akismet is enabled on the site, the IP address and user agent originally submitted with the comment are synced, as well, as they are stored in post meta.
Google AnalyticsData Used: Please refer to the appropriate Google Analytics documentation for the specific type of data it collects. Google Analytics does offer IP anonymization, which can be enabled by the site owner. Activity Tracked: This feature sends page view events over to Google Analytics for consumption.
LikesThis feature is only accessible to users logged in to WordPress.com. Data Used: In order to process a post like action, the following information is used: IP address, WordPress.com user ID, WordPress.com username, WordPress.com-connected site ID (on which the post was liked), post ID (of the post that was liked), user agent, timestamp of event, browser language, country code. Activity Tracked: Post likes.
SubscriptionsData Used: To initiate and process subscriptions, the following information is used: subscriber’s email address and the ID of the post or comment (depending on the specific subscription being processed). In the event of a new subscription being initiated, we also collect some basic server data, including all of the subscribing user’s HTTP request headers, the IP address from which the subscribing user is viewing the page, and the URI which was given in order to access the page (REQUEST_URI and DOCUMENT_URI). This server data used for the exclusive purpose of monitoring and preventing abuse and spam. Activity Tracked: Functionality cookies are set for a duration of 347 days to remember a visitor’s blog and post subscription choices if, in fact, they have an active subscription.
Promotional and Informational OffersWith the permission of an online visitor, information submitted at the time of registration or submission may be used for marketing and promotional purposes by the Company provided notice of this fact is made available online. If a visitor objects to such use for any reason, he/she may prevent that use, either by e-mail request or by modifying the registration information provided. The Company uses reasonable efforts to maintain visitors’ information in a secure environment. If you have submitted personal information and want to change it or opt-out, please contact us as described below.
The Company, in common with many web site operators, may use standard technology called “cookies” on its Site. Cookies are small data files that are downloaded onto your computer when you visit a particular web site. You can disable cookies by turning them off in your browser; however, some areas of the Sites may not function properly if you do so.
Protection of Children Online
The Company considers the protection of children’s privacy, especially online, to be of the utmost importance. We do not knowingly collect or solicit personal information from children nor do we allow them to become registered users of, or to request information through, our Sites or help-seeking information lines.
Protection of Information:
Our Commitment to Security
We have put in place physical, electronic, and managerial procedures to safeguard and help prevent unauthorized access, maintain data security, and correctly use the information we collect online. The Company applies security safeguards appropriate to the sensitivity of the information, such as retaining information in secure facilities and making personal information accessible only to authorized employees on a need-to-know basis.
Storage of Information: