This privacy notice provides information regarding the processing of your personal data when visiting the website of the DoraSanTM or interacting with the DoraSanTM website.
This privacy notice explains what personal data is processed, for which purposes, how long we hold the personal data for, how to access and update your personal data, the options you have regarding your personal data and where to go for further information.
What personal data do we process? Collection of information
We collect information, including personal data about you as a grantee/beneficiary, partner and/or visitor to the DoraSanTM website. This information may be either name, email address or other personal information.
How do we use information?
We collect information primarily to accept donations, complete our charitable projects, and provide you with information concerning our programs, projects, and activities. We also use information for internal purposes (to better understand our supporter network) and for analytical purposes (to respond to requests for information or merchandise and to improve our website, donor base, and outreach). We may inform you of other purposes at the time that we collect some forms of information. For example, if you apply for a job we may collect information in order to process your job application.
With whom do we share information?
We do not trade, share, or sell information that you provide to us with other organizations who intend to use it only to market their products or services to you.
There may be instances in which we share your information with others. We may share your information, for example, in conjunction with your sponsorship of a certain project, as required by law, with law enforcement, to comply with legal process, to protect our legal rights, to protect the safety or security of a person, or to protect against fraud, criminal acts, or misconduct. We may also share your information with companies that provide us with services, or with a successor legal entity.
Our commitment to data security
To help prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect. For example, we secure our machines with mandated encryption protocols to secure our user/company data. We also use industry accepted tools and techniques such as SSL and two-factor authentication to protect against unauthorized access to our systems. Additionally, all sensitive information is stored in secure repositories both in-house as well as secure cloud-based, AES encrypted web apps.