BusinessProfit2.2

Search
Generic filters
Exact matches only
Search in title
Search in content
Filter by Custom Post Type
Products
Courses
Lessons
Topics
Menu
Search
Generic filters
Exact matches only
Search in title
Search in content
Filter by Custom Post Type
Products
Courses
Lessons
Topics

.
BusinessProfit2.2 – BusinessProfitConsulting.com
.
Terms and Conditions (Agreement)
.
Version 2021_10_09_v1.267
.
This agreement includes Terms and Conditions. Within this agreement is contained the Privacy Policies, Cookie Policies and Data Privacy Agreement (GDPR E.U.)

BusinessProfit2.2, BusinessProfitConsulting.com, BusinessProfitConsulting.online are all entities of Holtz Corporation and will be represented throughout this agreement as Holtz Corporation, a Texas based corporation.
.
Who we are
.

Our website address is: https://www.BusinessProfitConsulting.com

Our backup website address is: https://www.businessprofitconsulting.online

1. Agreement
.
a. By logging in, submitting a contact form, registering as a member, clicking on our “Let’s Get Connected!” button within the contact form, purchasing our products or services either by phone or electronic means, clicking through these terms, using our website, using our products or services or signing the purchase order to which they are attached per standard legal requirements you are hereby entering into a legal binding agreement with Holtz Corporation to provide Services, Information and Consulting based products and services to you. This agreement between us is referred to as the Terms of Conditions Agreement and will be the Order to which they are attached or by which they are referenced. Included in the Terms and Conditions Agreement is the Data Privacy Agreement (GDPR E.U.), and Privacy Policy which are referenced herein, and any other terms, privacy policies, exhibits, schedules, or addenda which are referenced collectively will be known as the Agreement. This Agreement sets forth the exclusive terms and conditions between the Parties and supersedes all previous agreements, contracts, and other written or oral communications between the Parties with respect to the products and services provided or referenced hereunder.
.
b. Any conflict between the terms of the Agreement, the terms shall follow and govern order of precedence: 1) the Order, 2) these Terms and Conditions Agreement referred to as the “Agreement”, and 3) any terms incorporated by reference by either of the above. Any and all substantive terms contained within any documents including but not limited to invoices, purchase orders, order confirmations, vendor registration portals, or any other transactional document, form, or notice provided by you shall be void and without effect, when such terms conflict with the Terms and Conditions Agreement. The Terms and Conditions Agreement will supersede all agreements between the parties unless a written change of Terms and Conditions Agreement is executed specifically referencing that the new Terms and Conditions Agreement shall in effect nullify, void and replace the current Terms and Conditions Agreement and must include an expiration date which at the time of expiration will revert back to the current Terms and Conditions Agreement.
.
c. We reserve the right to update and change the Terms and Conditions Agreement at any time at our sole discretion. You may find the latest version of our Terms and Conditions Agreement at https://wordpress-430046-1348733.cloudwaysapps.com/privacy-policy/
.
d. You will be notified of in writing by way of electronic transmission of any changes, updates or modifications to the Terms and Conditions Agreement which may include but is not limited to email or posted visibly upon login or portals areas. By continuing to use our Services following such changes, updates or modifications constitutes your acceptance of the same. If you do not agree to the terms of any changes, updates or modification, you may terminate the Agreement in accordance with the Termination section below.
.
2. Services
.
a. We agree to provide products and services in accordance with the terms of this Agreement. We reserve the right to engage third parties to provide or support components of the products and services, provided that it is not in violation of any non-disclosure or confidentiality agreements. We shall be responsible to you for the performance of such third parties as if we performed the Services ourselves.
.
b. Our support shall include help resources, phone, email, knowledgebase, faq, forums, chat, ticket and other methods but does not constitute any guarantee or warranties of said support, services, or assistance.
.
c. The scope of Products and Services provided under the Agreement may be amended by any reasonable means showing mutual agreement between the Parties including click-through terms, click around terms, email, support ticket, signed in either electronic or written format and specific visible means through the User Portal.
.
d. We reserve the right to provide replacements for products, services and components of the products and services. We reserve the right to cease any product or service at any time for any reason and abandon support for such products or service. No such replacement, change, retirement or end of life shall constitute a breach of the Agreement. We shall not be liable for any issues, associated costs, loss of business or any consequences that may arise from updating, modifying, changing or eliminating a product or service.
.
e. No indemnity, representation, or warranty shall apply to any Beta Products or Services that we may offer and is offered solely As-Is. We reserve the right to terminate Beta Products or Services at any time for any reason with no recourse.
.
3. Authorized Users
.
Authorized users will be known as administrators and may designate up to the maximum allowed number of Authorized Users in the User Portal for the purpose of receiving support and making changes to your account. You shall be fully responsible for managing your Authorized Users and keeping them up-to-date. You authorize us to provide all applicable support and account information to your Authorized Users also known as Administrators and to make modifications to the Products or Services at their direction.
.
a. You may only add, modify, or remove Authorized Users also known as Administrators through the User Portal but there will only be one login set of credentials known as the user and will be tied directly to the email associated with the account. We will not add, modify or remove authorized users on your behalf, and we will only provide support, assistance, and information to your Authorized Users who can verify their identity through the User Portal with their name and pin number or current identification method. Notwithstanding the foregoing, when you pay for the Services with a credit or debit card, we may remove, modify or change that card as a payment method at the request of any individual who is able to provide reasonably satisfactory evidence that he or she is the named individual on such credit or debit card.
.
b. You will require your Authorized Users to abide by the terms of the Agreement, and you acknowledge and agree that you are fully responsible for the actions and omissions of your Authorized Users and for all costs, overages, or other liabilities incurred through your account except to the sole extent that any such use or liability is the result of our breach of the Agreement. An Authorized User, within the scope of permissions granted to such user in the User Portal, may make changes to the Products or Services, and you agree to pay any Fees associated with such changes. You shall promptly notify us in the event that you become aware of any violation of the terms of the Agreement or any unauthorized use of the accounts of you or your Authorized Users and it is your responsibility to see that passwords are changed accordingly.
.
4. Fees; Invoicing
.
You shall agree to pay the Fees in full commencing on the Effective Date and according to the payment terms set out in the Order. If no payment terms are specified and agreed upon, Fees shall be due in full in advance, except for excess usage or overage fees which are invoiced monthly in arrears. You agree to pay any applicable taxes attributed to sales such as sales tax which we are required by law to collect unless you provide us with a valid tax exemption certificate. If you elect to make payments via wire or credit transfer, you shall be responsible for any applicable transfer fees that may incur. Any applicable overages, taxes, or transfer fees will be added to the Fees and will be due and payable immediately before services shall be rendered. Fees applicable to any Renewal Term will be based on a then-current at that time basis, provided that we have notified you of any applicable increase prior to the date. You may at that time opt out of the renewal. Fees are payable in the currency (U.S. dollars by default) specified in the Order and are not refundable except as expressly stated herein.
.
You agree to the issue and acceptance of invoices in electronic format and no paper version shall be available unless agreed upon by both parties. You will be invoiced immediately upon execution of any Order and on each subsequent renewal date thereafter. All Invoices will be sent to the billing contact designated in the Order or the User Portal. Credit or debit card orders will be charged immediately upon account activation and on each renewal date thereafter 1 day prior to the due date. Any failure to charge or non-payment resulting for any reason will be grounds for cancellation no later than 24 hours after the due date and we reserve the right to lock the account with no recourse and we shall not be responsible for any loss of data, business, transactions, content due to locking the account. After a period of 30 days from the time of the account is locked we reserve the right to delete the account and shall not be responsible for any data, notes, materials, content that may be lost from the deletion of the account.
.
a. It is your responsibility to maintain accurate and up-to-date billing details and ensure the Fees are paid by the due date. If you fail to maintain accurate and up-to-date billing details, your account may be suspended until such details are provided. If you are overdue on any Fees, we may: (i) charge a late fee on the unpaid balance at the lesser of 1.5% per month or the maximum lawful rate permitted by applicable law, (ii) suspend provision of the Products or Services including but not limited to access to the portal and any applicable licenses, and (iii) terminate the Agreement in accordance with Section 5(b) below. You will be responsible for any charges associated with our collection efforts related to unpaid Fees.
.
5. Term; Termination
.
Upon expiration of the Initial Term, this Agreement will renew for successive Renewal Terms, each set for the same day of successive months, unless one Party notifies the other in writing of its intent not to renew no less than 30 days prior to the expiration of the then-current term.
.
a. You may terminate the Agreement prior to the end of the Term: (i) if we materially breach the Agreement and fail to cure such breach within 10 days of your notice to us; (ii) if you provide us with at least 30 days notice; or (iii) for any other cause stated herein. We may terminate the Agreement prior to the end of the Term: (i) if you materially breach the Agreement and fail to cure such breach within 10 days of our notice to you; (ii) if we reasonably believe that your use of the Products or Services endangers or negatively affects our company, affiliates, employees, portals, systems or assets, violates the law, or interferes with our ability to provide products or services to our other customers; (iii) if you abuse, harass, or threaten any of our employees; (iv) if we provide you with at least 30 days notice; or (v) for any other cause stated herein.
.
b. Upon termination, we will provide you with a prorated refund of any unused Fees paid annually in advance for Products or Services beyond the date of termination (adjusted for any discounts that are rendered void due to such termination and any other amounts which you owe).
.
6. Proprietary Rights
.
Customer Content is and shall remain your exclusive property, and we claim no rights whatsoever in the Customer Content except to the extent explicitly granted herein.
.
a. We and our licensors own and shall continue to own all right, title, and interest in and to the Products or Services and the systems and networks used to provide such Services, including all system-generated data (e.g. performance data), modifications, improvements, upgrades, derivative works, and all intellectual property rights in and to any of the foregoing. Except for the express rights granted herein, we do not grant any other licenses, express or implied, to any of our intellectual property including software, services, or products.
.
b. We may solicit and you or your Authorized Users may provide feedback about the Services. If you or your Authorized Users provide feedback, you agree that such feedback is provided freely. Except to the limited extent such feedback contains any of your Confidential Information, we are free to use and disclose such feedback for any purpose without an accounting to you or any other person, and we shall own all right, title, and interest in and to such feedback along with any changes, modifications, or upgrades we make to our current products or services and any new products or services that we develop using the feedback you or your Authorized Users provide.
.

7. Confidentiality

Any engagement of our company between parties shall sign a separate confidentiality and non-disclosure agreement before services and products that by nature would be associated with information, data and internal business functions of any private or confidential nature. For general transactions that do not include a separate Confidentiality and Non-disclosure agreement each Party agrees to maintain any confidential information of the other Party by storing, retaining, using and accessing the Confidential Information in trust and confidence as if it was their own. The information shall only be solely used as permitted by the terms of the Agreement. Any separate confidentiality and non-disclosure agreement regardless of when signed shall supersede and take full precedence over any and all agreements related to confidentiality listed herein and shall be valid for the dates stated in the separate confidentiality and non-disclosure agreement. When the valid dates of any separate confidentiality and non-disclosure agreement has expired then the confidentiality clause contained herein shall take effect immediately transferring all terms to be included within this agreement. Either Party may disclose the other Party’s Confidential Information to the limited extent such disclosure is required by law, legal process, or court order, including any requirement under applicable data privacy regulations that a notice of data breach be given to a supervisory authority or regulatory agency. Information disclosed for these reasons will not cause cessation of the information to be recognized as Confidential. To the extent practicable and reasonable, a Party will provide prompt notice of any such required disclosure and shall cooperate with all reasonable efforts by the disclosing Party to minimize or exclude the Confidential Information from such disclosure to the maximum extent of the law. Upon termination or expiration of the Agreement for any reason, any license granted herein to use the Confidential Information shall terminate immediately, and each Party shall either return or destroy any Confidential Information in its possession which belongs to the other Party. If such information and data cannot be returned or destroyed then it shall continue to protect the Confidential Information in accordance with the Agreement for as long as it is retained as part of that Party’s customary business practices. Notwithstanding any other terms to the contrary herein, each Party will have the right to seek an injunction in any court of competent jurisdiction to prevent a breach or threatened breach of this Section.
.
8. Security; Data Privacy (United States Clients) E.U. Clients see (GDPR Agreement)
.
When data is in our direct possession we shall maintain commercially reasonable technical and operational design and measures to protect our internal networks from malicious activity and provide for the security and integrity thereof. You acknowledge that we nor any of our staff shall not be responsible for any loss or harm suffered by parties resulting from a security incident. It is the responsibility of each for determining whether the Services meet applicable regulatory standards and otherwise comply with security requirements. You agree to configure your use of the Services in such a way as to maintain the security of the Services and our network (e.g. by only using secure networks, using strong passwords and generally reasonable accepted security policies)
.
a. Should we determine that our network, systems, and data has been accessed in an unauthorized manner, and that unauthorized access impacts your Products, Services, Personal information or data we agree to notify you as soon as reasonably practicable after we have investigated the unauthorized access and fulfilled our legal obligations. Likewise, you agree to notify us should you identify unauthorized access to the Services.
.
b. We will adhere to the Privacy Policy listed herein, where applicable under the data privacy laws of the European Union and its member states through our (GDPR Agreement), we are the sole data controller for the personal data belonging to you and your Authorized Users which is provided or made available to us through the User Portal. When we are the data processor, we will use such personal data only as instructed by you or required by law, and not for any other purpose. In all cases, the Parties agree to comply with the terms and obligations of the Terms of the Agreement which includes the GDPR and Privacy Policies.
.
9. Warranties

Each Party represents and warrants that (i) it has the power, authority, and legal right to enter into the Agreement and perform the obligations and grant the licenses set out herein; and (ii) it will comply with all laws and regulations applicable to its performance under the Agreement.(iii) at least 18 years of age.
.
10. Indemnification.
.
All current indemnity laws and liability assignments shall be based on current applicable Texas Code. The laws of the State of Texas shall govern this agreement and any suit arising from such shall be located in Bexar County in the State of Texas. The undersigned agrees to indemnify and hold harmless the Company, its officers and directors, employees and its affiliates and their respective successors and assigns and each other person, if any, who controls any thereof, against any loss, liability, claim, damage and expense whatsoever (including, but not limited to, any and all expenses whatsoever reasonably incurred in investigating, preparing or defending against any litigation commenced or threatened or any claim whatsoever) arising out of or based upon any false representation or warranty or breach or failure by the undersigned to comply with any covenant or agreement made by the undersigned herein or in any other document furnished by the undersigned to any of the foregoing in connection with this transaction.
.
11. Limitations
.
We do not guarantee there will be no loss or corruption of data resulting from day to day operations or from performing regular backups of any customer content. We will provide support to you and attempt to troubleshoot any known or discovered issues that may affect your data in regards to corrupted or missing data. We shall free from any liability related to any and all data issues which includes but is not limited to data loss, data corruption or errors in data. You agree to maintain a complete and accurate copy of any Customer Content in a location independent of our data servers.
.
a. Except as expressly provided in the agreement, neither party makes any warranties of any kind, whether express, implied, statutory or otherwise, and Holtz corporation and its licencors specifically disclaim all implied warranties including, but not limited to, any warranties of merchantability, fitness for a particular purpose, non-infringement, uninterrupted or error free service, availability, accuracy, and any and all implied warranties arising from statute, course of dealing, course of performance, or usage of trade to the maximum extent permitted by applicable law.
.
b. Other than as expressly set out in the agreement, the services are provided as-is, as available, and with all faults.
.
c. In no event shall our liability arising out of or related to the agreement for any reason (including, but not limited to, contract, tort, or any other theory of liability) exceed in the aggregate the amount of fees paid or owed by you to us in the 2 months preceding the claim.
.
d. in no event shall we or our licensors have any liability for indirect, special, incidental, consequential, or punitive damages, nor any cover or lost profits, however caused, arising out of or in any way connected with the agreement whether or not we have been advised of the possibility of such damages.
.
e. We shall not store credit card information within our systems and all data related to credit card processing such as card number, expiration and ccv information shall be stored within the credit card processors information systems and in no event shall we be liable for any data breach that may arise from such cause.
.
12. General Provisions
.
Assignment. Neither Party may assign the Agreement, in whole or in part, without the other Party’s prior written consent except in connection with a merger, reorganization, sale of assets or similar transaction. In case of the latter, the assigning Party will provide notice as soon as reasonably practicable and without undue delay. Any purported assignment in violation of this Section shall be null and void. The Agreement shall be binding on all permitted successors and assigns.
.
a. Force Majeure. We shall not be deemed to be in default of the Agreement, or to have breached any of its provisions, as a result of a delay, failure in performance, or interruption in the Services which result, either directly or indirectly, from any circumstances beyond our reasonable control including acts of god, acts of civil or military authority, civil disturbance, war, strikes, fire, laws, regulations, governmental acts, third-party network unavailability, and/or failure of telecommunication facilities.
.
b. Governing Law and Venue. The Agreement is governed by the laws of the State of Texas, without regard to its choice of law statutes. Subject to Section 12(d), any disputes must be brought in the state or federal courts located in Bexar County, Texas. No claim may be brought as a class or collective action and you may not actively assert a claim arising out of the Agreement as a member of a class or collective action. The United Nations Convention on the International Sale of Goods shall not govern the Agreement. EACH PARTY WAIVES ANY RIGHT TO JURY TRIAL IN CONNECTION WITH ANY ACTION OR LITIGATION IN ANY WAY RISING OUT OF, OR RELATED TO, THE AGREEMENT.
.
c. Notices. Except as otherwise required herein, notices shall be effective when delivered, as indicated by a delivery receipt, or, in the case of notices delivered by post, 5 business days after being mailed to the designated address by first class mail. Notices to you shall be made to the address recorded in the User Portal or via electronic mail to an Authorized User. Notices to us should be delivered to: Holtz Corporation – 11019 Osgood, San Antonio, Texas 78233, ATTN: Legal Department.
.
d. Publicity. The Parties may disclose that they have entered into a business relationship and may include the name and logo of the other Party in lists of their respective customers or vendors (as the case may be), subject to any provided usage guidelines with respect to a Party’s trademarks and so long as neither Party mischaracterizes the nature of the actual relationship between them. Any other use of a Party’s name, logo, or other trademarks or service marks shall require prior written consent. Specifically, and without limiting the generality of the foregoing, neither Party may disclose or advertise any other details of the Agreement or use the name, logo, or trademarks of the other Party in connection with a product or service based upon or similar to a product or service that Party offers. Neither Party may hold itself out as a reseller or a partner of the other, or any other similar designation, unless granted such license or authority under a separately executed agreement.
.
e. Severability. Any provision in the Agreement that is held to be illegal or unenforceable in any jurisdiction shall be effective only up to the extent of such illegality or unenforceability, if possible, and shall not invalidate the remaining provisions of the paragraph or the Agreement. To the largest extent possible, the illegal or unenforceable provision shall be restated to reflect the Parties’ intent and all other provisions, sections, paragraphs shall remain in force.
.
f. Survival. Any provision of the Agreement that contemplates performance or observance subsequent to termination or expiration of the Agreement (including, without limitation, confidentiality agreements, limitation of liability, and indemnification) survive termination or expiration and continue in full force and effect.
.
g. Third-Party Beneficiaries; Relationships. There are no third-party beneficiaries to the Agreement. Nothing contained in the Agreement shall be deemed or construed as creating a joint venture or partnership between the Parties hereto. No Party is by virtue of the Agreement authorized as an agent, employee, or legal representative of any other Party. Neither Party has the authority to make any representations, claims, or warranties of any kind on behalf of the other Party, nor on behalf of that Party’s affiliates, agents, subcontractors, licensors, or third-party suppliers.
.
h. Waiver. If either Party fails to exercise, or delays exercising, any right, remedy or power set out in the Agreement, this shall not constitute a waiver of that right, remedy or power, whether under the Agreement or at law or equity.
.
13. Definitions
.
. “Agreement” has the meaning defined and listed in Section 1(a).
.
a. “Authorized User” is any user whom you have authorized to access and manage your account through the User Portal or given login credentials to.
.
b. “Beta Services” are any services designated by us as Beta Services. Beta Services are in early stages of testing and development, are not recommended for standard use, and are subject to additional disclaimers and limitations as described in the Agreement.
.
c. “Confidential Information” is defined as information disclosed by one Party to the other, directly or indirectly, in writing, orally, or by inspection of tangible objects, that should be reasonably understood to be confidential by its particular identification or designation, the circumstances of its disclosure, or the nature of the information itself. Confidential Information does not include information which, at such time: (i) is generally known or available to the public without breach of the Agreement by the receiving Party; (ii) is rightfully disclosed to the receiving Party without restriction as to further use or disclosure; or (iii) is independently developed by the receiving Party without use of or reference to the disclosing Party’s Confidential Information, as shown by documents and other competent evidence in the receiving Party’s possession. Confidential Information is and shall remain the property of the disclosing Party (or its licensors, as applicable), and no rights are granted to the Confidential Information other than those rights expressly granted in the Agreement.
.
d. “We” is defined as our company Holtz Corporation located in the state of Texas at 11019 Osgood, San Antonio, Texas 78233 and it’s divisions legally contained within it’s infrastructure.
.
e. “Customer,” “you,” or “your” is defined as the entity entering into this Agreement with Holtz Corporation upon the actions taken by any of it’s employees or representatives.
.
f. “Customer Content” is defined as text files, images, photos, notes or other materials or works of authorship belonging to you or your end users that you cause to be stored within the Services, excluding Customer Data.
.
g. “Customer Data” is defined as the information about you or your Authorized Users which is required by us in order to provide the Services to you which includes but is not limited to names, phone numbers, addresses, email addresses and any other account information but does not include credit card numbers which shall be stored at the credit card processors data center.
.
h. “Party” is defined as either client, customer or Holtz Corporation; “Parties” is defined as both customer, client and Holtz Corporation.
.
i. “Order” is defined as the actual transaction such as but not limited to verbal sales orders, purchase orders, invoices and general sales transactions in writing, verbal and electronic forms.

14. Revisions and Versions

Holtz Corporation maintains in good faith that the latest version of the “Terms & Conditions” is the highest numeric version published on the websites .

Privacy Policy (All Users)
.
All of our Privacy Policies apply to all users including the E.U. (European Unions.) Additional policies contained within the EU General Data Protection Regulation (“GDPR”) (shall apply and supersede any like Privacy Policies (All Users) listed for all users and clients residing within the E.U. (European Union.) The last section titled European Union General Data Protection Regulation (“GDPR”) shall oversee policies for companies, individuals and entities residing in origin from the European Union and any policy within the E.U. section shall supersede any other policies contained herein that apply to that class of companies, individuals and entities.
.
What personal data we collect and why we collect it
.
Comments
.
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
.
An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/ . After approval of your comment, your profile picture is visible to the public in the context of your comment.
.
Media
.
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

.
Contact Forms
.

We collect minimal information via our contact forms and never share this information with any other company, organization, mail list or otherwise and use this information which may include IP address, country of origin and any other standard information that is derived from a typical contact form including the information entered by whom is submitting.
.
Country
.
We collect the country of residence specifically to identify the proper Terms and Conditions Agreement that applies. We do not share nor use this field for any other purpose than to identify your residence and may refer to in correspondence as a way to engage and better understand your needs and business culture.
.
Name
.
We collect your name for the sole purpose of communicating with you and identifying your account. We do not and will never share your name or any personal information with any other entity, business, organization, data collection, person, group or affiliate.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for a term accepted as normal in timeframe.
.
If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is normally discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for a normal timeframe for your convenience. If you select “Remember Me”, your login will persist for a finite timeframe.
.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. All expiration dates of cookies follows industry normal practice and range in timeframe based on the type of cookie being used.
.
Embedded content from other websites.
.
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
.
These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracing your interaction with the embedded content if you have an account and are logged in to that website.
.
Analytics
.
We use extensive analytics to track how marketing efforts are performing including but not limited to where the user is coming from, IP addresses and other metrics typically found within analytic and metric plugins and software. We will never share this information outside of our company with any person, organization, entity or mail service.
.
Who we share your data with
.
No one outside of our company and direct 3rd party affiliates associated directly with day to day operations or technical backend data.
.
How long we retain your data
.
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
.
What rights you have over your data
.
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
.
Where we send your data
.
Visitor comments may be checked through an automated spam detection service.
.
Additional information
.
How we protect your data

Without detailing our internal measures for security reasons we utilize a dedicated server system of both Google and AWS (Amazon Web Server) with firewalls at the server level and also a front end firewall system. Many additional undisclosed measures are in place to keep our servers secure including active updates to the latest versions of all backend systems.
What data breach procedures we have in place
.
We utilize undisclosed independent logging systems to track every user for verification purposes only. If such a breach should occur a notification in reasonable timeframe will be given to all users affected by such data breach.
.
What third parties we receive data from
.
Independent email services not associated directly with the web server or website.
.
What automated decision making and/or profiling we do with user data
.
Strictly in use based on minimal information with all inquiries getting a response with no bias based on user information. Email lists not affiliated directly with the website data collection system and are already pre-vetted based on criteria from an independent opted-in company specializing in policies. These email lists target primarily but not limited to position within organizations and general accepted demographics that would provide for a good fit with our company and potential client.
.
Web server logs
.
We gather certain information automatically through your use of the Site. This information may include Internet protocol (IP) addresses, browser type, Internet service provider (ISP), referring or exit pages, the files viewed on the Site (e.g., HTML pages, graphics, etc.), operating system, date/time stamp, and clickstream data to analyze trends in the aggregate and administer the site. We use analytical software to help us understand this information.
.
This software sends information to its licensor. Other sites and companies may also use this software. As a result, the licensor may collect information that, when aggregated by them, allows them to identify you individually. We have no responsibility for this collection and use.
.
Cookies
.
We reserve the right to use cookies and similar technologies to analyze trends, administer the Site, track users’ movements around the Site, and gather demographic information about our user base as a whole. You can control the use of cookies at the individual browser level. This Privacy Policy covers our use of cookies and does not cover the use of cookies by any advertisers. However, data tracking files used by us may also be used by these advertisers and, when combined with other information held by them, be used to identify you personally. For more information on third party cookies and instructions on how to opt-out of those cookies set by members of the National Advertising Initiative, please click here . Or, if you are located in the European Union, please visit the European Interactive Digital Advertising Alliance here.
.
Your rights over personal data that we control
.
Upon request, we will provide you with details regarding your personal data that has been collected by us or which is under our control. If you would like to change information that we maintain about you, you may log into your account and change it or submit a support request for any information to which you don’t have access or the ability to change yourself. Information covered by this Privacy Policy may be deleted upon your request, provided that such deletion does not impact our ability to provide you with the Services. You may also request that we update or correct your personal data by writing us at: Holtz Corporation Attn. Legal PO Box 34625 San Antonio, Texas 78233.
.
You may opt-out of receiving most e-mails from us by following the “unsubscribe” instructions provided in the e-mails. Alternatively, you may contact us as described herein. If you are our customer, you may not be able to opt out of all emails, including certain administrative or billing communications which are important to the ongoing maintenance of your account.
We may keep your personal data for as long as reasonably required to meet the purposes described herein. Additionally, we will retain this information as required by law, as necessary to comply with our legal obligations, resolve disputes, and enforce our agreements.

Industry regulatory disclosure requirements
.
The purpose of this Privacy Policy is to inform you of our practices with regard to personal data we collect from or about you in connection with our web site (the “Site”) or through the provision of our services (the “Services”). We may update this Privacy Policy from time to time in our sole discretion; the current version may be found at https://wordpress-430046-1348733.cloudwaysapps.com/privacy-policy/ By using the Site or the Services you acknowledge your consent to the practices described herein.
.
If you are a customer who is subject to EU privacy laws, the Data Privacy Policy is located in the last section of this Terms and Conditions Agreement. it may be updated from time to time governs the obligations between us with regard to personal data as defined by such laws and supersedes any other policies where applicable.
.

Cookie Policies

  1. Introduction

Our websites, https://wordpress-430046-1348733.cloudwaysapps.com and https://www.businessprofitconsulting.online  (hereinafter: “websites”) use cookies and other related technologies (for convenience all technologies are referred to as “cookies”). Cookies are also placed by third parties we have engaged. In the document below we inform you about the use of cookies on our websites.

  1. What are cookies?

A cookie is a small simple file that is sent along with pages of our websites and stored by your browser on the hard drive of your computer or another device. The information stored therein may be returned to our servers or to the servers of the relevant third parties during a subsequent visit.

  1. What are scripts?

A script is a piece of programme code that is used to make our websites function properly and interactively. This code is executed on our server or on your device.

  1. What is a webbeacon?

A web beacon (or a pixel tag) is a small, invisible piece of text or image on our websites that is used to monitor traffic on the websites. In order to do this, various data about you is stored using web beacons.

  1. Consent

When you visit our websites for the first time, we will show you a pop-up with an explanation about cookies (only in specific regions in the world). You do have the right to not use the websites if you do not want cookies placed on your device or devices.

You can also disable the use of cookies via your browser, but please note that our websites may no longer work properly.

  1. Third parties

We have made agreements about the use of cookies with other companies that place cookies. However, we cannot guarantee that these third parties handle your personal data in a reliable or secure manner. Holtz Corporation shall in no way be liable for any data that is secured by any 3rd party vendor. Parties such as Google are to be considered as independent data controllers. We recommend that you read the privacy statements of these companies.

  1. Cookies

7.1 Technical or functional cookies

Some cookies ensure that certain parts of our websites work properly and that your user preferences remain known. By placing functional cookies, we make it easier for you to visit our websites. This way, you do not need to repeatedly enter the same information when visiting our websites and, for example, the items remain in your shopping cart until you have paid. We may place these cookies without your consent.

7.2 Advertising cookies

We use advertising cookies on our websites to customize the user experience.

7.3 Social media buttons

On our websites we have included buttons for Linkedin to promote webpages (e.g. “like”, “pin”) or share (e.g. “tweet”) on social networks like Linkedin. These buttons work using pieces of code coming from Linkedin themselves. This code places cookies. These social media buttons also can store and process certain information, so a personalized advertisement can be shown to you.

Please read the privacy statement of these social networks (which can change regularly) to read what they do with your (personal) data which they process using these cookies. The data that is retrieved is anonymized as much as possible. Linkedin is located in the United States.

  1. Placed cookies
Google Analytics
Purpose: Performance
Retention period: From session up to  two yearsDescription: We use Google Analytics, a web analytics service provided by Google. Google Analytics uses cookies that allows us to analyze the use of our websites and to compile reports on website activity and internet usage.
Used namesSharing
_ga, _gid, _gat, _gaexp, _utm, __utmc, UTMD_, __utmv, __utmz, __utmzz, utmzzses, _gat_gtag_UA_ID, gadwp_wg_default_view, gadwp_wg_default_swmetric, gadwp_wg_default_metric, gadwp_wg_default_dimension, gadwp_ir_default_dimension, gadwp_ir_default_swmetric, gadwp_ir_default_metricPrivacy statement
 PHP Session ID
Purpose: Storing user data across pages for functional purposes
Retention period: Store data for users to use in the web applicationDescription: Sessions are a simple way to store data for individual users against a unique session ID. Session IDs are sent to the browser via session cookies and the ID is used to retrieve existing session data
Used namesSharing
PHPSESSIDPrivacy statement
 JetPack
Purpose: Tracking and Analytics
Retention period: Varies by cookie set – pursuant to the current retention policy of JetPackDescription: Tracking and Analytics typically use for admin usage and login
Used namesSharing
tk_tc, tk_qs, tk_ai, jetpackStatePrivacy statement
WordPress
Purpose: WordPress log in cookie
Retention period: 30 daysDescription: Cookie to keep you logged in
Used namesSharing
_wordpress_Privacy statement
CloudFlare
Purpose: Security and webspeed by delivering content from a distributed servers.
Retention period: 1 yearDescription: The __cfduid cookie is used to identify individual clients behind a shared IP address and apply security settings on a per-client basis.
Used namesSharing
__cfduid, _sm_au_cPrivacy statement
 Plugin Organizer
Purpose: This cookie makes it possible to select which plugins will be loaded and order.
Retention period: 365 daysDescription: This cookie makes it possible to select which plugins will be loaded and order.
Used namesSharing
po_assigned_roles, po_assigned_rolesPrivacy statement
WooCommerce
Purpose: This cookie is placed to keep track of sales, shopping cart items.
Retention period: 365 daysDescription: This cookie is placed to keep track of sales, shopping cart items.
Used namesSharing
wc_cart_hash_xxxxxx, wpwoocommerce_session_xxxxxx, woocommerce_recently_viewed, woocommerce_items_in_cart, woocommerce_cart_hash, wp_woocommerce_session_xxxxxxPrivacy statement
Facebook
Purpose: Personalised advertisements
Retention period: 1 yearDescription: Facebook uses cookies to target users with personalised advertisements
Used namesSharing
fbm_, actppresence, sb, csm, c_user, frstxs, datr, _fbpPrivacy statement
Linkedin
Purpose: Linkedin places cookies to track users
Retention period: Pursuant to the current retention policy of LinkedinDescription: Track users for Linkedin
Used namesSharing
X-LI-IDCPrivacy statement
Google Fonts
Purpose: Display of fonts on our website
Retention period: 365 daysDescription: We use the Google Fonts API to display fonts on our website. The Google fonts API requests your IP address when visiting our website.
Used namesSharing
tcb_google_fontsPrivacy statement
Vimeo
Purpose: To display and deliver videos we use Vimeo, a video sharing website. The embedded Vimeo player uses cookies to check if certain features or preferences have been selected by the user.
Retention period: 365 daysDescription: Cookies to track individual users.
Used namesSharing
vuid, __utma, __utmt_player, __utmz, __utmc, __utmbPrivacy statement 
 Algolia
Purpose: This cookie is used to be able to use the Algolia search function on our websites.
Retention period: 365 daysDescription: This cookie is used to be able to use the Algolia search function on our websites.
Used namesSharing
algoliasearch-client-jsPrivacy statement
Custom Security Descriptor
Purpose: Security
Retention period: Session based and typically removed on successful logoutDescription: Security cookie
Used namesSharing
wordpress_logged_addressPrivacy statement
Zendesk Live Chat
Purpose: Live chat widget
Retention period: 1 yearDescription: Live chat widget
Used namesSharing
__zlcmidPrivacy statement
Segment
Purpose: Track engagement by users and to analyze traffic.
Retention period: Pursuant to the current retention policy of SegmentDescription: Track engagement by users and to analyze traffic.
Used namesSharing
ajs_group_id, _user_id, ajs_anonymous_idPrivacy statement
Custom Security Descriptor
Purpose: Security
Retention period: Determined based on logged in logged out statusDescription: Security for login system
Used namesSharing
portal_userPrivacy statement

We reserve the right that cookie usage may change at anytime based on application and developers need to fulfill additional requirements and in no way shall Holtz Corporation be liable for such additions, changes and modifications in usage of Cookies on our websites and this in no way reflects any breach of contract between parties. Our websites are cookie based and using our websites by these terms constitutes your consent that cookies will be used in the manner cookies were intended and that is to collect information sometimes personal and technical for a rich user experience.

  1. Your rights with respect to personal data

You have the following rights with respect to your personal data:

  • you may submit a request for access to the data we process about you;
  • you may object to the processing;
  • you may request an overview, in a commonly used format, of the data we process about you;
  • you may request correction or deletion of the data if it is incorrect or not or no longer relevant, or to ask to restrict the processing of the data.

To exercise these rights, please contact us. Please refer to the contact details at the bottom of this cookie statement. If you have a complaint about how we handle your data, we would like to hear from you.

  1. Manually Enabling/disabling and deleting cookies

You can use your internet browser to automatically or manually delete cookies. You can also specify that certain cookies may not be placed. Another option is to change the settings of your internet browser so that you receive a message each time a cookie is placed. For more information about these options, please refer to the instructions in the Help section of your browser.

Please note that our websites will not work properly if all cookies are disabled. If you do delete the cookies in your browser, they may be placed again when you visit our websites for functionality.

  1. Selling data to third parties

We do not sell data to third parties

EU General Data Protection Regulation (“GDPR”)
.
Introduction
.
The EU General Data Protection Regulation (“GDPR”) came into force across the European Union on 25th May 2018 and brings with it the most significant changes to data protection law in two decades. Based on privacy by design and taking a risk-based approach, the GDPR has been designed to meet the requirements of the digital age.
.
The 21st Century brings with it broader use of technology, new definitions of what constitutes personal data, and a vast increase in cross-border processing. The new Regulation aims to standardize data protection laws and processing across the EU; affording individuals stronger, more consistent rights to access and control their personal information.
.
Our Commitment
.
We are committed to ensuring the security and protection of the personal information that we process, and to provide a compliant and consistent approach to data protection. We have always had a robust and effective data protection program in place which complies with existing law and abides by the data protection principles. However, we recognize our obligations in updating and expanding this program to meet the demands of the GDPR and the [UK’s Data Protection Bill].
.
We are dedicated to safeguarding the personal information under our remit and in have developed a data protection regiment that is effective, fit for purpose and demonstrates an understanding of, and appreciation for the new Regulation. Our preparation and objectives for GDPR compliance have been summarized in this statement and include the development and implementation of new data protection roles, policies, procedures, controls and measures to ensure maximum and ongoing compliance.
.
How are we prepared for the GDPR
.
We have a consistent level of data protection and security across our organization implementing numerous undisclosed measures to be fully compliant with the GDPR.
.
Our preparation and current policies includes:
.
Ongoing Information Audits – carrying out company-wide information audits to identify and assess what personal information we hold, where it comes from, how and why it is processed and if and to whom it is disclosed on a regular basis.
.
Policies & Procedures – [revising/implementing new] data protection policies and procedures to meet the requirements and standards of the GDPR and any relevant data protection laws as the emerge, including: –
.
Data Protection – our main policy and procedure document for data protection has been overhauled to meet the standards and requirements of the GDPR. Accountability and governance measures are in place to ensure that we understand and adequately disseminate and evidence our obligations and responsibilities; with a dedicated focus on privacy by design and the rights of individuals.
.
Data Retention & Erasure – we have updated our retention policy and ensure that we meet the ‘data minimization’ and ‘storage limitation’ principles and that personal information is stored, archived and destroyed compliantly and ethically. We have dedicated erasure procedures in place to meet the new ‘Right to Erasure’ obligation and are aware of when this and other data subject’s rights apply; along with any exemptions, response timeframes and notification responsibilities.
.
Data Breaches – our breach procedures ensure that we have safeguards and measures in place to identify, assess, investigate and report any personal data breach at the earliest possible time. Our procedures are robust and have been disseminated to all employees, making them aware of the reporting lines and steps to follow.
.
International Data Transfers & Third-Party Disclosures – we store or transfer personal information outside the EU, we have robust procedures and safeguarding measures in place to secure, encrypt and maintain the integrity of the data. Our procedures include a continual review of the countries with sufficient adequacy decisions, as well as provisions for binding corporate rules; standard data protection clauses or approved codes of conduct for those countries without. We carry out strict due diligence checks with all recipients of personal data to assess and verify that they have appropriate safeguards in place to protect the information, ensure enforceable data subject rights and have effective legal remedies for data subjects where applicable.
.
Subject Access Request (SAR) – we have revised our SAR procedures to accommodate the revised 30-day timeframe for providing the requested information and for making this provision free of charge. Our new procedures detail how to verify the data subject, what steps to take for processing an access request, what exemptions apply and a suite of response templates to ensure that communications with data subjects are compliant, consistent and adequate.
.
Legal Basis for Processing – We review on all processing activities to identify the legal basis for processing and ensuring that each basis is appropriate for the activity it relates to. Where applicable, we also maintain records of our processing activities, ensuring that our obligations under Article 30 of the GDPR and Schedule 1 of the Data Protection Bill are met.
.
Privacy Notice/Policy – We have issued this Privacy Notice(s) to comply with the GDPR, ensuring that all individuals whose personal information we process have been informed of why we need it, how it is used, what their rights are, who the information is disclosed to and what safeguarding measures are in place to protect their information.
.
Obtaining Consent – We have in place consent mechanisms for obtaining personal data, ensuring that individuals understand what they are providing, why and how we use it and giving clear, defined ways to consent to us processing their information. We have developed stringent processes for recording consent, making sure that we can evidence an affirmative opt-in, along with time and date records; and an easy to see and access way to withdraw consent at any time.
.
• Direct Marketing – We include wording and processes for direct marketing, including clear opt-in mechanisms for marketing subscriptions; a clear notice and method for opting out and providing unsubscribe features on all subsequent marketing materials.
.
Data Protection Impact Assessments (DPIA) – where we process personal information that is considered high risk, involves large scale processing or includes special category/criminal conviction data; we have developed stringent procedures and assessment templates for carrying out impact assessments that comply fully with the GDPR’s Article 35 requirements. We have implemented documentation processes that record each assessment, allow us to rate the risk posed by the processing activity and implement mitigating measures to reduce the risk posed to the data subject(s).
.
Processor Agreements – where we use any third-party to process personal information on our behalf (i.e. Payroll, Recruitment, Hosting Credit Card Processing etc.), we have drafted compliant Processor Agreements and due diligence procedures for ensuring that they (as well as we), meet and understand their/our GDPR obligations. These measures include initial and ongoing reviews of the service provided, the necessity of the processing activity, the technical and organizational measures in place and compliance with the GDPR.
.
Special Categories Data – where we obtain and process any special category information, we do so in complete compliance with the Article 9 requirements and have high-level encryptions and protections on all such data. Special category data is only processed where necessary and is only processed where we have first identified the appropriate Article 9(2) basis or the Data Protection Bill Schedule 1 condition. Where we rely on consent for processing, this is explicit and is verified by a signature, with the right to modify or remove consent being clearly signposted.

Data Subject Rights

In addition to the policies and procedures mentioned above that ensure individuals can enforce their data protection rights, we provide easy to access information via GDPR policies and the Privacy Policy (All Users) of an individual’s right to access any personal information that we process about them and to request information about: –
.
• What personal data we hold about them
• The purposes of the processing
• The categories of personal data concerned
• The recipients to whom the personal data has/will be disclosed
• How long we intend to store your personal data for
• If we did not collect the data directly from them, information about the source
• The right to have incomplete or inaccurate data about them corrected or completed and the process for requesting this
• The right to request erasure of personal data (where applicable) or to restrict processing in accordance with data protection laws, as well as to object to any direct marketing from us and to be informed about any automated decision-making that we use
• The right to lodge a complaint or seek judicial remedy and who to contact in such instances
.
Information Security & Technical and Organizational Measures
.
We take the privacy and security of individuals and their personal information very seriously and take every reasonable measure and precaution to protect and secure the personal data that we process. We have robust information security policies and procedures in place to protect personal information from unauthorized access, alteration, disclosure or destruction and have several layers of security measures, including: –
.
[We use numerous undisclosed methods for security which includes but is not limited to forced SSL, access controls, password policies, encryptions, backend authentication]
.
GDPR Roles and Employees
.
We have designated and have appointed a data privacy team to develop and implement our future roadmap for complying with the new data protection Regulation. The team is responsible for promoting awareness of the GDPR across the organization, assessing our GDPR readiness, identifying any gap areas and implementing the new policies, procedures and measures.
.
We understand that continuous employee awareness and understanding is vital to the continued compliance of the GDPR and have involved our employees in our ongoing GDPR compliancy plans.
.
If you have any questions about our policies for the GDPR, please contact us at:
.
https://wordpress-430046-1348733.cloudwaysapps.com/information/contact-us/

WordPress Lightbox