Who we are
This website address is https://devopsdriving.com and represents the DevOps Driving video series presence on the web. DevOps Driving is an online video series and associated media content produced by Scott Moore Consulting LLC.
Comments
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. Additional data may be collected by third parties, such as Google for the use of website usage analytics.
Media
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
Cookies
If you visit our website, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
Embedded content from other websites
Blog articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.
Who we share your data with
Web forms may collect data that you agree to share with us, and this information may be shared with third parties for mailing list and marketing use.
What rights you have over your data
You can request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Emails sent to this domain may be checked through an automated spam detection service. Traffic to the website may be filtered by a third party for security, bot protection, and malicious activity.