Privacy Policy

Last updated: 8/24/2020
We value the privacy of individuals who visit our website and use our services. In order to provide our services, we need to collect certain pieces of information. This Privacy Policy is intended to help you understand what information we collect, why we collect it, and how you can control your information. You may contact us at [email protected] if you have any questions.

Section 1: Who we are and scope of this Privacy Policy

‘Streaming Professor’ is published by Menai Insight (“Menai Insight, LLC”, “we”, “our”, and/or “us”), a US company located in Michigan. We value your privacy and have developed this policy to cover the usage of streamingprofessor.com and related communications. If you use other services provided by Menai Insight, those services will be covered by separate privacy policies. 

Section 2: Information that we collect and process

Information directly provided by you to us.
If you contact us, you provide us with various pieces of information, such as your name, email address, contact message.

Information collected when using our websites and interact with us.
Like most websites, when you use our websites, we, and our trusted service providers (including our website hosts, analytics providers, advertising partners, and integrated social media services) gather various pieces of information, including via cookies and related technologies. Cookies are small files on your computer and are important to how our sites function and our ability to motor usage. If you interact with services such as social media (for example ‘liking’ or ‘sharing’ our page on social media), the associated partner will collect additional information associated with the interaction (for example, recording the like or share on their service). Similarly, if you click on an advert on our website, this will be recorded by our advertising partners.

Section 3: Why we collect and process the information

We collect information for four primary reasons:

  • To provide the services request to you
  • To improve and tailor our services
  • Based on our legitimate business interests
  • As necessary for record-keeping, legal reasons, and compliance

3.i) To provide the services request to you

When you provide information to us, we use that information to provide the services requested. For example, if you contact us or subscribe to our mailing list, we use the information that you provide to respond to your request or deliver our newsletter. Similarly, if you click to ‘like’ or ‘share’ a page on social media, our social media partners will use this information on their services to ‘like’ or ‘share’ the page.

3.ii) To improve and tailor our services

Website: We use the information collected to improve our service. For example, statistics collected as you browse our website are used to help improve page content and identify technical issues.

Contact with us: We use feedback and inquiries to improve our website, services, and support and tailor our offerings with you. For example, if you inquire about a particular feature, we may use this information to help our development or to keep you updated with improvements.

3.iii) Based on our legitimate business interests

Some of the information processed is based on our legitimate business interests. For example, consistent with many news and information outlets, we include adverts from trusted partners and advertising networks. This helps support us in providing free access to articles on our website, with individual and society benefits from access to our articles.

3.iv) As necessary for record-keeping, legal reasons, compliance, and security

Information is collected as is necessary to satisfy our various record-keeping, legal, compliance and and security obligations and to maintain the security and availability of our services.

Section 4: How we keep your information secure

We take the security of your information seriously and have put in place various practices to protect your data. These include partnering with trusted-organizations who have large experience in securing specific material; restricting internal access and training; physical and digital security.

Data security: We have in place a variety of security layers, including two-factor authentication, firewalls, and encryption as appropriate. Our service providers are also selected based on their experience and data security procedures.

Restricted access and training: We provide internal training to all employees who have access to any personal information. This covers training on this privacy policy, as well as physical security practices.