Blue Card Privacy & Security Policies
At Blue Card (a.k.a. Across The Street Productions / ATSP), we are committed to protecting your data and ensuring a secure, transparent, and trustworthy experience for all users. This document outlines how we collect, use, store, and safeguard your information.
Privacy Policy
Information We Collect
We collect the following types of information when you use our platform:
- Personal details: name, email address, phone number (if provided)
- Authentication data: hashed passwords
- Site and system usage data: including, but not limited to - pages visitied, student sessions, student progress, and student achievements
- Cookies and tracking data: see below
Cookies and Tracking
We use cookies to enhance user experience and support platform functionality. This includes:
- Session cookies: used to store encrypted data to identify and remember individual users across sessions
- Third-party cookies: we use Google Analytics to track usage and performance metrics, helping us improve our services
You can control cookie preferences through your browser settings at any time.
Use of Information
The data we collect is used to:
- Provide and personalize services
- Maintain secure user sessions
- Track progress and support educational outcomes
- Analyze usage to improve platform performance and user experience
We do not sell or share personal information with third parties for advertising purposes.
Security Policy
We prioritize the confidentiality, integrity, and availability of your data. Our security practices include:
- Encryption: All data in transit is encrypted via TLS/HTTPS. Sensitive data at rest, such as passwords and session data, is stored using industry-standard encryption techniques.
- Access Controls: Role-based access and authentication mechanisms ensure only authorized personnel can access sensitive information.
- Secure Development Practices: Our software development lifecycle includes regular security testing, code reviews, and updates.
- Monitoring and Alerts: Continuous monitoring is in place to detect, respond to, and mitigate security threats in real-time.
- Data Backups: Regular, encrypted backups are maintained to ensure data durability and disaster recovery capability.
Your Rights and Choices
You have the right to access, update, or delete your personal information at any time. To make such requests or ask any questions about our privacy or security practices, please contact us