Last updated: 12/2/2020

We value the privacy of individuals who visit our website and use our services. In order to provide our services, we need to collect certain pieces of information. This Privacy Policy is intended to help you understand what information we collect, why we collect it, and how you can control your information. You may contact us at [email protected] if you have any questions.

Section 1: Who we are and scope of this Privacy Policy​

‘Startup Sloth’ is published by Menai Insight (“Menai Insight, LLC”, “we”, “our”, and/or “us”), a US company located in Michigan. We value your privacy and have developed this policy to cover the usage of and related communications. If you use other services provided by Menai Insight, those services will be covered by separate privacy policies. 

Section 2: Information that we collect and process​

Information directly provided by you to us.
If you contact us, you provide us with various pieces of information, such as your name, email address, contact message.

Information collected when using our websites and interact with us.
Like most websites, when you use our websites, we, and our trusted service providers (including our website hosts, analytics providers, advertising partners, and integrated social media services) gather various pieces of information, including via cookies and related technologies. Cookies are small files on your computer and are important to how our sites function and our ability to motor usage. If you interact with services such as social media (for example ‘liking’ or ‘sharing’ our page on social media), the associated partner will collect additional information associated with the interaction (for example, recording the like or share on their service). Similarly, if you click on an advert on our website, this will be recorded by our advertising partners.

Section 3: Why we collect and process the information​

We collect information for four primary reasons:

  • To provide the services request to you
  • To improve and tailor our services
  • Based on our legitimate business interests
  • As necessary for record-keeping, legal reasons, and compliance

3.i) To provide the services request to you​

When you provide information to us, we use that information to provide the services requested. For example, if you contact us or subscribe to our mailing list, we use the information that you provide to respond to your request or deliver our newsletter. Similarly, if you click to ‘like’ or ‘share’ a page on social media, our social media partners will use this information on their services to ‘like’ or ‘share’ the page.

3.ii) To improve and tailor our services​

Website: We use the information collected to improve our service. For example, statistics collected as you browse our website are used to help improve page content and identify technical issues.

Contact with us: We use feedback and inquiries to improve our website, services, and support and tailor our offerings with you. For example, if you inquire about a particular feature, we may use this information to help our development or to keep you updated with improvements.

3.iii) Based on our legitimate business interests​

Some of the information processed is based on our legitimate business interests. For example, consistent with many news and information outlets, we include adverts from trusted partners and advertising networks. This helps support us in providing free access to articles on our website, with individual and society benefits from access to our articles.

3.iv) As necessary for record-keeping, legal reasons, compliance, and security​

Information is collected as is necessary to satisfy our various record-keeping, legal, compliance and and security obligations and to maintain the security and availability of our services.

Section 4: How we keep your information secure​

We take the security of your information seriously and have put in place various practices to protect your data. These include partnering with trusted-organizations who have large experience in securing specific material; restricting internal access and training; physical and digital security.

Data security: We have in place a variety of security layers, including two-factor authentication, firewalls, and encryption as appropriate. Our service providers are also selected based on their experience and data security procedures.

Restricted access and training: We provide internal training to all employees who have access to any personal information. This covers training on this privacy policy, as well as physical security practices.