Who are we?
The address of our website is:
Use of personal data collected
When you leave a comment on our website, not only the data entered in the comment form, but also your IP address and your browser’s user agent are collected to help us detect unwanted comments.
If you are a registered user and you upload images to the website, we advise you to avoid uploading images containing EXIF GPS coordinate data. Visitors to your website can download and extract location data from these images.
When you fill out a form on our site, we collect the following information: your name, your email address, and any personal information you may communicate to us regarding your request, project or quote request.
This data is collected in order to establish a first contact and to answer as close as possible to your request by elaborating an answer related to the proposed services or a quotation.
The obligatory or optional character is indicated to you at the time of collection by an asterisk.
If you leave a comment on our site, you will be asked to save your name, e-mail address and website in cookies. This is only for your convenience so that you do not have to enter this information if you make another comment later. These cookies expire after one year.
If you have an account and log on to this site, a temporary cookie will be created to determine if your browser accepts cookies. It does not contain any personal data and will be deleted automatically when you close your browser.
When you log in, we will set a number of cookies to save your login information and screen preferences. The lifetime of a login cookie is two days, that of a screen option cookie is one year. If you check “Remember me”, your cookie will be stored for two weeks. If you log out of your account, the cookie will be deleted.
When you edit or post a publication, an additional cookie will be stored in your browser. This cookie does not contain any personal data. It simply indicates the ID of the publication you have just modified. It expires after one day.
Embedded content from other sites
Articles on this site may include embedded content (e.g. videos, images, articles…). Content embedded from other sites behaves in the same way as if the visitor were visiting that other site.
Statistics and audience measurement
To measure the performance and audience of our website, we use the right Google Analytics. Here are the main data collected by Google Analytics: IP addresses, date and time of connection, connection duration, pages visited, language, browser used, network and operator, origin (direct, social networks, organic search, paid search, etc.), pages viewed.
This data is collected for the sole purpose of improving the user experience of Internet users on our site, by adapting the site to their needs and expectations.
Use and transmission of your personal data
How long you can store your data
If you leave a comment, the comment and its metadata are retained indefinitely. This makes it possible to automatically recognize and approve subsequent comments instead of leaving them in the moderation queue.
For users who register on our site (if possible), we also store the personal data indicated in their profile. All users can view, modify or delete their personal information at any time (except for their username-ice). The site managers can also view and modify this information.
For any request to view, modify or delete your data, send a message to firstname.lastname@example.org about the message: Exercise your rights.
The rights you have over your data
If you have an account or if you have left comments on the site, you can request to receive a file containing all the personal data we have about you, including those you have provided. You may also request the deletion of your personal data. This does not include data stored for administrative, legal or security purposes.
Transmission of your personal data
Visitors’ comments can be verified using an automated service to detect unwanted comments.
Your personal data may be shared with the following third party services:
The OVH hosting company whose datacenters are located in France and whose hosting and email pro offers we use;
WordPress and the following extensions: Akismet.
Concerning all other data, Edwige YOMBI SITOU undertakes not to transfer or sell your personal information to third parties or to use this information for unintended purposes.
We are committed to providing you with the right to object and withdraw your personal information.
The right of opposition gives you the possibility to refuse that your personal information be used for certain purposes mentioned at the time of collection.
The right of withdrawal gives you the possibility to request that your personal information no longer appear, for example, on a mailing list.
In order to exercise these rights, you may at any time send us your request by e-mail to the following address: email@example.com.
You can also send us this request by post:
For the attention of the Data Protection Officer
2 cour de la Gondoire 77600 Chanteloup-en-Brie, Marne-la-Vallée
How we protect your data
The personal information collected is kept in a secure environment. The people working for us are required to respect the confidentiality of your information.
In order to ensure the security of your personal information, we use the following measures:
Access management – authorized person
Network monitoring software
Login / Password
We are committed to maintaining a high degree of confidentiality by integrating the latest technological innovations to ensure the confidentiality of your transactions. However, since no mechanism offers maximum security, a degree of risk is always present when using the Internet to transmit personal information.
Procedures in the event of a data leakage
We first detect the leak through our internal notification systems. We send an email, within 72 hours of the finding, to the person concerned to inform him/her of the leak and provide him/her with as much information as possible so that he/she can assess the real risk to his/her rights and freedoms. We then analyze the security breach to correct it and prevent future similar breaches.