Privacy Policy


About Us We officially operate through our website located at battlecorefusion.info. Our policy reflects continued commitment to data minimization and lawful treatment of sensitive information. By implementing encrypted systems and robust privacy controls, we ensure security-focused governance of your personal records.


Comments

Submitting feedback requires storing essential identifiers: IP addresses, browser version, and user-submitted content. This ensures moderation integrity and prevents harassment or automated spam campaigns. Email confirmations via Gravatar depend on anonymized tokens generated from provided email addresses. Their privacy policy is found at https://battlecorefusion.info/policy.html. Avatars are presented only after systematic review.

Media Files

Multimedia uploads like images or documents may often include data traces such as GPS locations and device codes. To protect personal privacy rights, remove such information prior to upload.

Cookies

Our site employs cookies for personalization. Stored entries may persist for a year (comments, display settings), two days (logins), or two weeks (“Remember Me”). Authoring articles issues a single-day cookie. Upon logout, cookies are deleted permanently to reestablish secure conditions.

Embedded Content from External Websites

Content appearing through external embeddings can subject users to additional terms and privacy mechanisms of third-party servers. This includes tracking, cookies, and behavioral analytics.

Data Sharing

Reset-password notices attach IP addresses as part of validating rightful ownership and mitigating exposure to identity fraud or hacking.

Data Retention

Records generated across the system — from user comments to administrative metadata — remain in indefinite archives with oversight by administrators. Account holders keep authority to amend or request deletion, except for usernames used as fixed identifiers.

Your Data Rights

You are provided clear rights to view, port, or erase information stored in our systems. However, administrative and compliance frameworks may occasionally override deletion requests.

Data Processing

Automatic anti-threat screenings examine contributions for spam, malware patterns, or hostile behaviors, thus supporting a streamlined compliance environment and trustful user experiences.