1
Preface:

Data that can be used to identify you, such as your name, telephone number, address, social security number, and email address, just to name a few examples, is called Personally Identifiable Information, or PII. Take2Minutes does not ask nor require you to share much PII. Take2Minutes does require you to share your telephone number to become a member because we text you information, such as our positive messages, links, and reminders. Texting is our main way of communicating with you.

Besides your telephone number, we do not require you to share any other information. If you choose to share your name (first name or nickname) we only use that to improve your experience while using our service. If you choose to share your email, we use that to send you updates about our services (if you choose to receive such updates). To summarize, the only information about you that we ask for is: your mobile telephone, your name (which is optional), and your email address (again, which is optional). Take2Minutes utilizes encryption for the above listed PII that is stored in our systems.

Any other data you enter is saved in a way that keeps that data separate from your PII (name, email, and telephone number). Thus, if you ever decide to delete your account, our systems can quickly delete your PII and disassociate your account from other data you have entered.

2
We Have Measures In Place to:

  • Ensure the confidentiality, integrity, and availability of all data that we create, receive, maintain, or transmit.
  • Identify and protect against reasonably anticipated threats to the security or integrity of our systems.
  • Protect against reasonably anticipated, interpermissible uses or disclosures.

3
Risk Analysis and Management:

  • We are constantly evaluating the likelihood and impact of potential risks to our data.
  • We implement appropriate security measures to address any risks identified.
  • We maintain continuous, reasonable, and appropriate security protections.

4
Administrative Safeguards:

  • We implement security measures to reduce risks and vulnerabilities.
  • We restrict access to data and PII to appropriate persons and then only when absolutely needed.
  • We have periodic assessments of how well our security policies and procedures are meeting requirements.

5
Technical Safeguards:

  • We have access controls in place to only allow authorized persons access to PII.
  • We have audit controls in place to record and examine access and other activity in systems that hold PII.
  • We have policies, procedures, and backups in place to help ensure PII is not improperly altered or destroyed.
  • We have implemented technical security measures that guard against unauthorized access to data that is being transmitted over the Internet.
  • We have implemented technical security measures that guard against unauthorized access to data while at rest.