Privacy Policy
Our Commitment to Privacy
​
Sheevolution Africa ("We") are committed to protecting the privacy of our site visitors and students. This policy describes how we treat personal information collected on our website or in our offline activities. By visiting our site or participating in our programs, you agree to the use of data under this policy.
Information Collected
​
We may collect personal information such as names, contact information, demographic data (such as zip code, age, and gender), and other information voluntarily provided by our users (such as interests and preferences).
​
However, we do not collect any sensitive personal information like racial or ethnic origin, political opinions, or religious or philosophical beliefs from users unless there is a clear and compelling reason to do so.
​
How We Use Information
​
We use personal information to operate our site and deliver the services, products, or information you have requested.
We may also use your information to improve our programs, communicate with you, and customize your experience on our site. We do not share personal information with third parties for their marketing purposes without consent.
​
Data Security Measures
​
We have implemented reasonable physical, administrative, and technical safeguards to protect personal data from loss, misuse, and unauthorized access, disclosure, alteration, and destruction. However, "perfect security" does not exist on the Internet.
​
Some of the data security measures we have in place include:
- Firewalls and SSL/TLS encryption: We use industry-standard firewalls and SSL/TLS encryption to help prevent unauthorized access to our networks and personal data.
- Access limitations: Access to personal data is restricted only to our employees and volunteers who need to know that information to operate our program.
- Device encryption: Any devices that store personal data (such as computers and mobile devices) are protected with encryption software and strong passwords.
- Secure data transmission: We use secure transmission methods like SSL/TLS to transfer and deliver all personal data.
- Authentication procedures: We adopt reasonable procedures to authenticate users who request access to personal data, such as multi-factor authentication.
- Vulnerability scanning and testing: We conduct periodic vulnerability scans and testing of our security systems and processes to identify and address potential risks.
- Incident response: We have an incident response plan in place in case of a data breach so we can notify individuals quickly.
​
While no security measures are completely foolproof, we take data security very seriously at our organization and make our best efforts to protect any personal data provided to us.
Accessing and Modifying Personal Information
​
You can access personal information held about you by contacting us. We aim to allow valid updates to personal information if necessary depending on our legal obligations.
Privacy Policy Change
​
If we change our privacy policies and procedures, we will post those changes on this page to keep you aware of what information we collect, how we use it, and under what circumstances we may disclose it.
​
Contact Us
If you have any other questions about our privacy policy, please contact us.