Privacy Policy
Last updated: 6/7/2016

Overview

This privacy policy outlines our practices for the types of information Trusted Sharing gathers, how we use it, with whom we share it, and the notices and choices affected individuals can expect regarding the information.

Maintaining your trust is our top priority. We may share your information with your consent or as required by law, and we will always let you know when we make significant changes to this Privacy Policy.

We protect your personal information and content and will only provide it to third parties: (1) with your consent; (2) where it is necessary to carry out your instructions; (3) as reasonably necessary in order to provide our features and functionality to you; (4) when we reasonably believe it is required by law, subpoena or other legal process; or (5) as necessary to enforce our User Agreement or protect the rights, property, or safety of Trusted Sharing, our Members and Visitors, and the public.

We will only share information or content that you designate as private with individuals or groups that you have authorized to have access to that information. Unless you specify otherwise, by default the following types of your information are regarded as private: your email addresses and other contact information, and email addresses and contact information that you have provided for your contacts (for example, when inviting them to join your Trusted Sharing conversations and groups), your Trusted Sharing password, passwords for any of your external platforms, and the strengths of interest and trust that you have designated for your contacts.

Users of Trusted Sharing will be able to see any of your other Trusted Sharing data or content that you do not mark as private. Authorized Trusted Sharing team members may be able to access your public and private data, but only for purposes described in this privacy policy. No other party will be given access to your private, personally identified information without your permission.

Non-personally-identifiable information

Like most website operators, Trusted Sharing collects non-personally-identifying information of the sort that web browsers and servers typically make available, such as the browser type, language preference, referring site, and the date and time of each visitor request. Trusted Sharing’s purpose in collecting non-personally identifying information is to better understand how Trusted Sharing’s visitors use the website. From time to time, Trusted Sharing may release non-personally-identifying information in the aggregate, e.g., by publishing a report on trends in the usage of its website.

Potentially-personally-identifiable information

Trusted Sharing also collects potentially personally-identifying information like Internet Protocol (IP) addresses. Trusted Sharing does not use such information to identify its visitors, however, and does not disclose such information, other than under the same circumstances that it uses and discloses personally-identifying information, as described below.

Data Security, Integrity and Access

Trusted Sharing will not sell, rent, or otherwise share any information you share with us. Access to your content and personally identifiable information is controlled internally. We will never view your private content without your consent. Trusted Sharing takes reasonable steps and uses industry standards to protect your content from loss, misuse and unauthorized access, disclosure, alteration and destruction.

From time to time, Trusted Sharing team members may access your email address to send you information about the site or ask for feedback, either personally or through an email provider. If you do not wish to receive these emails please respond with a request to be taken off the contact list, or unsubscribe by clicking the unsubscribe link at the bottom of the email, or by changing your subscription settings.

Data backup, archiving services and disaster recovery are also managed automatically and seamlessly. The software and data is automatically backed up as part of the deployment process on secure, access controlled, and redundant storage. We use these backups to deploy the Trusted Sharing software and data across the platform and automatically bring the application back online in the event of an outage.

Trusted Sharing does not have scheduled outage windows. We may occasionally need to schedule outages and these would be performed at low-use times. Such outages typically last from 5 to 30 minutes.

Changes

We will always maintain the overriding principle that we will not sell or rent any private information you share with us without your authorization. However, we may change other aspects of this policy. Any amended policy is effective upon posting to this website, and we will tell you about these changes via email or through the site.

Thanks for taking the time to learn about our privacy policy. We feel it's increasingly important for people to know exactly how their information is treated online, so we've tried to make the policy as clear and specific as possible. If you have any questions or concerns, please contact us.

Case Studies

Expanding a Short Course at NYU through Trusted Sharing
Adding Trusted Sharing Conversations to a Consulting Process
Facilitated Strategic Planning Workshop with TS Conversations Before and After
Trusted Sharing Conversations Enhance Learning from Blogs