Who we are
This is: https://cfpathways.com. I am a CERTIFIED FINANCIAL PLANNER™ Professional, Certified Career Development Specialist and sole proprietor of Career & Financial Pathways.
Personal data we collect and why
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
Payment & Scheduling forms
Other Forms & Comments
Our contact form submissions are seen by Ray Giese and if necessary, I will share your notes with another contractor. Any contact form submissions are kept less than or up to five years unless needed longer.
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue. Visitor comments may be checked through an automated spam detection service.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
To opt out of being tracked by Google Analytics across all websites visit: http://tools.google.com/dlpage/gaoptout.
Who we share your data with
Other than the companies that help us to collect your data, cfpathways.com shares your data with no one unless you have given us your personal consent.
How we protect your data
cfpathways.com uses an SSL certificate. SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. SSL is an industry standard and is used by millions of websites in the protection of their online transactions with their customers.
What data breach procedures we have in place
If a data breach is detected the steps outlined by the Federal Trade Commission’s website will be followed as closely as possible.