Who we are
Magicspore LTD group and our address is: https://magicspore.com.
What Personal Data We Collect and Why We Collect It Comments When a website visitor leaves a comment, we collect the data visible in the commenting form, as well as the visitor’s IP address and browser signature to help detect spam.
If you are a registered user and uploading pictures to your site, you should avoid uploading pictures with EXIF location tags. Visitors to the website can download and extract full location data from pictures on the website. Contact forms Cookies If you leave a comment on our website, you will be able to choose the option of saving your name, email address and website address in cookies, thanks to which the above information will be conveniently completed when writing further comments. These cookies will last for a year. If you visit the login page, we will create a temporary cookie to check if your browser accepts cookies. This cookie contains no personal data and will be discarded when you close your browser.
When logging in, we additionally create a few cookies needed to save your login information and selected screen options. Login cookies last for two days, and screen options cookies last for a year. If you select the “Remember me” option, login will expire after two weeks. If you log out of your account, the login cookies will be deleted. If you edit or publish an article, an additional cookie will be saved in your browser.
This cookie does not contain any personal data, it simply indicates the ID of the article you just edited. It expires after 1 day. Embedded content from other websites Articles on this site may contain embedded content (e.g. videos, pictures, articles, etc.). Embedded content from other websites behaves in a similar way as if the user has visited a specific website directly.
Where we send your data :
Visitor comments may be checked through an automated spam detection service. Your contact details Additional information
How do we protect your data?
All our data are encrypted as well as all devices we use are also encrypted also with few factor of authorizations.
What procedures we have in place in the event of a data privacy breach From which third parties we receive data What automated decision making and / or profiling we do with user data Industry regulatory disclosure requirements.