Terms and Conditions

The Terms and Conditions were last updated on December 9, 2025 1. Introduction These Terms and conditions apply to this website and to the transactions related to our products and services. You may be bound by additional contracts related to your relationship with us or any products or services that you receive from us. If any provisions

Terms and Conditions Read More »

What data breach procedures we have in place

Notification: Organizations must notify law enforcement, affected businesses, and affected individuals about data breaches. This includes notifying state and federal authorities as required by specific laws. 1 Data Breach Policies: Developing comprehensive data breach policies is essential for preventing, detecting, and responding to data security incidents. These policies should include protocols for safeguarding sensitive information, delineating roles and responsibilities, and outlining procedures for incident management. 1 Compliance with Legal Frameworks: Organizations must comply with various legal frameworks governing data breaches, such as HIPAA, GLBA, and state-specific laws like the CCPA and GDPR. These frameworks establish standards and requirements for responding to data breaches, varying by jurisdiction but often sharing common principles. 2 Incident Response: A well-crafted incident response plan is crucial for minimizing the impact of breaches, reducing legal liabilities, and demonstrating due diligence to regulators and customers. 1 Security Requirements: Organizations must adopt reasonable security procedures and practices appropriate to the nature of the information held by the business. This includes encryption, third-party due diligence, and other security measures as required by applicable laws. 1By understanding and implementing these procedures, organizations can better manage data breaches and protect their stakeholders. It is important to regularly review and update these procedures to stay compliant with evolving legal requirements and to respond effectively to new threats.

What data breach procedures we have in place Read More »

How we protect your data

Transparency: Inform consumers about what data is collected and how it’s used. Consent & Opt-Out: Provide mechanisms for opting out of data sales or targeted advertising. Data Security: Implement reasonable safeguards to protect personal information. Rights of Individuals: Access, correction, deletion, and portability of personal data. Breach Notification: Most states require notifying affected individuals (and

How we protect your data Read More »

Privacy Policy

Who we are Our website address is: https://marymarcotte.com. What personal data we collect and why we collect it Comments When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. An anonymized string created from

Privacy Policy Read More »

Verified by MonsterInsights