Data Security Policy

Last updated: 10/15/2024

1. Data Collection and Storage

  • We do not collect data from users

  • We securely store your signed paper waiver for one calendar year, then it is shredded January 1 of the new year.

  • A new waiver must be signed every new calendar year

  • Payment is processed securely on Squarespace partner sites Stripe and Quickbooks by encryption and access controls.

2. Access Control

  • Limited access: Only personnel authorized Handsome Acres Farm LLC can access user data (Email address and amount of payment).

  • To manage or website, strong passwords are enforced.

3. Data Transmission

  • Squarespace, Stripe, Acuity Scheduling and Quickbooks uses secure protocols to transmit data.

  • Data encryption: Sensitive information is encrypted during transmission.

4. Third Parties

  • Stripe and Acuity Scheduling have access to user data when signing up for classes including email address and amount of payment.

  • We partner with Squarespace who integrates with Stripe payment processor, Acuity scheduling and Quickbooks who comply with industry security standards.

5. Regular Audits

  • We conduct periodic security audits to identify vulnerabilities.

  • Prompt action: Any security issues will be addressed promptly.

6. Incident Response

  • In case of a data breach, our payment processor Stripe, Quickbooks and Squarespace will activate their own predefined incident response plan.

  • We notify affected users and take necessary steps to mitigate damage.

7. User Rights

  • Users have the right to access, correct, or delete their data.

  • Requests are processed within a reasonable timeframe.

8. Employee Training

  • Our staff receives security training to handle user data responsibly.

  • They understand the importance of safeguarding user information.

9. Privacy Policy

  • This privacy policy outlines data handling practices.

  • Users can easily find this form on our website homepage

10. Continuous Improvement

  • We stay informed about security best practices and adapt as needed.

  • Feedback from users helps us enhance our security measures.