Learn Together, Teach Together!
Who We Are and What This Is
The Programming.com network is a social platform for programmers around the world to find fellow programmers, to learn, to teach, to share knowledge and to socialize. It is owned and operated by Programming.com Inc.
We really, truly care about your privacy. We take the private nature of your personal information very seriously, and are committed to protecting it. To do that, we’ve set up procedures to ensure that your information is handled responsibly and in accordance with applicable data protection and privacy laws. We’re grateful for your trust, and we’ll act that way.
Safe Harbor Overview
We follow the strict Safe Harbor Framework that complies with the EU and Swiss privacy requirements. We have chosen to comply with the principles of the Safe Harbor Framework developed by the U.S. Department of Commerce in consultation with the European Commission and the Federal Data Protection and Information Commissioner of Switzerland, except where limited by any legal, regulatory, ethical or public interest considerations. More information about the principles that make up the Framework, as well as other frequently asked questions relating to Safe Harbor can be found at: http://www.export.gov/safeharbor.
Types of Information
“Personal” information can potentially identify who you are. “Personal information” is any information that we could use to identify an individual. It does not include personal information that is encoded or anonymized, or publicly available information that has not been combined with non-public information.
“Sensitive” information can identify specific private attributes, such as ethnicity, health info, criminal history, or trade affiliations. “Sensitive personal information,” is information that meets the “personal information” criteria and also a) reveals race, ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, or b) concerns health or sex life, information about social security benefits, or information on criminal or administrative proceedings other than in the context of pending legal proceedings.
How We Collect Information
We collect information two ways: Information we get from your use of the network, and information you provide to us directly.
Your web browser tells us stuff like your approximate location and how you use the site. Information we get from your use of the network is primarily non-personally- identifying information of the sort that web browsers, servers, and services like Google Analytics* typically make available, such as the browser type, language preference, referring site, and the time of each visit. Other non-identifying information that we might have access to includes how you use the service (e.g., search queries), your approximate location, cookies, etc.
We try to use this non-personal info to help improve the Network and related Services, and to destroy spam. We collect this non-personally identifying information in order to better understand how visitors use the service and where possible, to improve their experience. For instance, we may monitor the most common content on the network to help identify spam. In some cases, we may publicly display information that is not personally identifying in the aggregate, (e.g., by publishing a report on trends in the usage of the network,) or may provide it to third parties.
Your browser also gives us your IP address, when you use the network, we also collect potentially personally identifying information in the form of Internet Protocol (IP) addresses. But we don’t use that information to identify you, and we handle and disclose these addresses in the same way we handle other potentially personally identifying information as described below.
If you register an account, you may need to give us your email and other personal info. Certain visitors to the network choose to interact with it in ways that may require them to provide us with personally identifying information. The amount and type of information that is provided depends on the nature of the interaction. We use a payment gateway to protect financial information we collect online, and we only collect as much information as is necessary or appropriate given the type of interaction. We do not disclose personally identifying information other than as described below. And you can always refuse to supply personally identifying information, with the caveat that it may prevent you from engaging in certain activities.
The non-identifying content of a service request may be made public. If you send us a request, such as emailing us for support, we reserve the right to publish it (absent any personally identifying information) in order to help us clarify or respond to your request or help other users.
Our servers are located in the United States. So, if you send us your info, that’s where it’s going. If you are outside the United States, you should know that any personally identifiable information you enter into the network will be transferred out of your country and into the United States, and possibly to other countries. By using the network, you consent to such transfer, and are representing that you have the right to transfer such information outside your country.
We do not knowingly collect any personally identifiable information from children under the age of 13. If you believe that a child has provided us with personally identifiable information without the consent of his or her parent or guardian, please contact us at firstname.lastname@example.org. If we become aware that a child under age 13 has provided us with personally identifiable information, we’ll delete it.
Information You Choose to Display Publicly on the Network
Some users may elect to publicly post personally identifying or sensitive information about themselves in their normal use of the network. This could occur through the use of optional profile fields, in posts, or other exchanges of information. Information like that, which is voluntarily posted in publicly visible parts of the network, is considered to be public, even if it would otherwise be considered to be personally identifying or sensitive. As such, it is not subject to the protocols listed below, because we don’t control it; you do. Additionally, voluntarily publicizing such information means that you lose any privacy rights you might normally have with regards to that information. It also increases your chances of receiving unwanted communications, like spam.
Information You Give to Other People
We’re not responsible for any information you give other websites we link to. This Policy only applies to information collected by Programming.com. It does not apply to the practices of companies that we don’t own or control, or employees that we don’t manage. The network contains links to third party websites, and any information you provide to those sites will be covered by any privacy policies they may have. Please be sure to read the privacy policies of any third-party sites you visit. It is those sites’ responsibility to protect any information you give them, so we can’t be held liable for their wrongful use of your personally identifying information.
How We Use Information We Collect
We will tell you what we’re collecting, what we’re doing with it, and when we might share it with others. When we collect your personal information, we’ll tell you how we’re using it, any types of third parties to which we might disclose it, (other than moderators or “agents,” such as vendors or contractors, who are only processing such information for us or at our direction), and the choices we offer you to limit the use of your information.
We’ll tell you all this stuff as soon as you register. Notice will be provided in clear and conspicuous language when you are first asked to provide us with personal information, or as soon as practicable thereafter, and we’ll notify you before we use the information for something other than the purpose for which it was originally collected. If anything in this policy seems unclear, please don’t hesitate to contact us at email@example.com, so we can address your question and possibly clarify this document.
We mostly use your information to customize and improve your (and others’) experience. Here are some of the ways we may use personal information you provide us:
- To allow you to register for our web sites, online communities and other services, and to administer and process those registrations
- To communicate with you about our products, services and related issues
- To evaluate the quality of our products and services, and to enhance your experience on our web sites
- To maintain and administer our web sites and comply with our legal or internal obligations and policies
- To transfer information to others as described in this policy or to satisfy our legal, regulatory, compliance, or auditing requirements
Choice — Choice is all about making sure you have the ability to control how we share your personal information with others. We almost never share any of your personal information with non-agent third parties, with one exception, where you basically are asking us to do so.
We will not share your personal information with non-agent third parties unless we are required to do so by law, or if we believe in good faith that disclosure is reasonably necessary to protect our property, rights or those of third parties or the public at large. It is possible that we may, on occasion, buy or sell assets from or to other companies. If that should occur, user information is typically one of the assets that get transferred. Similarly, if Programming.com or most of its assets were acquired, or in the unlikely event that we go out of business or enter bankruptcy, user information could be transferred or acquired. You should be aware that such events can occur, and that if it does, the buyer may continue to use your personal and non-personal information, but only as set forth in this policy. Other than in these rare circumstances, Programming.com will not rent or sell potentially personally identifying information to anyone.
In the unlikely event that we should need to collect and transfer your sensitive information, we’ll ask first. It’s hard to imagine that we would ever consider collecting, let alone sharing, sensitive information with a non-agent third party, but if such a day should come, we will first give you the opportunity to explicitly consent (opt-in) to such disclosure or to any use of the information for a purpose other than the one for which it was originally collected or previously authorized.
If you are a registered user of the network and have supplied your email address, we may occasionally send you an email to tell you about new features, solicit your feedback, or just keep you up to date with what’s going on with the network. We generally use the network to communicate this type of information, so we expect to keep this type of communication to a minimum. If we do send you information that you did not expressly request, we will provide you with a way to request that you don’t get any similar notices (opt-out).
Anyone that has access to your info will be required to treat it like we do.
Onward Transfer — Prior to providing agents with any personal information, we will obtain assurances that they will safeguard it in accordance with this policy. Examples of assurances that may be provided include:
A commitment that they will handle in the information in accordance with this policy, or will provide the same level of protection, as required by the Safe Harbor Principles, subject to EU Directive 95/46/EC (“the EU Data Protection Directive”);
Safe Harbor certification by the agent, or being subject to another European Commission adequacy finding.
In the unlikely event that we should discover that an agent is using personal information in way that conflicts with this policy, we will take all reasonable steps to stop them immediately.
We promise to work hard to keep your info safe, and to restrict who can access it.
Security — All records containing personal or financial information are considered to be our property and are afforded confidential treatment at all times. We work hard to protect against the unauthorized access, use, alteration or destruction of personal or financial information. All such electronic information is stored on restricted database servers, and is generally kept until such time as you may ask us to edit or delete it, as described below. We only disclose such information to our employees, agents or affiliates that a) need to know that information in order to process it for us or to provide other services, and b) have agreed not to disclose it to others.
We want to keep your data accurate and up to date, so…
Data Integrity — In addition to assuring you that we will protect your personal information, we also want to make sure that it is reliable, accurate, and up-to-date. In order to do that, we provide:
Access — Upon request, we will provide you with reasonable access to the personal information we collect about you. You will have the opportunity to correct, update, modify or delete this information by sending an e-mail to firstname.lastname@example.org. Please note that some information may remain in our records even after you request deletion of your information as permitted by the Safe Harbor Principles. Additionally, there may be limits to the amount of information we can practically provide. For example, we may limit an individual’s access to personal information where the burden or expense of providing access would be disproportionate to the risks to the individual’s privacy or where doing so would violate others’ rights.
If you have any concerns about your privacy, we genuinely want to know about it. If you have any concerns or complaints about how you think we’ve handled your personal information, please contact email@example.com or our Data Protection Officer at the address below. We will work hard to investigate and resolve any complaints you might have.
In the unlikely event that we can’t help, you can contact eTrust. We hope it won’t ever come to this, but if you’ve already contacted us and feel that your complaint cannot be resolved between the two of us, we have agreed to participate in the dispute resolution procedures established in the Safe Harbor Principles regarding personal information received from the EEA. For such escalated disputes, you can contact eTrust at 616 Corporate Way, Suite 2, #4000, Valley Cottage, NY 10989.
How to Contact Us
We’re here if you need us. If you have any questions about this policy or our site in general, please contact us at firstname.lastname@example.org.
Written Inquiries can be sent to:
Data Protection Officer
30 West Gude Drive, #150
Rockville, MD 20850
Programming.com Network Content Policy
The intent of this document is to clarify what we consider to be acceptable use of any website or service provided on the Programming.com Network (collectively “Programming.com”, “Network”).
If you are found to be in violation of any of the below policies, you will receive a notice via email. Unless you explain or correct your behavior within 72 hours, your account will be suspended. We will do our best to work with you and ensure a fair outcome in all cases. We reserve the right to immediately suspend, without notice, any content, account, or IP address which we determine to be submitting spam or potentially other damaging or disruptive content the Network.
When your account is suspended, public access to content contributed under that account may be blocked or removed, and your account may be suspended or deleted at our discretion. Access to other functionality or information within the Network may also be blocked or disabled.
Illegal Use. Programming.com may not be used for illegal purposes. Examples of this include using Programming.com for fraudulent purposes or operating a phishing site (used to obtain account and password information).
Spam. Users that do not publish meaningful content, use deceptive means to generate revenue or traffic, or whose primary purpose is affiliate marketing, will be suspended.
Identity Theft and Privacy. Users that misleadingly appropriate the identity of another person are not permitted. Users may not post other people’s personally identifying or confidential information, including but not limited to credit card numbers, Social Security Numbers, and driver’s and other license numbers. You may not post information such as other people’s passwords, usernames, phone numbers, addresses and e-mail addresses unless already publicly accessible on the Web.
Hate Content, Defamation, and Libel. Hate speech and other objectionable content that is unlawful, defamatory, and fraudulent. Note that an allegation of defamatory expression, in and of itself, does not establish defamation. The truth or falsehood of a bit of expression is a key element in establishing defamation, and we are not in a position to make that sort of fact-based judgment. That said, if we have reason to believe that a particular statement is defamatory (a court order, for example), we will remove that statement.
Disruptions and Exploits. We will terminate accounts and block addresses of those who attempt unauthorized use of the Programming.com Network.
Copyright. Using copyrighted material does not constitute infringement in all cases. In general, however, users should be careful when using copyrighted content without the permission of those who created it. It is our policy to respond to notices of alleged infringement that comply with the Digital Millennium Copyright Act (“DMCA”).
Mass Registration and Automation. Accounts that are registered automatically or systematically will be removed and access will be permanently suspended.
Sexually Explicit Material. Accounts that use Programming.com to post sexually explicit or pornographic material, or links to it, will be suspended.
In order to access the moderator functions, our community moderators must review and accept the following terms:
- I acknowledge and agree that as a moderator for Programming.com Inc.
- I will abide by the then-current Terms of Service of Programming.com, and other moderator policies made available to me,
- I acknowledge that I may have access to potentially personally-identifying information about Programming.com users and that in connection with such access
- I will not disclose this information to anyone,
- I will not store or copy this information and
- I will only use such information in connection with performance as a Programming.com moderator for the benefit of Programming.com.
- I acknowledge and agree that I am an independent volunteer moderator to Programming.com and I am not an employee, agent or representative of Programming.com Inc., and I have no authority to bind Programming.com Inc. in any manner. Programming.com Inc. reserves the right to terminate my privileges as a moderator at any time without warning.