Privacy Policy For Picture Perfect Portfolios

In an era characterized by the digital proliferation and the seamless exchange of information, the significance of privacy cannot be overstated. This privacy policy serves as our unwavering commitment to you, the user, delineating the precise manner in which we gather, process, and utilize your data. Through this instrument, we aim to instill clarity, transparency, and confidence.

1. Introduction

As custodians of your trust and data, we are acutely aware of the heavy responsibility we bear. This privacy policy is a testament to our dedication to uphold the highest standards of data protection and to ensure that your journey through the intricate corridors is fortified with robust privacy measures.

This truth underlines the criticality of data privacy, transcending it from a mere statutory requirement to an ethical obligation we owe to our user community. We understand that in sharing your data with us, you are sharing a piece of your trust, your aspirations, and your future financial endeavors. Respecting this shared bond, we have meticulously sculpted this policy to protect your interests, aspirations, and, most importantly, your privacy.

By engaging with our platform and services, you step into a sanctuary where your data’s privacy is held sacrosanct. We urge you to read through this policy with the same diligence and care that we have put into crafting it.

2. Definitions

In the realm of data protection and privacy, it is quintessential to define certain terms to ensure clarity, precision, and unequivocal understanding. This section meticulously elaborates on the terminology fundamental to the framework of this policy, aiming to provide users with a lucid understanding of how their information is categorized, processed, and protected.

Personal Data: At the core of our commitment to privacy lies the protection of ‘Personal Data.’ This term refers to any information that, either on its own or in conjunction with other data, can be utilized to identify, locate, or contact an individual. Such data includes, but is not limited to, your name, mailing address, phone number, email address, financial details, and other identifiers that are singular to you. It is this category of data that often carries with it the gravest implications if mismanaged, and as such, our policy endeavors to offer it the highest echelons of protection.

Usage Data: While Personal Data pertains directly to an individual’s identity, ‘Usage Data’ is more impersonal in nature. This data encapsulates information about how a user interacts with our platform. Examples of Usage Data include browser type, access times, referring web page addresses, pages visited on our platform, and the duration spent on those pages. This data, although less intimate, is pivotal in enhancing the user experience and tailoring our platform to meet the unique preferences of our community.

Cookies: The term ‘Cookies’ might invoke thoughts of a delightful treat, but in the digital lexicon, it has an entirely different connotation. Cookies are small files deposited on a user’s device when they visit a website. These files are designed to hold modest amounts of data specific to the user, which can be accessed either by the web server or the client’s computer. By leveraging cookies, we can offer a more personalized and efficient user experience, recognizing returning users and recalling their preferences.

Data Controller: Within the machinery of data processing, the ‘Data Controller’ stands as a pivotal entity. This term denotes the individual or the organization that determines the purposes for which, and the manner in which, personal data is to be processed. As you navigate our platform, we often operate in the capacity of a Data Controller, taking decisions on how your Personal Data should be used and ensuring its protection.

Data Processor: Complementing the role of the Data Controller is the ‘Data Processor.’ This entity, which can be an individual or an organization, processes personal data on behalf of the controller. It’s imperative to understand that while the Data Processor carries out the actual processing, they do so under the stringent directives of the Data Controller, ensuring the sanctity of the data is never compromised.

By elucidating these definitions, we aim to demystify the complex lattice of data protection. A clear understanding of these terms is not just a statutory requirement but also a testament to our commitment to transparency, ensuring that you, the user, are always informed and empowered.

3. Data Collection and Its Purpose

Navigating the digital tapestry of the landscape necessitates the careful collection and processing of specific data, serving as pivotal touchpoints in ensuring an optimized, secure, and personalized user experience. However, in these endeavors, we maintain an unwavering allegiance to the principles of transparency, minimality, and purposefulness in data collection. This section is devoted to demystifying the procedures we adopt, the kinds of data we collect, and the compelling reasons behind such actions.

a. Information Users Provide Directly: Every interaction you have with our platform, whether it’s the initiation of an account, the submission of contact forms, or any voluntary disclosure of information, represents data that you directly provide to us. This data often includes:

  • Account Creation: When establishing an account, we require certain personal identifiers such as your name, email address, contact number, and perhaps financial specifics. This is not merely a procedural necessity; it’s a pathway to tailor our services to fit your unique needs and preferences.
  • Contact Forms: Should you reach out to us via our contact mechanisms, the information you provide—be it inquiries, feedback, or other communications—becomes an integral part of our engagement. It not only enables us to address your concerns but also paves the way for iterative improvements to our platform.

b. Information Collected Automatically: Beyond what you directly provide, certain aspects of data are gathered automatically as you navigate our platform. This collection is passive, yet it holds profound implications for enhancing your user experience:

  • Log Files: Like many online platforms, we utilize log files. These files log visitors when they visit websites. The data held within these logs typically includes IP addresses, browser types, Internet Service Providers (ISP), date/time stamps, referring/exit pages, and potentially the number of clicks. It’s pertinent to stress that this data is not linked to any information that is personally identifiable; rather, it’s crucial for analyzing trends, administering the site, and gathering demographic information.
  • Location Data: With your consent, we might access data about your geographical location. This isn’t an exercise in cartographic curiosity; it aids in the provision of region-specific services, offerings, and regulatory compliances.

c. Usage of Cookies and Tracking Technologies: As previously elucidated in our definitions, cookies play a pivotal role in the digital realm:

  • Cookies: By placing small files on your device, cookies empower us to recognize you on subsequent visits, remember your preferences, and provide a more seamless experience. You retain the right to decline cookies, but this might impair certain platform functionalities.
  • Tracking Technologies: Beyond cookies, other tracking technologies like beacons, tags, and scripts aid in analyzing trends, administering the platform, and tracking users’ movements around the site. These technologies also allow us to gather demographic information about our user base as a whole.

d. Third-party Data Collection and Integration: In an interconnected digital world, third-party integrations are often inevitable:

  • Third-party Vendors: We may collaborate with third-party vendors, consultants, and other service providers who require access to your information to carry out work on our behalf. However, it’s imperative to stress that these entities are bound by contractual obligations to maintain the confidentiality and security of your data.
  • Integrated Services: Our platform may offer the option to connect and integrate with other services, platforms, or applications. If you choose to do so, we may receive information from these integrated services, always ensuring that such integrations are transparent and within your control.

In summary, the very act of data collection on our platform is driven by a meticulous blend of necessity and our unwavering commitment to offering you an unparalleled experience. With each byte of data, we aim to refine our offerings, fortify our security, and bolster our promise of keeping your best interests at heart.

4. Data Retention

The acquisition and utilization of data within our platform, though paramount, are transient phases in the lifecycle of user information. An aspect equally crucial, if not more so, is the duration for which this data is retained and the subsequent procedures for its disposal. Data retention is not a mere chronological calculation; it is emblematic of our commitment to data minimization, legal adherence, and respect for user autonomy. This section delves into the meticulous matrix of our data retention policies, casting light upon the rationale, duration, and criteria that underscore this fundamental aspect of data governance.

a. Explanation of How Long User Data is Retained:

Data retention within our platform is governed by a fusion of purposefulness and obligation:

  • Transactional Data: As the nucleus of our platform, transactional records—capturing investment activities, fund transfers, and portfolio adjustments—are retained for a period mandated by relevant financial and tax regulations. Typically, this duration might span several years, ensuring that all legal obligations, audits, and financial reconciliations can be executed seamlessly.
  • Account Information: Data pertinent to account creation and management is retained for the entire duration of the user’s active engagement with our platform. Upon account deactivation or closure, while certain data might be anonymized and retained for analytical purposes, personally identifiable information is purged in accordance with our decommissioning protocols.
  • Communication Logs: Records of communications, be it queries, feedback, or support interactions, are held for a duration that allows us to monitor service quality, address recurrent concerns, and fine-tune our user engagement models.
  • Automatically Collected Data: Information such as log files, usage patterns, and other passive data collection mechanisms are retained for a timeframe that allows meaningful analytical insights. Post this period, the data is either purged or anonymized, ensuring that its retention poses no privacy risks.

b. Criteria Used to Determine Retention Periods:

The complexities of determining appropriate data retention timelines are navigated using a set of meticulously defined criteria:

  • Statutory and Regulatory Mandates: Foremost among our criteria are the legal and regulatory mandates specific to the realm of finance. These directives often prescribe minimum and sometimes maximum retention periods for various data categories.
  • Operational Necessities: Data integral to the ongoing operations, service delivery, and user support of our platform dictates its own retention periods. Such data is held as long as it fulfills its operational role and is subsequently scheduled for deletion.
  • User Consent: In certain scenarios, especially where data retention isn’t mandated by law or operation, user consent becomes the guiding light. If users accord permission for prolonged retention—for instance, for receiving updates or promotional content—their preferences become the determining criterion.
  • Risk Management and Dispute Resolution: To safeguard against potential disputes, litigations, or claims, certain data might be retained beyond its typical lifecycle. This ensures that, in the face of legal challenges, requisite evidence is available to ascertain facts and protect both the platform and its users.
  • Data Minimization Principles: Rooted in our commitment to privacy is the principle of data minimization. Where no compelling rationale—be it legal, operational, or user-driven—exists for data retention, the default action is its prompt and secure deletion.

In encapsulation, our data retention paradigms are sculpted with an unwavering fidelity to legal directives, operational imperatives, and, above all, the sanctity of user privacy. In every byte of data retained, we see a reflection of our duty to serve, our obligation to protect, and our promise to respect the trust you bestow upon us.


This website uses the services of Ezoic Inc. (“Ezoic”). Ezoic’s privacy policy is here. Ezoic may employ a variety of technologies on this website, including to display advertisements and enable advertising to visitors of this website. For additional information about Ezoic’s advertising partners, please see Ezoic’s Advertising Partner Page here.



6. Contact Information

Recognizing the imperative of open channels of communication and the indispensability of addressing concerns at their nascent stage, we have meticulously curated avenues for users to reach out, seek clarifications, and voice apprehensions. A privacy policy, regardless of its intricacy and depth, is only as robust as its implementation and the ease with which stakeholders can engage with its stewards. Herein, we provide the specifics of our contact framework, ensuring that every query, concern, or feedback finds its rightful audience and garners due attention.

a. Direct Queries & Concerns about the Privacy Policy:

For any questions, reservations, or clarifications regarding our privacy policy, its provisions, or its implications, users are encouraged to reach out to us via the following coordinates:

Email Address: nomadicsamuel at gmail dot com