This Privacy Policy has been compiled to better serve those who are concerned with how their 'Personally Identifiable Information' (PII) is being used online. PII, as defined in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our Privacy Policy carefully to get a clear understanding of how we collect, use, protect, or otherwise handle your Personally Identifiable Information according to our website. What personal information do we collect from the people that visit our blog, website, or app? When ordering or registering on our site, you may be asked to enter your name, email address, mailing address, phone number, credit card information, or other details to assist you with your experience. When do we collect information? We collect information from you when you register on our site, place an order, subscribe to a newsletter, respond to a survey, fill out a form, or provide feedback on our products or services. How do we use your information? We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, browse the website, or use certain other site features in the following ways: - Personalize your experience and deliver the type of content and product offerings in which you are most interested. - Improve our website to better serve you. - Respond to your customer service requests. - Administer a contest, promotion, survey, or other site feature. - Process your transactions quickly. - Request ratings and reviews of services or products. - Follow up with you after correspondence (live chat, email, or phone inquiries). How do we protect your information? Our website is scanned regularly for security holes and known vulnerabilities to make your visit as safe as possible. We use regular Malware Scanning. Your personal information is stored behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems and are required to keep the information confidential. Additionally, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology. We implement a variety of security measures when a user places an order to maintain the safety of your personal information. All transactions are processed through a gateway provider and are not stored or processed on our servers. Do we use 'cookies'? Yes. Cookies are small files that a site or its service provider transfers to your computer's hard drive through your Web browser (if you allow) that enable the site's or service provider's systems to recognize your browser and capture and remember certain information. For instance, we use cookies to help us remember and process the items in your shopping cart and to understand and save your preferences for future visits. We also compile aggregate data about site traffic and interactions to offer better site experiences and tools in the future. We may use trusted third-party services that track this information on our behalf. You can choose to have your computer warn you each time a cookie is sent or turn off all cookies through your browser settings. If you turn cookies off, some features will be disabled that make your site experience more efficient and some of our services may not function properly. However, you will still be able to place orders. Third-party disclosure: We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information unless we provide users with advance notice. This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or serving our users, so long as those parties agree to keep this information confidential. We may also release information when its release is appropriate to comply with the law, enforce our site policies, or protect ours or others' rights, property, or safety. Non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses. Third-party links: Occasionally, we may include or offer third-party products or services on our website. These third-party sites have separate and independent privacy policies. We have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites. California Online Privacy Protection Act (CalOPPA): CalOPPA requires commercial websites and online services to post a privacy policy. It extends beyond California to require any person or company in the United States (and conceivably the world) that operates websites collecting PII from California consumers to post a conspicuous privacy policy on its website stating exactly the information being collected and with whom it is being shared. According to CalOPPA, we agree to the following: Users can visit our site anonymously. Once this Privacy Policy is created, we will add a link to it on our home page. Our Privacy Policy link includes the word 'Privacy' and can easily be found on the page specified. You will be notified of any Privacy Policy changes on our Privacy Policy Page. You can change your personal information by emailing us at [email protected]. How does our site handle Do Not Track signals? We honor Do Not Track signals and do not track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place. Our site allows third-party behavioral tracking. COPPA (Children Online Privacy Protection Act): COPPA puts parents in control regarding the collection of personal information from children under 13. The Federal Trade Commission, the United States' consumer protection agency, enforces the COPPA Rule. We do not market to children under the age of 13. Fair Information Practices: The Fair Information Practices Principles form the backbone of privacy law in the United States. In line with these principles, should a data breach occur, we will notify you via email within one business day. We also agree to the Individual Redress Principle, which requires that individuals have the right to pursue enforceable rights against data collectors and processors who fail to adhere to the law. CAN-SPAM Act: The CAN-SPAM Act sets the rules for commercial email, establishes requirements for commercial messages, and provides recipients the right to have emails stopped from being sent to them. We collect your email address to send information, respond to inquiries, and/or other requests or questions, process orders and send updates, and market to our mailing list or send emails to our clients after the original transaction has occurred. In accordance with CANSPAM, we agree to the following: - Not use false or misleading subjects or email addresses. - Identify the message as an advertisement in a reasonable way. - Include the physical address of our business or site headquarters. - Monitor third-party email marketing services for compliance. - Honor opt-out/unsubscribe requests quickly. - Allow users to unsubscribe by using the link at the bottom of each email. You can unsubscribe from receiving future emails by following the instructions at the bottom of each email, and we will promptly remove you from ALL correspondence. Data Security: We use Google Cloud Platform (GCP) within our software to ensure data security. Data is transmitted using a minimum of 256-bit encryption, stored in multiple server stacks so it's not in one area, and every login requires two-factor authentication. Our database automatically encrypts data before it's written to disk. Data is auto-decrypted when read by an authorized user. Encryption keys are managed by Google's critical management systems with strict access and auditing controls. Each database object's data and metadata are encrypted under the 256-bit Advanced Encryption Standard. Security is a primary concern for any business. When choosing our software on the Google Cloud Platform, you benefit from a security model that has been evolving over 15 years. Features include: - Industry-leading 256-bit AES encryption for data in transit and at rest. - A team of experts identifying and patching vulnerabilities. - Google's global network improving the security of your data in transit. - Independent verification of security, privacy, and compliance controls for certifications like ISO/IEC 27001/27017/27018/27701, PCI DSS, GDPR, and HIPAA. Contacting Us: If you have any questions about this Privacy Policy or Earnings Disclaimer, contact us using the information below. Gold Shark Solutions LLC Email: [email protected] Website: Goldshark.ai Earnings Disclaimer: Every effort has been made to accurately represent our product/service and its potential. No guarantee of earnings can be made, as it depends on the person using our product, ideas, and techniques. Examples and statements are illustrative only. Your success depends on various factors, including your time, knowledge, and skills. We cannot guarantee results similar to those mentioned in our materials. Forward-looking statements are our opinion of earnings potential. No guarantees are made for any results from our ideas and techniques. Most people do not see results from online coaching programs, which is not specific to our course but the nature of purchase and follow-through of such programs. Contacting Us: For questions regarding this Earnings Disclaimer, contact us using the information provided.