Privacy Policy

The podcast Captivated Audience respect the privacy of every individual who visits our web site or uses the contact questionnaire to get in touch with us. This Privacy Policy explains our online information practices and the way your information is collected and used. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.

This notice applies to all information collected or submitted on our web site, unless otherwise posted.

Captivated Audience respect your privacy

Did you visit our website? We collected your information!

When visiting our website your IP-address or other details may also be logged to help improve your experience.

Do we use ‘cookies’?

Yes, we do. Read more about cookies here – (link to external website)

You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser’s Help Menu to learn the correct way to modify your cookies.

If you turn cookies off, some of the features that make your site experience more efficient may not function properly.

Did you use the contact form? We collected your information!

When entering your contact information on our site, as appropriate, you may be asked to enter your name, email address and phone number.

Will we use your information?

We may use the information we collect from you to reply to your questions or to get in touch by sending you an email or give you a call back.

Is your information protected?

As a data controller, we intend to act reasonably to protect your privacy, but we cannot guarantee security against issues beyond our control. We implement a variety of security measures when a user enters, submits, or accesses their information to maintain the safety of your personal information. Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems and are required to keep the information confidential. In addition, all sensitive information you supply is encrypted via Secure Socket Layer (SSL) technology. We also use regular malware scanning software.