Privacy Policy

# Privacy Policy

Toxically Male

Effective Date: December 1, 2024

Last Updated: December 1, 2024

---

## Table of Contents

1. [Introduction](#introduction)

2. [Information We Collect](#information-we-collect)

3. [How We Use Your Information](#how-we-use-your-information)

4. [Information Sharing and Disclosure](#information-sharing-and-disclosure)

5. [Data Security](#data-security)

6. [Your Privacy Rights](#your-privacy-rights)

7. [Cookies and Tracking Technologies](#cookies-and-tracking-technologies)

8. [Third-Party Services](#third-party-services)

9. [Children's Privacy](#childrens-privacy)

10. [International Data Transfers](#international-data-transfers)

11. [Data Retention](#data-retention)

12. [Changes to This Privacy Policy](#changes-to-this-privacy-policy)

13. [Contact Information](#contact-information)

---

## Introduction

Toxically Male ("we," "us," "our," or "Company") is committed to protecting the privacy and security of your personal information. This Privacy Policy explains how we collect, use, disclose, and safeguard your information when you visit our website at https://toxicallymale.com/, use our services, participate in our community, or engage with our educational content and podcast.

This Privacy Policy applies to all information collected through our website, our mobile applications, our educational courses and content, our community platform, our podcast, and any related services, sales, marketing, or events (collectively, the "Services"). By accessing or using our Services, you acknowledge that you have read, understood, and agree to be bound by this Privacy Policy.

We recognize that privacy is a fundamental right, and we are committed to transparency in our data practices. This Privacy Policy is designed to help you understand what information we collect, why we collect it, how we use it, and what choices you have regarding your personal information. We encourage you to read this Privacy Policy carefully and contact us if you have any questions or concerns.

Our Services are designed for adults who are interested in developing practical skills, engaging with traditional masculine values, and participating in a community of like-minded individuals. We do not knowingly collect personal information from children under the age of 13, and our Services are not directed toward children.

This Privacy Policy complies with applicable privacy laws, including the General Data Protection Regulation (GDPR) for users in the European Union, the California Consumer Privacy Act (CCPA) for California residents, and other applicable state and federal privacy regulations. We are committed to maintaining the highest standards of data protection and privacy practices.

## Information We Collect

We collect information about you in several ways when you use our Services. The types of information we collect depend on how you interact with our Services and the choices you make. We collect information in the following categories:

### Personal Information You Provide Directly

Account Registration Information: When you create an account with us, we collect personal information such as your name, email address, username, password, and any profile information you choose to provide. This information is necessary to create and maintain your account and provide you with access to our Services.

Payment Information: When you purchase our courses, subscribe to our services, or make other payments, we collect payment information including your billing address, payment method details, and transaction history. We use secure third-party payment processors to handle payment information, and we do not store complete credit card numbers on our servers.

Communication Information: When you contact us through email, contact forms, customer support, or other communication channels, we collect the information you provide, including your name, email address, phone number (if provided), and the content of your communications. This information helps us respond to your inquiries and provide customer support.

Profile and Preference Information: You may choose to provide additional information in your user profile, such as your location, interests, skill level, goals, and preferences for content and communications. This information helps us personalize your experience and provide more relevant content and recommendations.

Educational Progress Information: As you engage with our educational content, courses, and training materials, we collect information about your progress, completion status, quiz results, and learning preferences. This information helps us track your educational journey and provide personalized recommendations.

### Information We Collect Automatically

Usage Information: We automatically collect information about how you use our Services, including the pages you visit, the features you use, the time and duration of your activities, your search queries, and your interaction with our content. This information helps us understand user behavior and improve our Services.

Device Information: We collect information about the devices you use to access our Services, including device type, operating system, browser type and version, screen resolution, device identifiers, and mobile network information. This information helps us optimize our Services for different devices and platforms.

Location Information: We may collect general location information based on your IP address to provide location-appropriate content and comply with applicable laws. We do not collect precise geolocation information unless you explicitly grant permission through your device settings.

Log Information: Our servers automatically record information when you use our Services, including your IP address, browser type, referring/exit pages, operating system, date/time stamps, and clickstream data. This information is used for system administration, security monitoring, and service improvement.

### Information from Community Interactions

Community Posts and Comments: When you participate in our community forums, discussion boards, or comment sections, we collect the content you post, including text, images, and other media. Please note that community posts may be visible to other users and should not include sensitive personal information.

Direct Messages and Private Communications: If our platform includes private messaging features, we collect the content of messages you send and receive through our Services. We treat private communications with additional privacy protections.

User-Generated Content: When you create, upload, or share content through our Services, including project photos, progress updates, reviews, or testimonials, we collect this content along with associated metadata such as creation date and location information (if provided).

### Information from Third-Party Sources

Social Media Integration: If you choose to connect your social media accounts or sign in through third-party services, we may collect information from those platforms in accordance with their privacy policies and your privacy settings on those platforms.

Analytics and Advertising Partners: We may receive information about you from our analytics and advertising partners, including demographic information, interest categories, and online behavior data. This information is used to improve our Services and provide more relevant content and advertisements.

Public Information: We may collect publicly available information about you from public records, social media profiles, or other public sources to verify your identity, prevent fraud, or enhance our Services.

### Sensitive Information

We do not intentionally collect sensitive personal information such as social security numbers, financial account information (beyond payment processing), health information, or information about political affiliations, religious beliefs, or sexual orientation. If you choose to share such information through our community features or communications, you do so at your own discretion.

### Information About Others

If you refer friends or family members to our Services, we may collect their contact information to facilitate the referral. We will only use this information for the specific purpose of the referral and will not add them to our marketing lists without their explicit consent.

## How We Use Your Information

We use the information we collect for various legitimate business purposes to provide, maintain, and improve our Services. Our use of your information is based on the following legal grounds: performance of a contract, legitimate business interests, compliance with legal obligations, and your consent where required by law.

### Service Provision and Account Management

Account Creation and Maintenance: We use your registration information to create and maintain your user account, authenticate your identity, and provide you with access to our Services. This includes managing your login credentials, account settings, and user preferences.

Content Delivery: We use your information to deliver educational content, courses, and training materials that are relevant to your interests and skill level. This includes personalizing your learning experience, tracking your progress, and providing recommendations for additional content.

Community Features: We use your information to enable your participation in our community features, including forums, discussion boards, and user-generated content sharing. This includes displaying your username and profile information in connection with your posts and interactions.

Customer Support: We use your contact information and communication history to provide customer support, respond to your inquiries, resolve technical issues, and address any concerns you may have about our Services.

### Communication and Marketing

Service Communications: We use your contact information to send you important communications about your account, our Services, policy changes, security updates, and other service-related notifications. These communications are necessary for the proper functioning of our Services.

Marketing Communications: With your consent or where permitted by law, we may use your contact information to send you marketing communications about new courses, features, promotions, and other updates that may be of interest to you. You can opt out of marketing communications at any time.

Newsletter and Content Updates: If you subscribe to our newsletter or content updates, we use your email address to deliver regular updates about new educational content, podcast episodes, community highlights, and other relevant information.

Personalized Recommendations: We use your usage patterns, preferences, and educational progress to provide personalized recommendations for courses, content, and community discussions that align with your interests and goals.

### Service Improvement and Analytics

Usage Analysis: We analyze usage patterns and user behavior to understand how our Services are used, identify areas for improvement, and develop new features and content. This includes analyzing which courses are most popular, which features are most useful, and where users encounter difficulties.

Performance Monitoring: We use technical information and log data to monitor the performance of our Services, identify and resolve technical issues, and ensure the security and stability of our platform.

Research and Development: We may use aggregated and anonymized information for research purposes to better understand our user base, develop new educational content, and improve our teaching methodologies.

A/B Testing: We may conduct A/B tests and other experiments to evaluate new features, content formats, and user interface designs. This helps us optimize the user experience and improve the effectiveness of our educational content.

### Security and Fraud Prevention

Account Security: We use your information to protect your account from unauthorized access, including monitoring for suspicious login attempts and implementing security measures such as two-factor authentication.

Fraud Prevention: We analyze usage patterns and transaction information to detect and prevent fraudulent activities, including unauthorized access, payment fraud, and abuse of our Services.

Platform Security: We use technical information and log data to monitor our platform for security threats, prevent cyber attacks, and maintain the overall security of our Services.

### Legal Compliance and Protection

Legal Obligations: We may use your information to comply with applicable laws, regulations, and legal processes, including responding to lawful requests from government authorities and law enforcement agencies.

Terms of Service Enforcement: We use your information to monitor compliance with our Terms of Service and community guidelines, including investigating violations and taking appropriate enforcement actions.

Legal Protection: We may use your information to protect our legal rights, defend against legal claims, and pursue legal remedies when necessary.

### Business Operations

Payment Processing: We use your payment information to process transactions, manage subscriptions, handle refunds, and maintain accurate financial records. We work with trusted third-party payment processors to ensure the security of payment transactions.

Business Analytics: We analyze business metrics and user data to make informed decisions about our Services, including pricing strategies, content development priorities, and resource allocation.

Quality Assurance: We use feedback, reviews, and usage data to maintain and improve the quality of our educational content and Services.

### Data Processing Legal Basis

For users in the European Union and other jurisdictions with similar privacy laws, we process your personal information based on the following legal grounds:

Contract Performance: Processing necessary to perform our contract with you, including providing the Services you have requested and managing your account.

Legitimate Interests: Processing necessary for our legitimate business interests, such as improving our Services, ensuring security, and conducting business analytics, provided these interests do not override your fundamental rights and freedoms.

Legal Compliance: Processing necessary to comply with applicable laws and regulations.

Consent: Processing based on your explicit consent, which you may withdraw at any time without affecting the lawfulness of processing based on consent before its withdrawal.

We do not use your personal information for automated decision-making or profiling that produces legal effects or similarly significant effects on you without your explicit consent or another lawful basis.

## Information Sharing and Disclosure

We respect your privacy and do not sell, rent, or trade your personal information to third parties for their marketing purposes. However, we may share your information in certain limited circumstances as described below. When we share your information, we implement appropriate safeguards to protect your privacy and ensure that third parties handle your information in accordance with applicable privacy laws.

### Service Providers and Business Partners

Third-Party Service Providers: We work with trusted third-party service providers who assist us in operating our Services and conducting our business. These service providers may have access to your personal information only to the extent necessary to perform their functions and are contractually obligated to maintain the confidentiality and security of your information. Our service providers include:

- Payment Processors: We use secure third-party payment processors to handle payment transactions, subscription management, and billing services. These processors are PCI DSS compliant and maintain strict security standards for handling payment information.

- Cloud Storage and Hosting Providers: We use cloud-based infrastructure providers to store and process your information. These providers maintain robust security measures and comply with industry-standard data protection practices.

- Email and Communication Services: We use third-party services to send emails, notifications, and other communications. These services are used solely for delivering our communications and do not use your information for their own purposes.

- Analytics and Performance Monitoring: We use analytics services to understand how our Services are used and to improve performance. These services may collect usage data and technical information in accordance with their privacy policies.

- Customer Support Tools: We use third-party customer support platforms to manage and respond to user inquiries. These platforms help us provide efficient and effective customer service.

Educational Content Partners: We may partner with other educational content creators, instructors, or organizations to provide enhanced learning experiences. When you access content from our partners, your usage information may be shared with them to facilitate content delivery and track educational progress.

Community Platform Providers: If we use third-party platforms to host community features such as forums or discussion boards, your community interactions may be processed by these platform providers in accordance with their privacy policies.

### Legal Requirements and Protection

Legal Compliance: We may disclose your information when required by law, regulation, legal process, or government request. This includes responding to subpoenas, court orders, law enforcement requests, and other legal obligations. We will make reasonable efforts to notify you of such requests unless prohibited by law.

Protection of Rights and Safety: We may disclose your information when we believe in good faith that disclosure is necessary to protect our rights, property, or safety, or the rights, property, or safety of our users or the public. This includes investigating fraud, security breaches, or violations of our Terms of Service.

Enforcement of Terms: We may share information as necessary to enforce our Terms of Service, community guidelines, or other agreements, including investigating potential violations and taking appropriate action.

### Business Transactions

Mergers and Acquisitions: In the event of a merger, acquisition, reorganization, sale of assets, or bankruptcy, your information may be transferred to the acquiring entity or successor organization. We will provide notice of such transfer and any changes to the handling of your personal information.

Due Diligence: In connection with potential business transactions, we may share your information with potential buyers, investors, or advisors for due diligence purposes, subject to appropriate confidentiality agreements.

### Consent-Based Sharing

With Your Consent: We may share your information with third parties when you provide explicit consent for such sharing. This may include sharing information with partners for joint marketing campaigns, research studies, or other collaborative activities.

Social Media Integration: If you choose to connect your social media accounts or share content through social media platforms, information may be shared with those platforms in accordance with your privacy settings and their privacy policies.

### Community and Public Information

Public Community Posts: Information you post in public areas of our community, such as forums, discussion boards, or comment sections, may be visible to other users and the general public. Please exercise caution when sharing personal information in these areas.

User-Generated Content: If you create and share content through our Services, such as project photos, testimonials, or reviews, this content may be displayed publicly and shared with other users. You retain ownership of your content, but you grant us permission to use and display it as part of our Services.

Success Stories and Testimonials: With your permission, we may share your success stories, testimonials, or achievements as part of our marketing and promotional materials. We will always obtain your explicit consent before using your personal information for promotional purposes.

### Aggregated and Anonymized Information

Statistical Information: We may share aggregated, anonymized, or de-identified information that cannot be used to identify you personally. This may include usage statistics, demographic trends, or research findings that help us improve our Services or contribute to industry knowledge.

Research and Analytics: We may share anonymized data with researchers, industry partners, or other organizations for educational or research purposes, provided that such data cannot be used to identify individual users.

### Data Processing Agreements

When we share your information with third-party service providers, we enter into data processing agreements that require these providers to:

- Process your information only for the specific purposes outlined in our agreement

- Implement appropriate technical and organizational security measures

- Not use your information for their own purposes or share it with other parties

- Delete or return your information when the service relationship ends

- Comply with applicable privacy laws and regulations

### International Transfers

Some of our service providers and partners may be located outside your country of residence. When we transfer your information internationally, we implement appropriate safeguards to ensure your information receives adequate protection, including:

- Standard contractual clauses approved by relevant data protection authorities

- Adequacy decisions recognizing equivalent levels of data protection

- Other legally recognized transfer mechanisms

### Notification of Changes

We will notify you of any material changes to our information sharing practices through our Privacy Policy updates and, where required by law, through direct communication. You will have the opportunity to review these changes and make informed decisions about your continued use of our Services.

## Data Security

We take the security of your personal information seriously and have implemented comprehensive technical, administrative, and physical safeguards to protect your information from unauthorized access, use, disclosure, alteration, or destruction. Our security measures are designed to provide a level of protection appropriate to the risk of processing your personal information.

### Technical Security Measures

Encryption: We use industry-standard encryption protocols to protect your information both in transit and at rest. All data transmitted between your device and our servers is encrypted using Transport Layer Security (TLS) protocols. Sensitive information stored in our databases is encrypted using advanced encryption standards (AES).

Secure Infrastructure: Our Services are hosted on secure cloud infrastructure provided by reputable providers who maintain SOC 2 Type II compliance and other industry certifications. Our infrastructure includes firewalls, intrusion detection systems, and other security controls to protect against unauthorized access and cyber threats.

Access Controls: We implement strict access controls to ensure that only authorized personnel have access to your personal information. Access is granted on a need-to-know basis and is regularly reviewed and updated. All access to personal information is logged and monitored.

Authentication and Authorization: We use multi-factor authentication and strong password requirements for all administrative accounts. User accounts are protected by secure authentication mechanisms, and we encourage users to enable two-factor authentication for additional security.

Regular Security Updates: We regularly update our systems, software, and security measures to address newly identified vulnerabilities and maintain protection against evolving threats. Our security team monitors security advisories and implements patches and updates promptly.

Data Backup and Recovery: We maintain secure backups of your information to ensure data availability and recovery in the event of system failures or disasters. Backup data is encrypted and stored in secure, geographically distributed locations.

### Administrative Security Measures

Security Policies and Procedures: We have established comprehensive security policies and procedures that govern how personal information is collected, processed, stored, and disposed of. These policies are regularly reviewed and updated to reflect best practices and regulatory requirements.

Employee Training: All employees who have access to personal information receive regular training on data protection, privacy requirements, and security best practices. We conduct background checks on employees who have access to sensitive information.

Incident Response Plan: We have developed and regularly test an incident response plan to ensure we can quickly and effectively respond to security incidents. This plan includes procedures for identifying, containing, and mitigating security breaches, as well as notifying affected users and regulatory authorities when required.

Vendor Management: We carefully vet all third-party service providers and require them to implement appropriate security measures to protect your information. We regularly assess the security practices of our vendors and require them to notify us of any security incidents that may affect your information.

Regular Security Assessments: We conduct regular security assessments, including vulnerability scans, penetration testing, and security audits, to identify and address potential security weaknesses. These assessments are performed by qualified security professionals.

### Physical Security Measures

Data Center Security: Our data is stored in secure data centers that implement multiple layers of physical security, including biometric access controls, 24/7 security monitoring, environmental controls, and redundant power and network systems.

Equipment Security: All servers and networking equipment are secured in locked cabinets and rooms with restricted access. Decommissioned equipment is securely wiped or destroyed to prevent data recovery.

Workplace Security: Our offices implement appropriate physical security measures, including access controls, visitor management systems, and secure storage for any physical documents containing personal information.

### Data Minimization and Retention

Data Minimization: We collect and process only the personal information that is necessary for the purposes outlined in this Privacy Policy. We regularly review the information we collect to ensure it remains relevant and necessary for our business purposes.

Secure Data Disposal: When personal information is no longer needed, we securely delete or anonymize it using industry-standard data destruction methods. This includes secure wiping of electronic media and physical destruction of storage devices when necessary.

Retention Policies: We have established data retention policies that specify how long different types of personal information are retained based on legal requirements, business needs, and user preferences. Information is automatically deleted when retention periods expire.

### Monitoring and Detection

Security Monitoring: We continuously monitor our systems for suspicious activities, unauthorized access attempts, and other security threats. Our monitoring systems use advanced analytics and machine learning to detect anomalous behavior and potential security incidents.

Logging and Auditing: We maintain comprehensive logs of system activities, access attempts, and data processing operations. These logs are regularly reviewed and analyzed to identify potential security issues and ensure compliance with our security policies.

Threat Intelligence: We subscribe to threat intelligence services and participate in information sharing initiatives to stay informed about emerging security threats and attack vectors that may affect our Services.

### User Security Responsibilities

Account Security: You are responsible for maintaining the security of your account credentials, including choosing a strong password and keeping it confidential. We recommend enabling two-factor authentication for additional account protection.

Suspicious Activity: Please report any suspicious activity related to your account or our Services immediately. This includes unauthorized access attempts, suspicious emails claiming to be from us, or any other security concerns.

Software Updates: We recommend keeping your devices and software up to date with the latest security patches and updates to protect against known vulnerabilities.

### Security Incident Response

Incident Detection: We have implemented systems and procedures to detect security incidents quickly and accurately. Our security team monitors for indicators of compromise and investigates potential incidents promptly.

Incident Containment: When a security incident is detected, we immediately take steps to contain the incident and prevent further unauthorized access or data exposure. This may include isolating affected systems, changing access credentials, and implementing additional security controls.

User Notification: In the event of a security incident that may affect your personal information, we will notify you promptly in accordance with applicable laws and regulations. Our notification will include information about the nature of the incident, the information involved, and steps we are taking to address the situation.

Regulatory Reporting: We will report security incidents to relevant regulatory authorities as required by applicable laws, including data protection authorities and law enforcement agencies when appropriate.

### Limitations of Security

While we implement robust security measures, no system is completely secure, and we cannot guarantee the absolute security of your information. Internet-based communications and data storage systems are subject to inherent security risks, including the possibility of unauthorized access by third parties.

We encourage you to take steps to protect your own information, including using strong passwords, enabling two-factor authentication, being cautious about sharing personal information online, and reporting any suspicious activity to us immediately.

In the unlikely event of a security breach, we are committed to transparency and will work diligently to investigate the incident, mitigate any harm, and prevent similar incidents in the future.

## Your Privacy Rights

We respect your privacy rights and provide you with various options to control how your personal information is collected, used, and shared. Your rights may vary depending on your location and applicable privacy laws, including the General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), and other state and federal privacy regulations.

### Universal Privacy Rights

Right to Access: You have the right to request access to the personal information we have collected about you. This includes the right to know what categories of information we collect, the sources of that information, the purposes for which we use it, and the categories of third parties with whom we share it.

Right to Correction: You have the right to request that we correct inaccurate or incomplete personal information about you. We will make reasonable efforts to correct your information promptly upon verification of your identity and the accuracy of the requested changes.

Right to Deletion: You have the right to request that we delete your personal information, subject to certain exceptions. We will delete your information unless we need to retain it for legal compliance, fraud prevention, security purposes, or other legitimate business reasons.

Right to Data Portability: You have the right to request a copy of your personal information in a structured, commonly used, and machine-readable format. This allows you to transfer your information to another service provider if you choose to do so.

Right to Opt-Out: You have the right to opt out of certain uses and disclosures of your personal information, including marketing communications, data sales (which we do not engage in), and certain types of automated processing.

### Rights for European Union Users (GDPR)

If you are located in the European Union, you have additional rights under the GDPR:

Right to Restrict Processing: You have the right to request that we restrict the processing of your personal information in certain circumstances, such as when you contest the accuracy of the information or object to our processing.

Right to Object: You have the right to object to our processing of your personal information for direct marketing purposes or when processing is based on legitimate interests. We will stop processing your information unless we can demonstrate compelling legitimate grounds for continued processing.

Right to Withdraw Consent: Where our processing is based on your consent, you have the right to withdraw that consent at any time. Withdrawal of consent will not affect the lawfulness of processing based on consent before its withdrawal.

Right to Lodge a Complaint: You have the right to lodge a complaint with a supervisory authority if you believe our processing of your personal information violates the GDPR.

Right Not to Be Subject to Automated Decision-Making: You have the right not to be subject to decisions based solely on automated processing, including profiling, that produce legal effects or similarly significant effects on you.

### Rights for California Residents (CCPA/CPRA)

If you are a California resident, you have specific rights under the California Consumer Privacy Act and California Privacy Rights Act:

Right to Know: You have the right to request information about the categories and specific pieces of personal information we have collected about you, the categories of sources from which we collected the information, the business or commercial purpose for collecting the information, and the categories of third parties with whom we share the information.

Right to Delete: You have the right to request that we delete personal information we have collected from you, subject to certain exceptions.

Right to Correct: You have the right to request that we correct inaccurate personal information about you.

Right to Opt-Out of Sale or Sharing: You have the right to opt out of the sale or sharing of your personal information. We do not sell personal information, but if our practices change, we will provide clear opt-out mechanisms.

Right to Limit Use of Sensitive Personal Information: You have the right to limit our use and disclosure of sensitive personal information to purposes necessary to perform our services or as otherwise permitted by law.

Right to Non-Discrimination: You have the right not to receive discriminatory treatment for exercising your privacy rights. We will not deny goods or services, charge different prices, or provide different levels of service based on your exercise of privacy rights.

### How to Exercise Your Rights

Online Account Management: Many privacy rights can be exercised through your online account settings, where you can update your information, adjust privacy preferences, and manage communication settings.

Privacy Request Portal: We provide a dedicated privacy request portal where you can submit requests to exercise your privacy rights. This portal allows you to specify the type of request and provide necessary verification information.

Email Requests: You can submit privacy requests by emailing us at [email protected]. Please include "Privacy Request" in the subject line and provide sufficient information to verify your identity and process your request.

Phone Requests: You may also submit privacy requests by calling us at (956) 382-7832. Our customer service representatives can assist you with your privacy requests.

### Identity Verification

To protect your privacy and security, we must verify your identity before processing certain privacy requests. The verification process may include:

Account Verification: If you have an account with us, we may verify your identity through your account login credentials and additional security questions.

Information Matching: We may ask you to provide information that matches records in our system, such as your email address, account details, or recent transaction information.

Documentation: For certain requests, we may require additional documentation to verify your identity, such as a government-issued ID or other identifying documents.

Authorized Agents: If you use an authorized agent to submit a privacy request on your behalf, we will require proof of authorization and may need to verify both your identity and the agent's authority to act on your behalf.

### Response Timeframes

We are committed to responding to your privacy requests promptly and within the timeframes required by applicable law:

Standard Requests: We will respond to most privacy requests within 30 days of receipt. For complex requests, we may extend this period by an additional 60 days with notification.

Urgent Requests: For urgent requests related to security concerns or data breaches, we will respond as quickly as possible, typically within 72 hours.

Incomplete Requests: If your request is incomplete or requires additional information for verification, we will contact you promptly to request the necessary information.

### Limitations and Exceptions

While we strive to honor all privacy requests, there are certain limitations and exceptions:

Legal Requirements: We may be unable to fulfill requests that would violate applicable laws or regulations, such as requests to delete information we are required to retain for legal compliance.

Security and Fraud Prevention: We may retain certain information necessary for security purposes, fraud prevention, or to protect the rights and safety of our users and the public.

Business Operations: We may retain information necessary for legitimate business operations, such as completing transactions, providing customer support, or maintaining business records.

Technical Limitations: In some cases, technical limitations may prevent us from fulfilling certain requests, such as requests to modify information in backup systems or archived data.

### Communication Preferences

Marketing Communications: You can opt out of marketing communications at any time by clicking the unsubscribe link in our emails, updating your account preferences, or contacting us directly.

Service Communications: Certain communications related to your account, transactions, and important service updates are necessary for the operation of our Services and cannot be opted out of while you maintain an account.

Push Notifications: You can control push notifications through your device settings or our mobile application settings.

### Data Subject Rights for Other Jurisdictions

We recognize that privacy laws vary by jurisdiction and are committed to complying with applicable privacy regulations worldwide. If you are located in a jurisdiction with specific privacy rights not covered above, please contact us to discuss how we can accommodate your rights under local law.

## Cookies and Tracking Technologies

We use cookies and similar tracking technologies to enhance your experience with our Services, analyze usage patterns, and provide personalized content. This section explains what these technologies are, how we use them, and how you can control them.

### Types of Tracking Technologies

Cookies: Cookies are small text files stored on your device that help us remember your preferences, maintain your login session, and provide personalized experiences. We use both session cookies (which expire when you close your browser) and persistent cookies (which remain on your device for a specified period).

Web Beacons: Web beacons are small graphic images embedded in web pages or emails that help us track user interactions, such as whether an email was opened or a web page was visited.

Local Storage: We may use local storage technologies, such as HTML5 local storage, to store information on your device for improved performance and functionality.

Analytics Tools: We use analytics tools that employ various tracking technologies to collect information about how users interact with our Services.

### How We Use Tracking Technologies

Essential Functionality: Some tracking technologies are essential for the basic functionality of our Services, such as maintaining your login session, remembering your preferences, and ensuring security.

Performance and Analytics: We use tracking technologies to analyze how our Services are used, identify popular content, and improve performance and user experience.

Personalization: Tracking technologies help us personalize your experience by remembering your preferences, customizing content recommendations, and providing relevant information.

Marketing and Advertising: We may use tracking technologies to deliver targeted advertisements and measure the effectiveness of our marketing campaigns.

### Managing Tracking Technologies

Browser Settings: Most web browsers allow you to control cookies through their settings. You can typically choose to accept all cookies, reject all cookies, or receive notifications when cookies are set.

Opt-Out Tools: We provide tools within our Services to help you manage your tracking preferences and opt out of certain types of tracking.

Third-Party Opt-Outs: For third-party tracking technologies, you may need to visit the respective third-party websites to manage your preferences.

## Third-Party Services

Our Services may integrate with or link to third-party services, websites, and applications. This section explains how these integrations work and how they may affect your privacy.

### Types of Third-Party Services

Payment Processors: We use third-party payment processors to handle subscription payments and transactions. These processors have their own privacy policies and security measures.

Analytics Services: We use third-party analytics services to understand user behavior and improve our Services. These services may collect information about your usage patterns.

Social Media Platforms: Our Services may include social media integration features that allow you to share content or connect your social media accounts.

Educational Content Partners: We may partner with other educational content providers to offer additional courses and materials.

### Third-Party Privacy Policies

Third-party services have their own privacy policies and terms of service that govern how they collect, use, and protect your information. We encourage you to review these policies before using third-party services through our platform.

### Our Responsibility

While we carefully select our third-party partners and require them to maintain appropriate privacy and security standards, we are not responsible for the privacy practices of third-party services. Your interactions with third-party services are governed by their respective privacy policies.

## Children's Privacy

Our Services are designed for adults and are not intended for children under the age of 13. We do not knowingly collect personal information from children under 13 years of age.

### Age Verification

We may implement age verification measures to ensure that users of our Services are at least 13 years old. If we discover that we have collected personal information from a child under 13, we will delete that information promptly.

### Parental Rights

If you are a parent or guardian and believe that your child has provided personal information to us, please contact us immediately. We will work with you to address your concerns and delete any inappropriate information.

### Educational Content

While our educational content focuses on practical skills that may be of interest to younger individuals, our Services are designed for adult learners and include community features and content that are not appropriate for children.

## International Data Transfers

We may transfer your personal information to countries other than your country of residence for processing and storage. This section explains how we protect your information during international transfers.

### Transfer Safeguards

When we transfer personal information internationally, we implement appropriate safeguards to ensure your information receives adequate protection, including:

Adequacy Decisions: We may transfer information to countries that have been deemed to provide adequate protection by relevant data protection authorities.

Standard Contractual Clauses: We use standard contractual clauses approved by data protection authorities to ensure appropriate protection for international transfers.

Binding Corporate Rules: Where applicable, we may rely on binding corporate rules that provide consistent protection across different jurisdictions.

### Data Processing Locations

Your information may be processed in the United States and other countries where our service providers operate. We ensure that all processing locations maintain appropriate security and privacy protections.

## Data Retention

We retain your personal information only for as long as necessary to fulfill the purposes outlined in this Privacy Policy, comply with legal obligations, resolve disputes, and enforce our agreements.

### Retention Periods

Account Information: We retain account information for as long as your account is active and for a reasonable period thereafter to comply with legal obligations and resolve disputes.

Educational Progress: We retain information about your educational progress and course completion for as long as necessary to provide ongoing educational services and support.

Communication Records: We retain communication records for a reasonable period to provide customer support and resolve any issues that may arise.

Legal Requirements: Some information may be retained for longer periods as required by applicable laws and regulations.

### Data Deletion

When retention periods expire, we securely delete or anonymize your personal information using industry-standard data destruction methods. You may also request deletion of your information as described in the "Your Privacy Rights" section.

## Changes to This Privacy Policy

We may update this Privacy Policy from time to time to reflect changes in our practices, Services, or applicable laws. We are committed to providing you with notice of material changes and obtaining your consent where required by law.

### Notification of Changes

Website Notice: We will post updated Privacy Policies on our website with a revised "Last Updated" date.

Email Notification: For material changes that significantly affect how we collect, use, or share your personal information, we will send email notifications to registered users.

In-Service Notifications: We may also provide notifications through our Services, such as pop-up notices or dashboard alerts.

### Your Continued Use

Your continued use of our Services after we post changes to this Privacy Policy constitutes your acceptance of the updated policy. If you do not agree with the changes, you may discontinue using our Services and request deletion of your account and personal information.

### Review Recommendations

We encourage you to review this Privacy Policy periodically to stay informed about how we protect your privacy and any changes to our practices.

## Contact Information

If you have questions, concerns, or requests regarding this Privacy Policy or our privacy practices, please contact us using the information below:

Email: [email protected]

Subject Line: Privacy Policy Inquiry

Phone: (956) 382-7832

Website: https://toxicallymale.com/

Response Time: We strive to respond to all privacy inquiries within 5 business days. For urgent privacy concerns, please indicate "URGENT" in your subject line.

### Additional Resources

Privacy Request Portal: Available through your account settings

Cookie Management: Available through your account settings

Data Subject Rights: Contact us using the information above for assistance with privacy rights requests

---

Last Updated: December 1, 2024

Effective Date: December 1, 2024

This Privacy Policy is effective as of the date listed above and supersedes all previous versions. We reserve the right to modify this Privacy Policy at any time in accordance with the procedures outlined in the "Changes to This Privacy Policy" section.