Privacy Policy

Who we are

Our website address is: https://keithdigitalprint.co.za. we offer a whole range of digital solutions to companies that sought to get digitalise.

At Keith Digital Print, we specialize in providing a comprehensive range of digital solutions tailored to meet the needs of companies seeking to digitalize their operations. Our services encompass a wide array of offerings aimed at enhancing efficiency, productivity, and competitiveness in today’s digital landscape.

  1. Website Development and Design: We create stunning, responsive websites that effectively represent your brand identity and engage your target audience.
  2. Graphic Design: Our talented team of designers crafts visually compelling graphics, logos, and branding materials to help your business stand out in the digital sphere.
  3. Digital Marketing: We develop and execute strategic digital marketing campaigns utilizing various channels such as social media, email marketing, search engine optimization (SEO), and pay-per-click (PPC) advertising to drive traffic, generate leads, and increase conversions.
  4. E-commerce Solutions: We build customized e-commerce platforms that enable seamless online transactions, providing your customers with a convenient shopping experience while maximizing your revenue potential.
  5. Mobile App Development: Our experienced developers design and build user-friendly mobile applications that cater to your specific business requirements, allowing you to connect with your customers anytime, anywhere.
  6. Content Management Systems (CMS): We implement robust CMS solutions like WordPress, Drupal, or custom-built systems, empowering you to efficiently manage and update your website content with ease.
  7. Digital Printing Services: With state-of-the-art digital printing technology, we offer high-quality printing solutions for various marketing materials, including business cards, brochures, flyers, and signage.
  8. Data Analytics and Reporting: We utilize advanced analytics tools to track and analyze key performance metrics, providing valuable insights into your digital initiatives’ effectiveness and guiding future decision-making processes.
  9. Training and Support: We offer comprehensive training and ongoing support to ensure that you and your team are proficient in utilizing our digital solutions effectively, maximizing their impact on your business objectives.

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

  1. Comments Form Data: We collect the information provided by visitors in the comments form, which typically includes their name, email address (optional), website (optional), and the message they wish to convey. This data allows us to engage with our visitors, address their inquiries or feedback, and foster a sense of community around our content.
  2. IP Address: We also collect the visitor’s IP address. An IP address is a unique numerical label assigned to each device connected to a computer network. We use this information primarily for security purposes and to help mitigate spam and abusive behavior on our website. Additionally, IP addresses can provide insights into the geographic location of our visitors, which may be useful for demographic analysis and targeted content delivery.
  3. Browser User Agent String: The browser user agent string contains information about the visitor’s web browser and operating system. This data helps us optimize our website’s compatibility and performance across different platforms and devices. Additionally, it aids in troubleshooting technical issues and ensuring a seamless browsing experience for our visitors.
  4. Spam Detection: We leverage the collected data, including comments, IP addresses, and browser user agent strings, to implement spam detection mechanisms. By analyzing patterns and characteristics associated with spam activities, such as repetitive or suspicious behavior, we can identify and filter out unwanted comments and prevent them from appearing publicly on our website.
  5. Data Protection and Privacy: We are committed to safeguarding the privacy and confidentiality of the data collected from our visitors. Our data handling practices comply with relevant privacy regulations, such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). We do not share or sell this data to third parties without explicit consent unless required by law or for legitimate business purposes, such as improving website security or performance.
  6. Visitor Rights: Visitors have the right to access, rectify, or delete their personal data collected through our website. They can contact us directly to exercise these rights or to inquire about our data processing practices. Additionally, we provide clear and transparent information about our data collection and usage policies through our privacy policy, which is readily accessible to all visitors.

By collecting and handling visitor data responsibly, we aim to create a safe, enjoyable, and trustworthy online environment for our visitors while maintaining compliance with applicable privacy laws and regulations

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

  1. Location Data (EXIF GPS): When users upload images to our website, we ensure that any embedded location data in the image file, known as EXIF GPS data, is removed or stripped from the image before it is made publicly accessible. EXIF (Exchangeable Image File Format) data contains various metadata, including GPS coordinates, which can reveal the geographic location where the image was captured. By removing this information, we prevent visitors from extracting sensitive location data associated with the uploaded images.
  2. Image Metadata Scrubbing: As part of our image upload process, we employ techniques to scrub or sanitize the metadata embedded within the image files. This includes removing not only location data but also other potentially sensitive information such as camera make and model, date and time of capture, and authorship details. By thoroughly sanitizing the image metadata, we mitigate the risk of unintentionally exposing personal or identifying information to website visitors.
  3. User Education: We inform users about the importance of privacy and security considerations when uploading images to our website. Through clear guidelines and instructions, we encourage users to review and sanitize their images before uploading them to ensure that no sensitive metadata, including location data, is inadvertently included. Additionally, we provide resources and tools to help users understand how to inspect and modify image metadata using readily available software applications.
  4. Automatic Metadata Stripping: To streamline the process and enhance security, we utilize automated tools and scripts that automatically strip or anonymize metadata from uploaded images as part of the uploading process. This ensures consistency and thoroughness in metadata sanitization while minimizing the manual effort required from users.
  5. Regular Audits and Monitoring: We conduct regular audits and monitoring of uploaded content to detect any potential instances where sensitive metadata may have been overlooked or inadvertently exposed. By proactively identifying and addressing any issues, we maintain the integrity of our privacy and security measures and uphold the trust of our website visitors.

By implementing these measures, we prioritize the protection of user privacy and security when handling image uploads on our website. We are committed to maintaining a safe and secure online environment where users can confidently interact with content without compromising their personal information.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

  1. Purpose of Cookies: When visitors leave comments on our website, they have the option to opt-in to saving their name, email address, and website in cookies. These cookies serve the purpose of enhancing user convenience by remembering the user’s details, so they don’t have to fill in their information again when leaving another comment in the future.
  2. Duration of Cookies: The cookies storing commenter information will have a duration of one year. This means that if a visitor chooses to opt-in and save their details, the cookies will remain on their device for one year, providing seamless and convenient access to the comment form during subsequent visits to our website.
  3. Consent: By leaving a comment and choosing to opt-in to save their information in cookies, visitors are giving their explicit consent for the storage and use of their personal data for the specified purpose. We provide clear information and options for visitors to make informed choices about their data privacy preferences.
  4. Data Security: We prioritize the security and confidentiality of user data stored in cookies. The information stored in these cookies is encrypted and securely transmitted between the visitor’s device and our server. We adhere to industry best practices and standards to safeguard against unauthorized access, disclosure, alteration, or destruction of user data.
  5. User Control: Visitors have full control over their cookie preferences and can choose to opt-in or opt-out of cookie storage for commenter information at any time. We provide easy-to-use controls and settings that allow users to manage their cookie preferences, including the ability to delete or block cookies through their web browser settings.
  6. Transparency: We are committed to transparency regarding our use of cookies and their purposes. We provide detailed information about our cookies policy, including the types of cookies used, their purposes, and how users can manage their preferences, in our privacy policy and cookie notice, which are readily accessible to all visitors.
  7. Compliance: Our cookies policy complies with relevant regulations and guidelines, including the General Data Protection Regulation (GDPR), ePrivacy Directive (EU Cookie Law), and other applicable data protection laws. We regularly review and update our cookies policy to ensure ongoing compliance with evolving legal requirements and best practices.

By implementing this cookies policy, we aim to balance user convenience with data privacy and security, providing a positive and transparent user experience on our website.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

This websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

  1. Data Collection: Our website may collect various types of data about visitors, including personally identifiable information (PII) such as name, email address, and IP address, as well as non-personally identifiable information (non-PII) such as browsing behavior, device information, and demographic data. This data collection allows us to personalize the user experience, analyze website performance, and improve our services.
  2. Use of Cookies: We utilize cookies, which are small text files stored on the visitor’s device, to enhance website functionality and user experience. These cookies may include essential cookies necessary for website operation, performance cookies for analytics purposes, and targeting/advertising cookies to deliver personalized content and advertisements. By accepting our cookie policy, visitors consent to the use of cookies as described in our privacy policy and cookie notice.
  3. Third-Party Tracking: Our website may embed additional third-party content, such as videos, social media widgets, advertisements, and external scripts, from third-party providers or platforms. These third-party elements may employ their own tracking technologies, including cookies, web beacons, and tracking pixels, to monitor visitor interaction with the embedded content. Third-party tracking enables providers to gather data about visitor behavior, preferences, and interests for analytics, advertising, and personalized content delivery purposes.
  4. User Authentication: If visitors have accounts and are logged in to third-party websites or platforms (e.g., social media accounts), their interaction with embedded content on our website may be tracked and associated with their respective accounts. This tracking allows for seamless integration and personalized user experiences across multiple platforms, but it also means that user activity on our website may be monitored and analyzed by third parties.
  5. Privacy and Consent: We prioritize user privacy and transparency regarding data collection and tracking practices. Our privacy policy and cookie notice provide detailed information about the types of data collected, purposes of data usage, and options for managing cookie preferences. Visitors are informed about the presence of third-party tracking and have the choice to opt-in or opt-out of such tracking activities. By accessing and using our website, visitors implicitly consent to the data collection and tracking practices outlined in our privacy policy and cookie notice.
  6. Data Protection and Security: We implement appropriate technical and organizational measures to protect visitor data against unauthorized access, disclosure, alteration, and destruction. This includes encryption, access controls, regular security audits, and compliance with data protection regulations such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).

By expanding on these points, we aim to provide visitors with a comprehensive understanding of our data collection, cookie usage, and third-party tracking practices, empowering them to make informed decisions about their privacy preferences when interacting with our website.

Who we share your data with

If you request a password reset, your IP address will be included in the reset email.

  1. Password Reset Requests: When a user requests a password reset on our website, their IP address may be included in the reset email for security and verification purposes. Including the IP address helps to verify the authenticity of the password reset request and mitigate potential unauthorized access attempts.
  2. Internal Use: The IP address included in the password reset email is solely used for internal verification and security purposes by our website administrators or support team. It is not shared with any external parties unless required by law or as necessary to investigate and address security incidents or breaches.
  3. Security Measures: We prioritize the protection of user accounts and personal information by implementing robust security measures, including IP address logging and verification for password reset requests. By including the IP address in the reset email, we add an additional layer of security to the password reset process, helping to prevent unauthorized access to user accounts.
  4. Data Retention: The IP address included in the password reset email is retained only for the duration necessary to process the password reset request and ensure the security of the user account. Once the reset process is completed, the IP address information is securely stored and may be purged from our systems in accordance with our data retention policies.
  5. User Notification: We provide transparency to users regarding the inclusion of their IP address in password reset emails through our privacy policy or terms of service. Users are informed about this practice and its purpose to enhance account security and prevent unauthorized access.
  6. User Control: Users have control over their account security settings and can take proactive measures to protect their accounts, such as enabling two-factor authentication and regularly updating their passwords. Additionally, users can contact our support team if they have any concerns or questions about the handling of their personal information during the password reset process.

By expanding on these points, we aim to provide clarity and assurance to users about how their data, specifically IP addresses, may be shared and used during the password reset process on our website. Our priority is to maintain the highest standards of security and privacy to safeguard user accounts and personal information

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

  1. User Registration: For users who register on our website, we collect and store the personal information they provide during the registration process. This may include but is not limited to their name, email address, username, and any additional profile information they choose to provide.
  2. Storage of Personal Information: The personal information provided by registered users is securely stored in their user profile within our website’s database. This information is used to facilitate user authentication, personalize the user experience, and enable interaction with website features and functionalities.
  3. User Access and Control: All registered users have full control over their personal information stored in their user profile. They can access, view, edit, or delete their personal information at any time through their account settings or profile management interface. This includes updating their name, email address, and other profile details. However, users typically cannot change their username due to system limitations or security considerations.
  4. Administrator Access: Website administrators have privileged access to view and edit the personal information stored in user profiles. This access is necessary for administrative tasks such as user account management, moderation of user-generated content, and responding to user inquiries or support requests. Administrators are required to adhere to strict confidentiality and data protection policies when handling user information.
  5. Data Security: We implement robust security measures to protect the personal information stored in user profiles against unauthorized access, disclosure, alteration, and deletion. This includes encryption, access controls, and regular security audits to ensure compliance with industry best practices and data protection regulations.
  6. User Communication: We communicate transparently with users about the collection, storage, and management of their personal information through our privacy policy, terms of service, and user agreements. Users are informed about their rights and options regarding the control and management of their personal data, including the ability to delete their accounts if they choose to do so.

By expanding on these points, we aim to demonstrate our commitment to user privacy, data protection, and transparency in the handling of personal information for registered users on our website. Our goal is to empower users with control over their data and ensure a safe and secure online experience for all users.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

  1. Data Access Request: Users who have an account on our website or have left comments have the right to request access to the personal data we hold about them. This includes any data they have provided to us during account registration, comment submission, or other interactions with our website. Users can submit a formal request to receive an exported file containing their personal data, which allows them to review and verify the accuracy and completeness of the information we hold about them.
  2. Data Erasure Request: In addition to accessing their personal data, users also have the right to request the erasure or deletion of any personal data we hold about them. This includes information stored in their user profile, comments they have posted on our website, or any other personal data collected during their interactions with our website. Users can request the removal of their personal data if they believe it is no longer necessary for the purposes for which it was collected or if they withdraw their consent for its processing.
  3. Exclusions: It’s important to note that certain types of personal data may be excluded from erasure requests if they are subject to legal, administrative, or security obligations that require us to retain such data for compliance purposes. This may include data retained for accounting records, dispute resolution, fraud prevention, or security investigations. However, we ensure that any retained data is handled securely and in accordance with applicable data protection laws and regulations.
  4. Request Process: Users can submit requests for access to or erasure of their personal data through designated channels provided on our website, such as a contact form or dedicated request portal. Upon receiving a valid request, we will promptly verify the user’s identity and process the request in accordance with our internal procedures and legal obligations. We strive to respond to data access and erasure requests in a timely and transparent manner, keeping users informed about the status and outcome of their requests.
  5. User Rights Awareness: We educate users about their rights regarding personal data access and erasure through our privacy policy, terms of service, and user agreements. We provide clear and accessible information about the process for submitting data access and erasure requests, as well as the conditions and limitations associated with such requests.

Where your data is sent

Visitor comments may be checked through an automated spam detection service.

  1. Automated Spam Detection Service: Visitor comments submitted on our website may be sent to an automated spam detection service for analysis and verification. These spam detection services utilize advanced algorithms and machine learning techniques to assess the content of comments and identify potential spam or malicious activity.
  2. Purpose of Sending Data: The primary purpose of sending visitor comments to an automated spam detection service is to enhance website security and maintain the integrity of user-generated content. By analyzing comments in real-time, these services can effectively identify and filter out spam, irrelevant content, or potentially harmful links that may pose risks to website visitors or compromise the website’s reputation.
  3. Data Transmission: When visitor comments are sent to the automated spam detection service, the content of the comments, along with associated metadata such as the commenter’s IP address, user agent string, and other relevant information, may be transmitted securely over the internet to the service provider’s servers for analysis.
  4. Data Handling: The automated spam detection service processes the received data using proprietary algorithms and databases to evaluate the likelihood of each comment being spam or legitimate. Depending on the outcome of the analysis, comments may be flagged for manual review by website administrators or automatically approved or rejected based on predefined criteria.
  5. Data Retention: The duration for which visitor comments are retained by the automated spam detection service may vary depending on the service provider’s policies and agreements with website administrators. Typically, comments are retained for a limited period to facilitate ongoing analysis and improve the accuracy of the spam detection algorithms.
  6. Data Privacy and Security: We ensure that the transmission of visitor data to the automated spam detection service complies with industry-standard encryption protocols and data protection regulations. We prioritize user privacy and data security by implementing measures to safeguard against unauthorized access, disclosure, or misuse of visitor data during transit and processing.
  7. Transparency: We provide clear and transparent information to website visitors about the use of automated spam detection services and the handling of their comments and associated data. This information is communicated through our privacy policy, terms of service, or dedicated notices on our website to ensure that visitors are aware of how their data is used and protected.