Thank you for visiting Wisdom Nutrition, LLC’s online and mobile resources, and for viewing this privacy and data security statement. This page provides a brief summary of our data collection, use, and protection practices...
If you have any questions about our privacy and data security policies, procedures, and practices, including anything we say in this privacy statement, we encourage you to contact our Privacy Office.
Wisdom Nutrition, LLCThis privacy statement was amended as of November 21st, 2023 and is effective as of that date. The English language version of this privacy statement is the controlling version regardless of any translation you may attempt.
You can use the links below to navigate to areas of this statement that apply specifically to you, or which may otherwise be of interest:
Although not itself a contract, this privacy statement is an important document that explains how we address some of our legal obligations, and your related legal rights, involving personal information. Clarity is, therefore, important. We’ll use this section to let you know about some words that have special meanings whenever you see them in this statement.
Let’s start with the word “statement” itself: when we reference “this statement,” “this privacy statement,” and “our statement,” we mean the Privacy and Data Security Statement you are reading now. Wherever we say “Company,” “we,” “us,” or “our,” we mean Wisdom Nutrition, LLC. We use the words “you” and “your” to mean you, the reader, and other visitors to our online and mobile resources who are, in all cases, over the age of 18. This age requirement is discussed in more detail later in the section titled “Children’s Privacy” below. When we talk about our “online and mobile resources,” we mean all websites, portals, or other features we operate to allow you to interact with us and our systems, as well as the mobile apps we’ve created and distributed to let you interact with the content we provide.
An “affinity action” is when you “follow” us, “like” us, or take a similar or analogous action on our external social media presence. Finally, and perhaps most importantly, when we refer to “personal information,” we mean any data or data element, whether in electronic or other form, that, alone or in combination with other elements, can be used to distinguish, trace, or discover your identity. Certain data privacy laws include specific elements or defined terms for what they consider to be the personal information (or personal data) they govern. Where such data privacy laws apply, then the term “personal information” includes the specific elements and defined terms required by such laws.
We collect personal information from four groups of data subjects:
The categories of information we collect from each of these groups, and the ways in which we use it, differs.
It is important to note, however, that this privacy statement applies only to visitors and users of our online and mobile resources. Thus, the words “you” and “your” throughout this privacy statement mean only that category of data subject. As you may have noticed, it’s possible that the same person could fall into more than one group. For instance, someone who works for us might, on their day off, visit one of our general websites.
Privacy and data protection laws vary around the world and among the individual United States. Our obligations arising under the majority of the world’s privacy laws, including U.S. federal and most state laws, are satisfied by individual risk assessments conducted by us to ensure we act reasonably and responsibly when processing your personal information. We refer to these as “General Privacy Laws.” In some jurisdictions, however, privacy laws grant you, the data subject, certain specific rights regarding your personal information. We refer to these types of privacy laws as data subject rights-based laws or “DSR Privacy Laws.”
Examples of DSR Privacy Laws include the U.S. State of California’s Consumer Privacy Protection Act or “CCPA,” and the European Union’s General Data Protection Regulation or “GDPR.”
Generally, we collect personal information in two ways: that which you voluntarily provide to us, and that which we collect through automated/technical means. We describe that type of voluntary submission immediately below, and we describe our automatic collection in the section titled “Automatically Collected Information” below. By using our online and mobile resources, you are signifying to us that you agree with this section of our privacy statement and that we may use and disclose your information as described.
If you choose to participate in, or make use of certain activities and features available via our online and mobile resources, you will need to provide us with information about yourself. The types of personal information you will be submitting to us in those situations is almost always limited to basic identifiers such as your name, email address, mailing address, and phone number. Here are some of the ways you voluntarily give us your personal information:
If you prefer we not receive the above-described personal information, please don’t submit it. This means you shouldn’t participate in the applicable activities on, or use the applicable features available from our online and mobile resources. Such participation and use is strictly your choice. By not participating, you may limit your ability to take full advantage of the online and mobile resources, but most of the content in our online and mobile resources will still be available to you.
When you visit or use our online and mobile resources, basic information about your internet/electronic activity is automatically collected through your browser via tracking technologies, such as “cookies.” Cookies allow us to collect your IP address and recognize your computer or mobile device and store some information about your preferences for using our online and mobile resources or past actions, such as:
Additional information about cookies and tracking technologies is available here.
If you access our online and mobile resources from a phone or other mobile device, the mobile services provider may transmit to us certain information such as uniquely identifiable mobile device information. That, in turn, allows us to collect mobile phone numbers and associate them with the mobile device identification information. Some mobile phone service providers also operate systems that pinpoint the physical location of devices, and we may receive this geolocation data as well.
When you use our online and mobile resources, we may allow third-party service providers to place their own cookies or similar technologies in order to engage in the same types of collection we describe above. For example, we use third-party “web analytics” services such as those offered by Google Analytics. For more information on how Google specifically uses this data, go to www.google.com/policies/privacy/partners/. You can learn more about how to opt out of Google Analytics by going to https://tools.google.com/dlpage/gaoptout.
We have adopted, implemented, and maintain an enterprise-wide corporate information security and privacy program that includes technical, organizational, administrative, and other security measures designed to protect, as required by applicable law, against reasonably anticipated or actual threats to the security of your personal information (the “Security Program”). Our Security Program was created with reference to widely recognized industry standards such as those published by the International Standards Organization and the National Institute of Standards and Technology. It includes, among many other things, procedures for assessing the need for and employing encryption and multi-factor authentication as appropriate, or using equivalent compensating controls. We therefore have every reason to believe our Security Program is reasonable and appropriate for our business and the nature of foreseeable risks to the personal information we collect. We further periodically review and update our Security Program, including as required by applicable law.
Despite the significant investment we’ve made in, and our commitment to, the Security Program including enforcement of our third-party oversight procedures described above, we cannot guarantee that your personal information, whether during transmission or while stored on our systems, otherwise in our care, or the care of our vendors and business partners, will be free from either failed or successful attempts at unauthorized access or that loss or accidental destruction will never occur. Except for our duty under applicable law to maintain the Security Program, we necessarily disclaim, to the maximum extent the law allows, any other liability for any such theft or loss of, unauthorized access or damage to, or interception of any data or communications including personal information.
All that said, as part of our Security Program, we have specific incident response and management procedures that are activated whenever we become aware that your personal information was likely to have been compromised. Those procedures include mechanisms to provide, when circumstances and/or our legal obligations warrant, notice to all affected data subjects within the timeframes required by law, as well as to give them such other mitigation and protection services (such as the credit monitoring and identity theft insurance) as may be required by applicable law. We further require, as part of our vendor and business partner oversight procedures, that such parties notify us within the timeframes required by law if they have any reason to believe that an incident adversely affecting personal information we provided to them has occurred.
If we are using your personal information to send you marketing materials, such as newsletters or product alerts via text or email, you may opt out by following the opt-out instructions in the email or other communication (e.g., by responding to the text with “STOP”). In addition, certain of our online and mobile resources will provide a centralized opt-out link allowing you to opt out of any programs in which you may have enrolled using that particular online and mobile resource. When we receive your request, we will take reasonable steps to remove your name from our distribution lists, but it may take time to do so. You may still receive materials for a period of time after you opt out.
In addition to opting out, you have the ability to access, amend, and delete your personal information by contacting us using the contact information below. Opting out of or changing affinity actions or other submissions or requests made on our external social media presence, will likely require that you do so directly on that applicable platform as we do not control their procedures.
Some browsers have a “do not track” feature that lets you tell websites that you do not want to have your online activities tracked. At this time, we do not specifically respond to browser “do not track” signals.
Federal law imposes special restrictions and obligations on commercial website operators who direct their operations toward, and collect and use information from, children under the age of 13. We take those age-related requirements very seriously, and, consistent with them, do not intend for our online and mobile resources to be used by children under the age of 18, and certainly not by those under the age of 13. Moreover, we do not knowingly collect personal information from minors under the age of 18. If we become aware that anyone under the age of 18 has submitted personal information to us via our online and mobile resources, we will delete that information and not use it for any purpose whatsoever. We encourage parents and legal guardians to talk with their children about the potential risks of providing personal information over the Internet.
When we collect personal information from California residents we become subject to, and those residents have rights under, the California Consumer Privacy Act or “CCPA”. This section of our statement is used to allow us to fulfill our CCPA obligations and explain your CCPA rights. For purposes of this section, the words “you” and “your” mean only such California residents.
We collected the following categories of personal information within the last 12 months:
We may have disclosed the categories of personal information listed above for one or more business purposes permitted by the CCPA during the last 12 months.
We do not sell, and within the last 12 months have not sold, personal information to third parties.
Please re-review the section of this privacy statement titled “Who Do We Collect Personal Information From?” to understand the scope of purposes and the sources from which we collect it. Similarly, we urge you to re-read the section of this statement titled “With Whom Do We Share Personal Information?” where we describe the categories of third parties with which we may share your personal information and why.
You have the following rights under the CCPA. It’s important to us that you know that if you exercise these rights, we will not discriminate against you by treating you differently from other California residents who use our sites and mobile resources or purchase our services but did not exercise their rights.
You, or an authorized agent acting on your behalf, can exercise the Right to Know up to two different times every 12 months. To exercise these rights, contact us at [email protected] or (833) 738-3456. We may ask you to fill out a request form. The CCPA only allows us to act on your request if we can verify your identity and/or your agent’s authority to make the request, so you will also need to follow our instructions for identity verification.
If you make a verifiable request per the above, we will confirm our receipt and respond in the time frames prescribed by the CCPA.
We reserve the right to change or update this statement from time to time. Please check our online and mobile resources periodically for such changes since all information collected is subject to the statement in place at the time of collection. Typically, we will indicate the effective/amendment date at the beginning of this statement. If we feel it is appropriate, or if the law requires, we’ll also provide a summary of changes we’ve made near the end of the new statement.