Who we are
Our website address is: https://www.southhillumc.org.
What personal data we collect and why we collect it
Security Logs
The IP address of visitors, user ID of logged in users, and username of login attempts are conditionally logged to check for malicious activity and to protect the site from specific kinds of attacks. Examples of conditions when logging occurs include login attempts, log out requests, requests for suspicious URLs, changes to site content, and password updates. This information is retained for 30 days.
We collect information about visitors who comment on Sites that use our Akismet anti-spam service. The information we collect depends on how the User sets up Akismet for the Site, but typically includes the commenter’s IP address, user agent, referrer, and Site URL (along with other information directly provided by the commenter such as their name, username, email address, and the comment itself).
Who we share your data with
This site is scanned for potential malware and vulnerabilities by Sucuri’s SiteCheck. We do not send personal information to Sucuri; however, Sucuri could find personal information posted publicly (such as in comments) during their scan. For more details, please see Sucuri’s privacy policy.
How long we retain your data
Security logs are retained for 30 days.
Where we send your data
This site is part of a network of sites that protect against distributed brute force attacks. To enable this protection, the IP address of visitors attempting to log into the site is shared with a service provided by ithemes.com. For privacy policy details, please see the iThemes Privacy Policy. Visitor comments may be checked through an automated spam detection service.
Our contact information
Any questions or clarifications to this policy or any procedures should be directed to:
South Hill United Methodist Church
105 Franklin St
South Hill, Virginia 23970
Additional information
How we protect your data
All website data, including any stored personal information, is backed up on our hosting computers. All systems in place, including local storage, are behind industry-standard firewall systems.
What data breach procedures we have in place
In the event of data breach, we will work with our security and hosting providers to determine the scope of said breach and notify any parties regarding compromised information.