top of page

Privacy Policy

Privacy Policy


This Privacy Policy describes how, and its domain hosting provider, LTD, collects, uses, and shares your Personal Information, as well as an explanation of the data rights you may have in that Personal Information. This Privacy Policy applies to all users and visitors of This Privacy Policy is not intended to override the terms of any contract you have with us, nor any rights you may have under other applicable data privacy laws.


Prior to accessing or using our Services, please read this policy and make sure you fully understand our practices in relation to your Personal Information.  If you read and fully understand this Privacy Policy, and remain opposed to our practices, you must immediately leave and discontinue all use of any of our Services.  If you have any questions or concerns regarding this policy, please contact us at


What personal information is collected?

To provide you the Services, we must collect Personal Information relating to an identified or identifiable natural person (“Personal Information”). We collect Personal Information you provide us, from your use of the Services, and from other sources. Here are the types of Personal Information we collect about you:

  1. Any information you provide to us through the website is collected. This includes any personal information provided when you register for our services, donate, and/or contact us through our website.

  2. Personal information may be collected while you visits, download, and/or use any of our service through our website. We may collect aggregated usage Personal Information, such as Visitors’ and Users’ browsing and ‘click-stream’ activity on the Services, session heatmaps and scrolls, non-identifying Personal Information regarding the Visitor’s or User’s device, operating system, internet browser, screen resolution, language and keyboard settings, internet service provider, referring/exit pages, date/time stamps, etc.

  3. Information we collect from other sources. We may receive Personal Information about you from third-party sources, such as i) security providers , fraud detection and prevention providers for example to help us screen out users associated with fraud, ii) social media platforms, when you log-in or sign-up using your social media account, we may receive Personal Information from that service (e.g., your username, basic profile Personal Information) and in some cases, we may collect Personal Information from lead enhancement companies which help us to improve our service offering; iii) advertising and marketing partners in order to monitor, manage and measure our ad campaigns.

  4. To provide our Services, we collect Personal Information about our Users. The Personal Information comes from you when you visit or use our services, Personal Information we collect automatically, and Personal Information we collect from other sources.

  5. We may also collect Personal Information pertaining to visitors and users of our User’s websites or services (“Users-of-Users”), solely for and on our Users’ behalf (as further described below).

  6. We also collect information that is provided to us by job & volunteer applicants, when they apply to any of the open positions published on our website and/or a job board, by e-mail or otherwise.


Why do we collect personal information?

  1. To provide and operate the Services;

  2. .To further develop, customize, expand, and improve our Services, based on Users’ common or personal preferences, experiences and difficulties;

  3. To provide our Users with ongoing customer assistance and technical support;

  4. To be able to contact our Users with general or personalized service-related notices and promotional messages;

  5. To help us to update, expand and analyze our records to identify new customers;

  6. To facilitate, sponsor, and offer certain contests, events, and promotions, determine participants’ eligibility, monitor performance, contact winners, and grant prizes and benefits;

  7. To analyze our performance and marketing activities;

  8. To create aggregated statistical data and other aggregated and/or inferred information, which we or our business partners may use to provide and improve our respective services;

  9. To provide you with professional assistance, only upon your request;

  10. To enhance our data security and fraud prevention capabilities; and

  11. To comply with any applicable laws and regulations.

  12. ​Our use of your Personal Information is necessary to perform a service or to take steps to perform a service.

  13. Our use of your Personal Information is necessary to comply with a relevant legal or regulatory obligation that we have; or

  14. Our use of your Personal Information is necessary to support legitimate interests and business purposes (for example, to maintain and improve our Services and the effectiveness by identifying technical issues), provided it is conducted in a way that is proportionate and that respects your privacy rights.


How do we share your ‘Personal Information’? has partnered with LTD to host this website. and/or LTD may share your Personal Information with service providers and others (or otherwise allow them access to it) in the following manners and instances:

  1. Wix has partnered with number of third-party service providers whose services and solutions complement, facilitate and enhance our own. These include hosting and server co-location services, communications and content delivery networks (CDNs), data and cyber security services, billing and payment processing services, domain name registrars, fraud detection and prevention services, web analytics, e-mail distribution and monitoring services, session recording and remote access services, performance measurement, data optimization and marketing services, content providers, and our legal and financial advisors (collectively, “Third Party Service Provider(s)”) may use the services provided by third party service providers.

  2. Wix may share the following categories of Personal Information with Third Party Service Providers for a business purpose: identifiers, including name, alias, postal address, unique personal identifier, online identifier, internet protocol address, email address, account name, or other similar identifiers commercial information, for example information regarding products or services purchased, obtained, or considered

  3. Connection with a Change in Corporate Control: In addition, should Wix or any of its affiliates undergo any change in control, including by means of merger, acquisition or purchase of substantially all of its assets, your Personal Information may be shared with the parties involved in such event.

  4. Law Enforcement, Legal Requests and Duties: Wix may disclose or otherwise allow access to your Personal Information pursuant to a legal request, such as a subpoena, legal proceedings, search warrant or court order, or in compliance with applicable laws, if we have a good faith belief that the law requires us to do so, with or without notice to you.

  5. Protecting Rights and Safety: Wix may share your Personal Information if we believe in good faith that this will help protect the rights, property or personal safety of Wix, any of our Users, any Users-of-Users, or any member of the general public, with or without notice to you.

  6. Social Media Features and Framed Pages: Our Services include certain Social Media features, widgets, and single sign on features, such as the “Facebook Connect,” “Google Sign-in,” “Facebook Like”, or “Share this” button or other interactive mini-programs (“Social Media Features”). These Social Media Features may collect certain Personal Information such as your IP address or which page you are visiting on our Website and may set a cookie to enable them to function properly. Social Media Features are either hosted by a third party or hosted directly on our Services. Your interactions with these third parties’ Social Media Features are governed by their policies and not ours.

  7. ​In addition, our Services may enable you to share your Personal Information with third parties directly, such as via page framing techniques to serve content to or from Third-Party Service Providers or other parties, while preserving the look and feel of our Website and Services (“Frames”). Please be aware that if you choose to interact or share any Personal Information via such Frames, you are in fact providing it to these third parties and not to us, and such interactions and sharing are governed by those third parties’ policies and not ours.

  8. App Market Developers: As part of our App Market program, we allow third party developers (“Third Party Developer(s)”) to develop and offer their own applications via the Wix App Market (“Third Party App(s)”), in conjunction with Wix.

  9. ​Each Third Party Developer is bound by the Wix App Market – Partner Program Agreement, which among others, contains restrictions on how they may access, store, share, and use the Personal Information you and/or your Users-of-Users provide them or us (as further detailed in the Wix App Market Terms of Use)

  10. ​We encourage you to review any privacy policy accompanying a Third Party App and ask Third Party Developers for any clarifications you may need before deciding to install and use their Third Party App. Wix does not control and is not responsible for the actions or policies of any Third Party Developers, and your use of any Third Party App is at your own risk.

  11. ​Wix Subsidiaries and Affiliated Companies: Wix may share your Personal Information internally within our family of companies, for the purposes described in this Privacy Policy. For example, we may share your Personal Information with Inc., our US-based subsidiary, in the course of facilitating and providing you (and your Users-of-Users) with our Services.

  12. ​Sharing Personal Information from Wix subsidiaries and affiliated companies in the European Union and Switzerland to Wix’s United States subsidiary will be only when the relevant Model Standard Contractual Clauses are in place.

  13. Connection With a Change in Corporate Control: In addition, should Wix or any of its affiliates undergo any change in control, including by means of merger, acquisition or purchase of substantially all of its assets, your Personal Information may be shared with the parties involved in such event.

  14. Upon Your Further Direction: Wix may also share your Personal Information with third parties for other purposes upon your further direction or with your explicit approval.

Where is your “Personal Information” stored?

  1. Users’ and Users-of-Users’ Personal Information may be stored in data centers located in the United States of America, Ireland, Japan and Israel. We may use other jurisdictions as necessary for the proper delivery of our Services and/or as may be required by law. ​

  2. Ltd. is based in Israel, which is considered by the European Commission to be offering an adequate level of protection for the Personal Information of EU Member State residents.​

  3. Wix affiliates and Third-Party Service Providers that store or process your Personal Information on Wix’s behalf are contractually committed to keep it protected and secured, in accordance with industry standards and regardless of any lesser legal requirements which may apply in their jurisdiction.

  4. Transfer of EU Personal data : If you are located in Europe, when we will transfer your Personal Information to the United States or anywhere outside Europe, we will make sure that (i) there is a level of protection deemed adequate by the European Commission or (ii) that the relevant Model Standard Contractual Clauses are in place. 

  5. Wix may store and process Personal Information in the USA, Europe, Israel, or other jurisdictions, whether by ourselves or with the help of our affiliates and service providers.

  6. Wix’s data storage providers are contractually committed to protect and secure your data.

  7. Among other things, Wix will ensure that there is the adequate level of protection or that relevant Model Standard Contractual Clauses are in place for the international transfer of our EU users’ data.

  8. Privacy Shield Certification: Wix and its affiliates, including DeviantArt Inc., participates in, and has certified its compliance with, the EU-U.S. Privacy Shield Framework and the Swiss-U.S. Privacy Shield Framework. To learn more about the Privacy Shield Framework, visit the U.S. Department of Commerce’s Privacy Shield List, here.​

  9. In compliance with the Privacy Shield Principles, commits to resolve complaints about our collection or use of your personal information.  EU and Swiss individuals with inquiries or complaints regarding our Privacy Shield policy should first contact us at: For the avoidance of doubt, Wix does not rely on the Privacy Shield as a mechanism for transferring GDPR protected personal data.​

  10. has further committed to refer unresolved Privacy Shield complaints to an alternative dispute resolution provider located in the United States. If you do not receive timely acknowledgment of your complaint from us, or if we have not addressed your complaint to your satisfaction, please visit If you have an unresolved privacy or data use concern that we have not addressed satisfactorily, please contact our U.S.-based third-party dispute resolution provider at for more information or to file a complaint.  The services are provided at no cost to you.

How are cookies and third-party technology used?

  1. Wix and their Third Party Service Providers use cookies and other similar technologies (“Cookies”) in order for us to provide our Service and ensure that it performs properly, to analyze our performance and marketing activities, and to personalize your experience.​

  2. You can learn more about how Wix uses cookies and similar technologies and how you can exercise control over them in their Cookie Policy.​

  3. Please note that Wix does not change their practices in response to a “Do Not Track” signal in the HTTP header from a browser or mobile application, however, most browsers allow you to control cookies, including whether or not to accept them and how to remove them. You may set most browsers to notify you if you receive a cookie, or you may choose to block cookies with your browser.

How will use your ‘Personal Information’ for communication?

  1. We may use your Personal Information to send you promotional content and messages by e-mail, text messages, notifications within our platform, marketing calls and similar forms of communication from or our partners through such means. If you do not wish to receive such promotional messages or calls, you may notify at any time or follow the “unsubscribe” or STOP instructions contained in the promotional communications you receive.

  2. may also contact you with important information regarding our Services, or your use thereof. For example, we may send you a notice (through any of the means available to us) if a certain Service is temporarily suspended for maintenance; reply to your support ticket or e-mail; send you reminders regarding upcoming events; or notify you of material changes in our Services.

What are your rights in relation to your ‘Personal Information’?

  1. agrees that it is imperative that you have control over your Personal Information. Pursuant to privacy regulations worldwide, is taking steps to enable you to request access to, receive a copy of, update, amend, delete, or limit the use of your Personal Information.​

  2. Before fulfilling your request, we may ask you for additional information in order to confirm your identity and for security purposes. We reserve the right to charge a fee where permitted by law (e.g. if your request is unfounded or excessive).​

  3. You have the right to file a complaint with your local supervisory authority for data protection (but we still recommend that you contact us first).​

  4. If you are a User, and you wish to receive a copy, access and/or request us to make corrections to the Personal Information that you have stored with us (either yours or your Users-of-Users’), or wish to request a list of what Personal Information (if any) pertaining to you we disclosed to third parties for direct marketing purposes, please email your request to We will make reasonable efforts to honor your request promptly (unless we require further information from you in order to fulfil your request), subject to legal and other permissible considerations.

What do you do if you have questions or complaints?

  1. If you have any questions or concerns about our collection, use or disclosure of Personal Information, or if you believe that we have not complied with this Privacy Policy or applicable data protection laws, please contact us – We will investigate the complaint and determine whether a breach has occurred and what action, if any, to take. We take every privacy complaint seriously and will make all reasonable efforts to resolve your complaint promptly and in accordance with applicable law. ​

  2. You can file a complaint with your local supervisory authority for data protection at any time.  Please contact us first so we can try to resolve your concerns.

How long is data retained?

  1. Wix may retain your Personal Information (as well as your Users-of-Users’ Personal Information) for as long as is hosted by LTD.​

  2. Wix may continue to retain your Personal Information after deactivate its User Account and/or cease to use any particular Services, as reasonably necessary to comply with legal obligations, to resolve disputes regarding our Users or their Users-of-Users, prevent fraud and abuse, enforce our agreements and/or protect our legitimate interests.


How is your ‘Personal Information’ kept safe?

  1. Wix has implemented security measures designed to protect the Personal Information you share with us, including physical, electronic and procedural measures. Among other things, we offer HTTPS secure access to most areas on our Services; the transmission of sensitive payment information (such as a credit card number) through our designated purchase forms is protected by an industry standard SSL/TLS encrypted connection; and we regularly maintain a PCI DSS (Payment Card Industry Data Security Standards) certification. We also regularly monitor our systems for possible vulnerabilities and attacks, and regularly seek new ways and Third-Party Services for further enhancing the security of our Services and protection of our Visitors’ and Users’ privacy. ​

  2. Regardless of the measures and efforts taken by Wix, we cannot and do not guarantee the absolute protection and security of your Personal Information, your Users-of-Users’ Personal Information or any other information you upload, publish or otherwise share with or anyone else. We encourage you to set strong passwords for your User Account and User Website and avoid providing us or anyone with any sensitive Personal Information of which you believe its disclosure could cause you substantial or irreparable harm.

  3. Our Services may contain links to other websites or services. We are not responsible for such websites’ or services’ privacy practices. We encourage you to be aware when you leave our Services and to read the privacy statements of each and every website and service you visit before providing your Personal Information. This Privacy Policy does not apply to such linked third-party websites and services.


What if the privacy policy is updated?

  1. We may update this Privacy Policy as required by applicable law, and to reflect changes to our Personal Information collection, usage and storage practices. If we make any changes that we deem as “material” (in our sole good faith discretion), we will notify you via email prior to the change becoming effective. In relation to any updated Privacy Policy, we will, as required by applicable law, notify you, seek your consent and/or take any other measures. We encourage you to periodically review this page for the latest Information on our privacy practices. Unless stated otherwise, our most current Privacy Policy applies to all information that we have about you and your Users-of-Users, with respect to our Website. ​

  2. This Privacy Policy was written in English and may be translated into other languages for your convenience. If a translated (non-English) version of this Privacy Policy conflicts in any way with its English version, the provisions of the English version shall prevail.


How can you contact us?

If you have any questions about this Privacy Policy or wish to exercise any of your rights, you can email us at

You may also contact us by mail at:

Protecting Chrysalis, Inc.

414 S. Service Road #359

Patchogue, NY 11772

Safety and Security

Security Policy


Information, including information entrusted to Protecting Chrysalis by its clients, donors and business partners must be protected by taking reasonable and appropriate steps to ensure information’s confidentiality, integrity, and availability. All members of the Protecting Chrysalis workforce (paid employees, volunteers, and interns) and all information systems used by Protecting Chrysalis are required to comply with the information security policies.

Acceptable Use of Assets

Information systems owned and provided by Protecting Chrysalis are to be used for business purposes only. Information systems may not be used for the purpose of defamation, harassment, impersonation, forwarding of chain letters, personal purchases, etc.

Protecting Chrysalis reserves the right to monitor, filter, and deny the use of its assets.

Use of Communications Services and Equipment

The communications services and equipment utilized by Protecting Chrysalis are to be used primarily for legitimate and substantial business purposes. Personal use should be kept to a minimum. Personnel have a right to expect that other Protecting Chrysalis personnel will not gain access for files, messages, communications, or documents of others unless they have a legitimate reason to do so. Accessing files, messages, communications, or documents of others without a legitimate reason is inappropriate and is prohibited.


Personnel must not utilize the communications services and equipment used by Protecting Chrysalis in any way that may be seen as insulting, disruptive, or offensive to other persons, or harmful to morale. Examples of forbidden transmissions include sexually-explicit messages, cartoons, or jokes; ethnic or racial slurs; or any other message that can be construed to be harassment or disparagement of others based on their sex, race, sexual orientation, age, national origin, religious beliefs, or other personal characteristics or circumstances.

Policy Violation - Any personnel who is found, after appropriate investigation, to have violated this policy will be subject to appropriate disciplinary action, up to and including termination.


Usage of Internet Access Systems

Protecting Chrysalis provides Internet access to personnel. The guidelines listed below help personnel determine proper Internet usage. Protecting Chrysalis reserves the right to monitor and record Internet usage and file server utilization of all personnel. This monitoring includes determining web sites visited and mail transmissions sent. Protecting Chrysalis reserves the right to suspend individual user accounts for violation of Protecting Chrysalis polices.

The following guidelines define Internet usage:

  1. File transfers are to be for business use only by authorized Protecting Chrysalis personnel.

  2. Use of another person’s account or access to their personal files without their consent is strictly prohibited.

  3. Account passwords must be carefully protected to avoid the possibility of unauthorized use or intrusion of Protecting Chrysalis systems. If a computer is lost or stolen, or if an ID or password are suspected to be stolen, report this immediately to management or designated IT personnel.

  4. Confidential information is not to be transmitted without proper encryption.

  5. All news group postings are to be for Protecting Chrysalis business. Every message posted bears the address of Protecting Chrysalis and therefore should be worded in such a way to promote and protect the integrity of the agency, and the confidentiality of its clients and donors.

  6. Disruptive behavior such as introducing viruses or intentionally destroying or modifying files on the network is strictly prohibited.

  7. Any personal use for commercial or illegal activity is strictly prohibited.

Exploration and use of the Internet pertaining to non-work related items should not interfere with productivity and must be done during lunch or break periods, or before or after work hours. Transmission of harassing, discriminatory or otherwise objectionable e-mail or files (as determined by the recipient) is strictly prohibited. Access to obscene or offensive sites is strictly prohibited and subject to disciplinary action.


Software Copyright Infringement

Protecting Chrysalis licenses the use of computer software from a variety of outside companies. Protecting Chrysalis does not own this software or related documentation and, unless authorized by the software developer, does not have the right to reproduce it. Any duplication of licensed software, except for backup purposes, is a violation of the Federal Copyright Law which states that reproduction of software can be subject to civil damages up to $100,000 and criminal penalties, including fines and imprisonment.

Facility Access Controls

Physical access to information systems and the facilities in which they are housed must be restricted to properly authorized individuals.

Such restrictions must:

  • safeguard information system facilities and the equipment therein from unauthorized physical access, tampering, and theft,

  • control and validate access based on role or function,

  • support restoration of lost data under the contingency plans,


Repairs and modifications to the facilities physical security components should be documented.

Security Management System

Information security is to be managed through a process designed to prevent, detect, contain, and correct violations of the information security policies.


The security management process must include:

  • analysis of risks posed to information systems,

  • treatment of identified risks,

  • sanctions for violations of information security policies, and

  • proactive review of information system activity

We Need Your Support Today!

Like, Share, & Support us on Social Media

bottom of page