Privacy Policy

Who we are

Our website address is:

What personal data we collect and why we collect it


When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: After approval of your comment, your profile picture is visible to the public in the context of your comment.


If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.


If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.


We use information about how you use our site to suggest other courses you may be interested in. We also use analytics to determine which courses may need additional marketing but member information is used in the aggregate to tell us the big picture.

Who we share your data with

No one.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can delete your account at any time. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service. Otherwise, we do not collect any information for distribution outside of the Healed Healer Institute website.

Your contact information

Is kept confidentially. We do not sell your information to anyone. We take this very seriously.

Additional information

How we protect your data

We have several safeguards in place to protect our members information.

What data breach procedures we have in place

The Healed Healer Institute Data Breach Response Policy

1.0 Purpose

The purpose of the policy is to establish the goals and the vision for the breach response process. This policy will clearly define to whom it applies and under what circumstances, and it will include the definition of a breach, staff roles and responsibilities, standards and metrics (e.g., to enable prioritization of the incidents), as well as reporting, remediation, and feedback mechanisms. The policy shall be well publicized and made easily available to all personnel whose duties involve data privacy and security protection.

The Healed Healer Institute Information Security’s intentions for publishing a Data Breach Response Policy are to focus significant attention on data security and data security breaches and how the Healed Healer Institute’s established culture of openness, trust and integrity should respond to such activity. The Healed Healer Institute Information Security is committed to protecting the Healed Healer Institute’s employees, clients and members and the company from illegal or damaging actions by individuals, either knowingly or unknowingly.

  1. Background

This policy mandates that any individual who suspects that a theft, breach or exposure of the Healed Healer Institute Protected data or the Healed Healer Institute Sensitive data has occurred must immediately provide a description of what occurred via e-mail to, or through the use of the contact us reporting web page at This e-mail address, and web page are monitored by the Healed Healer Institute ’s Information Security Administrator. This team will investigate all reported thefts, data breaches and exposures to confirm if a theft, breach or exposure has occurred. If a theft, breach or exposure has occurred, the Information Security Administrator will follow the appropriate procedure in place.

2.0 Scope

This policy applies to all whom collect, access, maintain, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle personally identifiable information or Protected Health Information (PHI) of the Healed Healer Institute members. Any agreements with vendors will contain language similar that protects the fund.

3.0 Policy Confirmed theft, data breach or exposure of the Healed Healer Institute Protected data or the Healed Healer Institute Sensitive data

As soon as a theft, data breach or exposure containing the Healed Healer Institute Protected data or the Healed Healer Institute Sensitive data is identified, the process of removing all access to that resource will begin.

The Executive Director/CEO will chair an incident response team to handle the breach or exposure.

The team will include members from any departments based on the data type involved and additional individuals as deemed necessary by the executive team.

Develop a communication plan.

Work with the Healed Healer Institute communications, legal and human resource departments to decide how to communicate the breach to: a) internal employees, b) the public, and c) those directly affected.

3.2 Ownership and Responsibilities

Roles & Responsibilities:

•          Sponsors – Sponsors are those members of the Healed Healer Institute community that have primary responsibility for maintaining any particular information resource. Sponsors may be designated by any of the Healed Healer Institute Executive in connection with their administrative responsibilities, or by the actual sponsorship, collection, development, or storage of information.

•          Information Security Administrator is that member of the Healed Healer Institute community, designated by the Executive Director/CEO or the Founder, Information Technology (IT) Infrastructure, who provides administrative support for the implementation, oversight and coordination of security procedures and systems with respect to specific information resources in consultation with the relevant Sponsors.

•          Users include virtually all members of the Healed Healer Institute community to the extent they have authorized access to information resources, and may include staff, trustees, contractors, consultants, interns, temporary employees and volunteers.

•          The Incident Response Team shall be chaired by Executive Management and shall include, but will not be limited to, the departments relevant to the breach.

4.0 Enforcement

Any Healed Healer Institute personnel found in violation of this policy may be subject to disciplinary action, up to and including termination of employment. Any third party partner company found in violation may have their network connection terminated.

Safeguards – Countermeasures, controls put in place to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets. Safeguards help to reduce the risk of damage or loss by stopping, deterring, or slowing down an attack against an asset.