About Us
We officially operate through our website located at battlecorefusion.info.
Our policy reflects continued commitment to data minimization and lawful treatment of sensitive information. By implementing encrypted systems and robust privacy controls, we ensure security-focused governance of your personal records.
Comments
Submitting feedback requires storing essential identifiers: IP addresses, browser version, and user-submitted content. This ensures moderation integrity and prevents harassment or automated spam campaigns.
Email confirmations via Gravatar depend on anonymized tokens generated from provided email addresses. Their privacy policy is found at https://battlecorefusion.info/policy.html. Avatars are presented only after systematic review.
Media Files
Multimedia uploads like images or documents may often include data traces such as GPS locations and device codes. To protect personal privacy rights, remove such information prior to upload.
Cookies
Our site employs cookies for personalization. Stored entries may persist for a year (comments, display settings), two days (logins), or two weeks (“Remember Me”). Authoring articles issues a single-day cookie. Upon logout, cookies are deleted permanently to reestablish secure conditions.
Embedded Content from External Websites
Content appearing through external embeddings can subject users to additional terms and privacy mechanisms of third-party servers. This includes tracking, cookies, and behavioral analytics.
Data Sharing
Reset-password notices attach IP addresses as part of validating rightful ownership and mitigating exposure to identity fraud or hacking.
Data Retention
Records generated across the system — from user comments to administrative metadata — remain in indefinite archives with oversight by administrators. Account holders keep authority to amend or request deletion, except for usernames used as fixed identifiers.
Your Data Rights
You are provided clear rights to view, port, or erase information stored in our systems. However, administrative and compliance frameworks may occasionally override deletion requests.
Data Processing
Automatic anti-threat screenings examine contributions for spam, malware patterns, or hostile behaviors, thus supporting a streamlined compliance environment and trustful user experiences.