You can review your Privacy Preferences at any time by clicking:
WHO WE ARE
https://john-5.com (hereafter known as john-5.com, john-5.com/main or the official John 5 website, or referred to as We/Us/Our), is committed to safeguarding your privacy. Contact us at email@example.com if you have any questions or problems regarding the use of your Personal Data and we will gladly assist you.
We have made it easy for you to see the different elements that make up our Privacy Page. Click one of the links below to be taken directly to the relevant section on this page.
- Click to read What personal data we collect and why we collect it
- Click to find out about embedded content from other websites
- Click to find out about the use of analytics and it’s data on-site
- Click to find out see how we share our data with trusted and third-party partners
- Click to find out see how long we retain your data on-site
- Click to find out your rights over your data and how you can manage the data we hold at john-5.com. Includes data we hold, deleting your data and correcting data
- Click to find out where your data may be sent
- Click to find out how to contact us if you have a privacy-specific concern
- Click to find out how john-5.com attempts to keep your personal data safe
- Click to find out our policy on children’s (under 16) data
- Click to find out how to protect your children online data
- Click to read how we will follow the data protection principles
- We reserve the right to make changes to this policy. Click to find out when the page was last modified
WHAT PERSONAL DATA WE COLLECT AND WHY.
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
We use the native WordPress Comment platform to power and moderate the comments on john-5.com, with additions from WordPress/Automattic’s Jetpack Plugin. When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. We also use Jetpack for a number of other features on the site/ Click the prompt below to see what features we are using from Jetpack, what data is being collected and how it affects you the user of the site.
Data Jetpack and WordPress uses and tracks:
This feature only records activities of a site’s registered users, and the retention duration of activity data will depend on the site’s plan and activity type.
Data Used: To deliver this functionality and record activities around site management, the following information is captured: user email address, user role, user login, user display name, WordPress.com and local user IDs, the activity to be recorded, the WordPress.com-connected site ID of the site on which the activity takes place, the site’s Jetpack version, and the timestamp of the activity. Some activities may also include the actor’s IP address (login attempts, for example) and user agent.
Activity Tracked: Login attempts/actions, post and page update and publish actions, comment/pingback submission and management actions, plugin and theme management actions, widget updates, user management actions, and the modification of other various site settings and options. Retention duration of activity data depends on the site’s plan and activity type. See the complete list of currently-recorded activities (along with retention information).
Data Synced (?): Successful and failed login attempts, which will include the actor’s IP address and user agent.
Image views are only recorded if the site owner, has explicitly enabled image view stats tracking for this feature via the
Data Used: If image view tracking is enabled, the following information is used: IP address, WordPress.com user ID (if logged in), WordPress.com username (if logged in), user agent, visiting URL, referring URL, timestamp of event, browser language, country code.
Activity Tracked: Image views.
Data Used: If Akismet is enabled on the site, the contact form submission data — IP address, user agent, name, email address, website, and message — is submitted to the Akismet service (also owned by Automattic) for the sole purpose of spam checking. The actual submission data is stored in the database of the site on which it was submitted and is emailed directly to the owner of the form (i.e. the site author who published the page on which the contact form resides). This email will include the submitter’s IP address, timestamp, name, email address, website, and message.
Data Synced (?): Post and post meta data associated with a user’s contact form submission. If Akismet is enabled on the site, the IP address and user agent originally submitted with the comment are synced, as well, as they are stored in post meta.
Data Used: Commenter’s name, email address, and site URL (if provided via the comment form), timestamp, and IP address. Additionally, a jetpack.wordpress.com IFrame receives the following data: WordPress.com blog ID attached to the site, ID of the post on which the comment is being submitted, commenter’s local user ID (if available), commenter’s local username (if available), commenter’s site URL (if available), MD5 hash of the commenter’s email address (if available), and the comment content. If Akismet (also owned by Automattic) is enabled on the site, the following information is sent to the service for the sole purpose of spam checking: commenter’s name, email address, site URL, IP address, and user agent.
Activity Tracked: The comment author’s name, email address, and site URL (if provided during the comment submission) are stored in cookies. Learn more about these cookies.
Data Synced (?): All data and metadata (see above) associated with comments. This includes the status of the comment and, if Akismet is enabled on the site, whether or not it was classified as spam by Akismet.
This feature is only accessible to users logged in to WordPress.com.
Data Used: In order to process a post like action, the following information is used: IP address, WordPress.com user ID, WordPress.com username, WordPress.com-connected site ID (on which the post was liked), post ID (of the post that was liked), user agent, timestamp of event, browser language, country code.
Activity Tracked: Post likes.
This feature is only accessible to registered users of the site who are logged in to WordPress.com.
Data Used: IP address, WordPress.com user ID, WordPress.com username, WordPress.com-connected site ID and URL, Jetpack version, user agent, visiting URL, referring URL, timestamp of event, browser language, country code. Some visitor-related information or activity may be sent to the site owner via this feature. This may include: email address, WordPress.com username, site URL, email address, comment content, follow actions, etc.
Activity Tracked: Sending notifications (i.e. when we send a notification to a particular user), opening notifications (i.e. when a user opens a notification that they receive), performing an action from within the notification panel (e.g. liking a comment or marking a comment as spam), and clicking on any link from within the notification panel/interface.
Data Used: In order to check login activity and potentially block fraudulent attempts, the following information is used: attempting user’s IP address, attempting user’s email address/username (i.e. according to the value they were attempting to use during the login process), and all IP-related HTTP headers attached to the attempting user.
Activity Tracked: Failed login attempts (these include IP address and user agent). We also set a cookie (
jpp_math_pass) for 1 day to remember if/when a user has successfully completed a math captcha to prove that they’re a real human. Learn more about this cookie.
Data Synced (?): Failed login attempts, which contain the user’s IP address, attempted username or email address, and user agent information.
This feature is only available to sites on the Professional plan.
Data Used: Any of the visitor-chosen search filters and query data in order to process a search request on the WordPress.com servers.
Data Used: IP address, WordPress.com user ID (if logged in), WordPress.com username (if logged in), user agent, visiting URL, referring URL, timestamp of event, browser language, country code. Important: The site owner does not have access to any of this information via this feature. For example, a site owner can see that a specific post has 285 views, but he/she cannot see which specific users/accounts viewed that post. Stats logs — containing visitor IP addresses and WordPress.com usernames (if available) — are retained by Automattic for 28 days and are used for the sole purpose of powering this feature.
A cookie is a tiny text file stored on your computer. Cookies store information that is used to help make sites work. Only we can access the cookies created by our website. You can control your cookies at the browser level. Choosing to disable cookies may hinder your use of certain functions.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
Please note: The cookie scan undertaken picks up both cookies for john-5.com/main/ and john-5.com/store/.
Cookies are small text files that can be used by websites to make a user’s experience more efficient.
The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission.
This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages.
You can at any time change or withdraw your consent from the Cookie Declaration on our website.
Your consent applies to the following domains: john-5.com
- Collect any personally identifiable information without your express permission.
- We do not collect sensitive data except that given with express permission.
- We do not pass on personally identifiable data to third parties.
- We do not sell data to third parties in order for marketing or otherwise.
(We do share information to our trusted partners, including the artist, artist PR representatives regarding specific enquiries, the artists online store manager. This is in relation to enquiries about tour dates, contests, crowd funding queries. This information is not shared elsewhere. In most cases the only info shared is a specific question that a site user may have. It is only in cases where one of these trusted partners will need to contact you to resolve the query, that we will pass on information: this will be your name and email address only.)
How to control cookies on your browser:
Alternatively, you can control cookies via your browser – remember that if you turn off cookies in your browser then these settings apply to all websites not just john-5.com.
How to control cookies via your browser
- Internet Explorer: http://support.microsoft.com/kb/278835 (this page links to further information for different versions of IE – the mobile version is at http://www.microsoft.com/windowsphone/en-us/howto/wp7/web/changing-privacy-and-other-browser-settings.aspx).
- Chrome: http://support.google.com/chrome/bin/answer.py?hl=en-GB&answer=95647
- Safari: http://docs.info.apple.com/article.html?path=Safari/5.0/en/9277.html (or http://support.apple.com/kb/HT1677 for mobile versions)
- Firefox: http://support.mozilla.org/en-US/kb/Enabling%20and%20disabling%20cookies
- Blackberries: http://docs.blackberry.com/en/smartphone_users/deliverables/32004/Turn_off_cookies_in_the_browser_60_1072866_11.jsp
- Android: http://support.google.com/mobile/bin/answer.py?hl=en&answer=169022
- Opera: http://www.opera.com/browser/tutorials/security/privacy/
EMBEDDED CONTENT FROM OTHER WEBSITES
News posts and information pages on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
Full list of the data used for analytics data collection:
IP address, WordPress.com user ID (if logged in), WordPress.com username (if logged in), user agent, visiting URL, referring URL, timestamp of event, browser language, country code. Important: john-5.com does not have access to any of this information via this feature. For example, site administrators can see that a specific post has 285 views, but site administrators cannot see which specific users/accounts viewed that post. Stats logs — containing visitor IP addresses and WordPress.com usernames (if available) — are retained by Automattic for 28 days and are used for the sole purpose of powering this feature.
WHO WE SHARE YOUR DATA WITH
We do not share your Personal Data with strangers. Personal Data about you is in some cases provided to our trusted partners in order to either make providing the service to you possible or to enhance your customer experience. Click the accordion boxes below to see lists of our partners and links to their privacy policies.
Info under construction.
- The Official John 5 store: http://john-5.com/store/privacy-and-cookie-policy/
- Adrenaline PR: http://www.adrenalinepr.com
- Reunion Blues
- Marshall Amps
Connected Third Parties:
- BANDSINTOWN tour management for tour page:
– Un-tracking artists:https://bandsintown.desk.com/customer/en/portal/articles/1272587-un-tracking-artists
– Delete Account:https://bandsintown.desk.com/customer/en/portal/articles/2924597-how-to-delete-my-account
- FACEBOOK’S data use policy; http://www.facebook.com/about/privacy/your-info-on-other (we use Facebook for the comments and likes on the site)
HOW LONG WE RETAIN YOUR DATA
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website, we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
Data used for site visitors who use the Jetpack’s Contact form:
If Akismet is enabled on the site, the contact form submission data (IP address, user agent, email address, site URL, and comment) is submitted to the Akismet service (also owned by Automattic) for spam checking.
The actual submission data is stored in the database of the site on which it was submitted and is emailed directly to the owner of the form (i.e. the site author who published the page on which the contact form resides). This email will include the submitter’s IP address, timestamp, name, email address, website, and message.
The IP address is included as an abuse prevention measure. And for sites using Akismet, it is required for providing proper spam defense.
Data synced used for site visitors who use the Jetpack’s Contact form:
Jetpack syncs post and post meta data associated with a user’s contact form submission. If Akismet is enabled on the site, the IP address and user agent originally submitted with the comment are synced, as well, as they are stored in post meta.
WHAT RIGHTS YOU HAVE OVER YOUR DATA
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
The rights of the Data Subject (person whose Personal Data is being Processed)
- Right to information – meaning you have to right to know whether your Personal Data is being processed; what data is gathered, from where it is obtained and why and by whom it is processed.
- Right to access – meaning you have the right to access the data collected from/about you. This includes your right to request and obtain a copy of your Personal Data gathered.
- Right to rectification – meaning you have the right to request rectification or erasure of your Personal Data that is inaccurate or incomplete.
- Right to erasure – meaning in certain circumstances you can request for your Personal Data to be erased from our records.
- Right to restrict processing – meaning where certain conditions apply, you have the right to restrict the Processing of your Personal Data.
- Right to object to processing – meaning in certain cases you have the right to object to Processing of your Personal Data, for example in the case of direct marketing.
- Right to object to automated Processing – meaning you have the right to object to automated Processing, including profiling; and not to be subject to a decision based solely on automated Processing. This right you can exercise whenever there is an outcome of the profiling that produces legal effects concerning or significantly affecting you.
- Right to data portability – you have the right to obtain your Personal Data in a machine-readable format or if it is feasible, as a direct transfer from one Processor to another.
- Right to lodge a complaint – in the event that we refuse your request under the Rights of Access, we will provide you with a reason as to why. If you are not satisfied with the way your request has been handled please contact us.
- Right for the help of supervisory authority – meaning you have the right for the help of a supervisory authority and the right for other legal remedies such as claiming damages.
- Right to withdraw consent – you have the right withdraw any given consent for Processing of your Personal Data.
You can see the ways you can request the data we hold on you and how to get that data deleted below:
To request deletion of your account:
To request the data we have on you:
To request rectification of the data we have on you:
WHERE WE SEND YOUR DATA
Visitor comments are checked through an automated spam detection service called Akismet (An Automattic/Wordpress company).
The following information is sent to the service for the sole purpose of spam checking:
- commenter’s name
- email address
- site URL, IP address
- user agent.
john-5.com may share a yearly summary of analytics data with the artist and management team but this does not include IP addresses, user names, email addresses etc. It is simply a way for interested parties to see the daily, monthly, yearly, interaction with the site.
If you have a privacy-specific concern, please contact the site administrator at firstname.lastname@example.org. Additionally you can use the data tools as provided here: Click to find out your rights over your data and how you can manage the data we hold at john-5.com. Includes data we hold, deleting your data and correcting data
Site administrators do not share this information to any third parties. We only share it with our specific interested partners, IE: the artist, artists management, artist shop management, artists PR team.
Data that we process when you use Google
- When you set up a Google account, we store information you give us like your name, email address and telephone number.
- When you use Google services to do things such as write a message in Gmail or comment on a YouTube video, we store the information that you create.
- When you search for a restaurant on Google Maps or watch a video on YouTube, for example, we process information about that activity – including information such as the video that you watched, device IDs, IP addresses, cookie data and location.
- We also process the kind of information described above when you use apps or sites that use Google services such as ads, Analytics and the YouTube video player.
Why we process it
We process this data for the purposes described in our policy, including to:
- Help our services deliver more useful, customised content such as more relevant search results;
- Improve the quality of our services and develop new ones;
- Deliver personalised ads, both on Google services and on sites and apps that partner with Google;
- Improve security by protecting against fraud and abuse; and
- Conduct analytics and measurement to understand how our services are used.
We also combine data among our services and across your devices for these purposes. For example, we show you ads based on information from your use of Search and Gmail, and we use data from trillions of search queries to build spell-correction models that we use across all of our services.You’re in control
Depending on your account settings, some of this data may be associated with your Google Account and we treat this data as personal information. You can always adjust your controls later or withdraw your consent for the future by visiting My Account (myaccount.google.com).
HOW WE SECURE YOUR DATA
We do our best to keep your Personal Data safe. We use safe protocols for communication and transferring data (such as HTTPS). We use anonymising and pseudonymising where suitable. We monitor our systems for possible vulnerabilities and attacks. We do this with daily scans to detect malware, malicious content and any brute-force attack attempts. We also use robust firewalls that are set-up to inform the site administrators of any breaches/attempted breaches to the site and data contained.
Even though we try our best we can not guarantee the security of information. However, we promise to notify suitable authorities of data breaches. We will also notify you if there is a threat to your rights or interests. We will do everything we reasonably can to prevent security breaches and to assist authorities should any breaches occur.
If you have an account with us, note that you have to keep your username and password secret.
Data collected to secure the site from fraudulent attempts:
In order to check login activity and potentially block fraudulent attempts, the following information is used: attempting user’s IP address, attempting user’s email address/username (i.e. according to the value they were attempting to use during the login process), and all IP-related HTTP headers attached to the attempting user.
OUR POLICY REGARDING CHILDREN’S DATA
We do not intend to collect or knowingly collect information from children (person(s) under 13 years of age). We do not target children with our services.
PROTECTING YOUR CHILDREN ONLINE
DATA PROTECTION PRINCIPLES
We promise to follow the following data protection principles:
- Processing is lawful, fair, transparent. Our Processing activities have lawful grounds. We always consider your rights before Processing Personal Data. We will provide you information regarding Processing upon request.
- Processing is limited to the purpose. Our Processing activities fit the purpose for which Personal Data was gathered.
- Processing is done with minimal data. We only gather and Process the minimal amount of Personal Data required for any purpose.
- Processing is limited with a time period. We will not store your personal data for longer than needed.
- We will do our best to ensure the accuracy of data.
- We will do our best to ensure the integrity and confidentiality of data.
Last modification was made January 4, 2020, 16:29 GMT.