October 20, 2025
G24K

Privacy Policy

Under Review, mainly for context and language 6/20/2025.

Privacy Policy

Who are we? goldoro24k.com is a website for assessing Reasoning and Orientation; but only for fun. It does not currently represent anything serious or formal.

What application does the website use? This website uses WordPress.

What is the application’s primary programming language, PHP?

How to contact us? You can write to us at melt@goldoro24k.com or use the form, see the tab titled “Contact Us.”

OUR CONTEXT IN TERMS

Data: These are details generated by language programming functions to determine or enable them. They also allow an action to be performed, for example, logging time, public IP, device, or search engine origin. This value, usually common or default in some languages ​​or functions that are already available to compile into a programming language, will provide you with what you request.

The data is not transferred anywhere. We process everything on the website, except for third parties involved in some way with the website and who, if so, are mentioned here. By law, everything is either anonymous or an identifiable portion, meaning the last IP address, hashed. Some third-party tools and services may obtain usage statistics. However, when the website is the primary or sole contributor, it is not divided among users and their personal data; otherwise, it will be included here.

Both data and information are classified as personal information under the U.S. Data Privacy and Security Directive due to the potential consequences of identifying and locating them.

Here, we protect, prevent, and, if necessary, resolve, prioritizing what we have here and minimizing third-party services. This is another step in our commitment to protecting users. No one will obtain your data, except for the third parties involved in the website and mentioned here, if applicable and/or if applicable because it is not optional for such a function.

To prevent this, we look for the necessary tools, such as SSL, and obviously, anything we can add to prevent it. The resolution depends on the magnitude and severity; for example, you will be notified if necessary so you can verify and protect your accounts. We do everything possible within our reach, within our limits, and responsibly. Here, we immediately understand that what is requested, recorded, etc., is not enough to compromise a person, their identity, and lead them to difficult situations, at least not through us or the website. We try to minimize everything, even comments, for anonymity.

RDE: Requesting data erase, a page on the site, and your rights over your data, part of the GDPR responsibilities.

We may collect, record, generate, log, or create certain functional data.
The different methods mentioned are merely a function to present the website to you and provide you with full and/or personalized access.

IP HASH: A v4 IP address is typically based on four serial numbers, i.e., four parts divided by a period. In our case, the last serial number is the hash. When disciplinary or security action is required, the system undoes the hash and blocks the correct IP. This is done through application source functions in the case of forced attempts to access other people’s accounts or administrative locations on the website using third-party tools. It is almost impossible to decode manually.

Interaction: Any action performed reciprocally between two or more objects, people, functions, or agents. The two-way variant effect, if any, is essential on websites.

Information: The personal information you provide to us; in this case, identifiable or individually identifiable information, which distinguishes you from others on a document or visible location. When opening an account, your identification is here.

Breach: A breach is the unauthorized disclosure, acquisition, or access, or any similar event that results in something unauthorized.

Document: A document containing your information is the information you provide to us (name, surname, address, email address), etc.

File: A file is your information scanned in HTML format.

Tools: Tools are a set of functions within the application’s programming language for a specific action. These can be either part of the source application or acquired from third-party developers for this application and/or source code.

Third-Party Tools: Available source applications or application services that complement the main source code. Tools that work with the PHP programming language and may be incorporated into the tool. These are owned by third parties or developed by private developers not related to the administration of this website.

Cookies: Cookies are small files that can be, for example, session cookies, meaning that your visit to a website is installed on your computer through your browser (if you allow). This allows the website to identify your browser to process and remember certain information about your preferences, if any. For example, we use cookies to maintain and process your preferences and decisions, such as saving your name, username, email, and password when you register, visit, or comment on the site, and to verify your age, as applicable.

Third-party cookies: These are the same as cookies, but from third parties, and can collect data or preferences. These cookies focus on website functionality; they may contain usage statistics, but some may collect personal information. You need to make your choices or settings on your personal device. For example, an API has a quantity restriction in exchange for a payable amount. This third-party API most likely uses a cookie to account for its services. We call this functional, but there are functional parts that use cookies to perform a full function. Here’s how we think of it: At least if we delete the cookie, it will stop working.

Discretionary: Your choice regarding specific, non-flexible rules regarding a common protocol. Common information required, such as when to make a payment and whether you agree with your information at the payment source.

SIMPLE BASIC EXPLANATION

Personal Information Collected for Commenting

Name* Personal – Required – Publicly Viewed

Email* Personal – Required – Not Publicly Viewed

Website – Optional – Not Publicly Viewed

Options and Conditions

Your email and website will not be published. Required fields are marked * (condition).

Save your name, email, and website in your browser for the next time you comment – Optional – Option. (One cookie)

In this case, they may set cookies for your convenience so you don’t have to re-enter your details when leaving another comment. These cookies last indefinitely, usually one year or until you delete them from your browser. These cookies are: comment author, comment author email, and comment author URL.

You do not need to register to comment.

Comments are moderated for a short period before being approved.

Note: If you request data deletion, your comments will not be deleted. Only user data; data such as the website name will appear next to your comment as “Anonymous” instead of your name.

When commenting, we may automatically collect, record, generate, or create certain functional data about you using third-party tools or services. For example, your hashed public IP address, browser user agent string, device type (mobile or desktop), operating system, search engine (if available), date and time of use, region of visit, interaction, and various actions on the website. For example, your IP address and browser user agent string help us detect spam. Interaction helps us determine what topic or information our users need, among other possible situations or conditions, so we can provide, improve, or resolve them as appropriate.

Registration – Registration is currently closed because we understand it is not necessary; however, we have substantial information about how it works and we detail it here in case registrations are allowed.

Personal Information Collected for Registration:
What personal data do we collect and why?

Username*
First Name*
Last Name*
Email*
Password*
Confirm Password*
Website*
Biographical Information*

This discretionary information is necessary to open an account and for you to use the website as you see fit or prefer. At the same time, it increases content integrity, security, and overall trust in the long run. This makes everything efficient.

When you register, we may request, collect, record, generate, log, or automatically create certain functional data about you using third-party tools or services. For example, the hashed public IP address, browser user agent string, device type (mobile or desktop), operating system, search engine (if available), date and time of use, visit, region of visit, interaction, and other actions on the website. The IP address and browser user agent string help us, for example, detect spam.

There is a difference between information, data, and personal data, as established by the privacy guidelines. Data becomes personal.

However, the data is only automatically generated details for the core functionality and purpose of hosting safe, normal content, which anyone could benefit from if that’s what they’re looking for.

Number of visits, visit duration, and date. This is complemented by formal information on comments, registration, and website usage, ultimately providing: favorites, popular, reading now, new posts, new comment on a topic, who commented, etc.

The same goes for the number of online users, visit statistics, search engine referrals, top browsers, top pages, top platforms, top users, top devices, top device models, recent visitors, top referral links, visitors’ primary language (whether visitors speak English or Spanish, the same for any language), country of origin of visits, top authors, and popular posts. This data function works like a tally, where the tally and the total are the data. Each feature offers users: the website with its different sections and optional selections based on selected preferences, for example, search categories or functional display, such as the content on the first page.

This is common and is usually understood in the appropriate context of website use. To do this, the core must distinguish each user. This includes, for example, the function of some cookies to provide data. The system doesn’t know their identity, but differentiates users only by data. Making everything possible. Example: Popular post.

Here we need to choose tools or plugins for that action, to be able to complete and complement the content as it normally is presented. Just as the features are completed, they are formed; cookies become part of the main functionality or possibly technical related to the processes being executed, such as their visit log.

What is called personal data is not only created by users’ interactions with the site. They are also generated from technical processes, such as the main source language (in this case, PHP), which is compiled between the database, the services, and third-party embedded tools or services.

Embedded Content from Other Websites
This site may include embedded content (e.g., videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking that interaction.

Third-Party/Embedded Tools

The PHP core uses various third-party applications and services to enhance the experience of website visitors. This results in greater convenience, ease of use, and the ability to complete processes for paid services or products. This includes site availability, maintenance responsibilities, quality assurance (such as language) until you get productive tools or the final website, and security enhancements.

Security investigations are conducted for core and plugin leaks, such as misconfigured or incompatible features, errors, or issues. These can provide information about the site’s procedure or failure that could compromise its operation, or even generate any other functionality as a result of a failure or misunderstanding between different functions. However, we prevent and resolve them to the extent possible.

In this situation, risk assessments are conducted and decisions are made to resolve situations and conditions arising from or related to an obvious fundamental result or failure, regardless of the reason. For example, if search categories aren’t working for users (some or all?), we must verify them to resolve them. We debug everything, log error information and behavior to see how they occur, and find a solution. If there is a configuration issue or a conflicting security block for the feature, we consider any workarounds—manual, tools available on the website, or third-party services—and determine how to fix them or how to provide another way to access the search categories if the solution compromises security.

These tools are usually on the website, and everything happens here, even if they’re from third parties. On the other hand, there may be a functional relationship between them, and perhaps some third-party service or other website may have third-party tracking, and these third-party services may monitor your interaction with that embedded content, including tracking that interaction.

In this case, we have no direct control over the information collected or over these cookies, if any. However, it will be indicated here and in the cookies if any exist, which we are aware of and are for public knowledge when this happens, but we try to minimize it. An example would be a security service plugin where they monitor for security. We don’t have everything, or perhaps nothing, but it’s a third-party service. It could be a plugin or a PHP service from a third party, however, it is stated if there is one. If they are plugins, they are usually called “APIs”; we don’t have any API services; everything is here.

However, tools typically rely on data, but they use and require anonymization, which is common and IP addresses are hashed or anonymized; we leave them with the last serial number hashed. At least that’s how it’s set up, and most work that way by default based on current requirements. At least at the moment, the vast majority or all of the tools reside on this website. Otherwise, you will be informed in the cookies and here if necessary.

Examples: ADS. This may have tracking cookies and data collected from various sources: the advertiser, the merchant, or the marketplace, and us to know how many visits we’ve generated.

SOCIAL MEDIA PLATFORMS such as Facebook and the share or like button (through the use of buttons). You may notice that, at the moment, we don’t have any method to share or create a section through this.

 

Contact Form – Information Collected


Comment – Message *
First Name – Last Name *
Email *
Cookies for this section: None at this time, except for the necessary and selected ones that have already been set (Visits, Session, Statistics, etc.). You can disable the cookie to save your name and email.

Public Information Here: None.
In addition, we do not use the information submitted through this form for commercial purposes.

Where is your data sent?

First, to help you understand and gain a better perspective, keep in mind that search engines have anonymity settings that range from custom settings. This is how everything on the internet is by law and requirement. Search engines didn’t have SSL before, but now they do. A decade later, data anonymity has emerged, etc. This is a huge privacy issue.

The data is not sent anywhere; however, it does go through some data processing services for compilation, such as hosting services. Along with the hosting service, other add-ons and solutions are available if needed. In our case, the hosting service we use is Godaddy; you can check their terms and privacy policy on their website (godaddy.com).

What about the source code? By default, WordPress does not share any personal data with anyone.

 

 

PRIVACY POLICY

This online privacy policy has been developed to clarify for members and users how their “Personally Identifiable Information” will be used on this website. “Personally Identifiable Information,” as defined in the U.S. Privacy and Data Security Policy, is information that can be used, either individually or in the aggregate, to identify, contact, locate, or even identify an individual on a system. We encourage you to carefully read our online privacy policy to understand how we collect, use, protect, and handle your personally identifiable information on our site. Please ensure you fully understand and agree to it.

Sensitive personally identifiable information, as defined in the U.S. Privacy and Data Security Policy, requires special handling due to the increased risk of harm to an individual if compromised. The loss or breach of sensitive personally identifiable information can result in embarrassment, inconvenience, reputational damage, emotional harm, financial loss, injustice, and, in rare cases, a risk to personal safety.

Fair Information Practices Principles
The Fair Information Practices Principles form the basis of privacy compliance policies and procedures governing the use of personally identifiable information. We are required by law to protect personally identifiable information to prevent identity theft or other adverse consequences, such as privacy incidents, breaches, or data misuse. At this point, you should understand the importance of your privacy to us, and we firmly commit to working with respect, ethics, and professionalism.

Key points to consider and emphasize:
You are not required to provide us with any information.
You may do so or refrain from doing so, as this is entirely your freedom.
If you do not wish to provide us with such data or for us to process it, simply do not access our website. If you have already visited and have not read this section, delete the cookies in your browser, exit the website, close your browser, and restart it.

You can also choose not to provide us with “discretionary” personal data. However, please remember that without it, we will likely be unable to offer you the full scope of our website or the best experience when using it.

THE MAIN FUNCTION AS ACCURATELY AS POSSIBLE.

Many of the cookies in the notice are simply notices. Some of them are enabled with a similar name or synonym. Others are simply notices of something future or preliminary that we are working on. They will not appear in any section of the website with a similar name or synonym; only those you agree to in the notice. In some cases, they cannot be referenced in any way; however, their categorized function is indicated in the notice. This means that a cookie with an unknown name, synonym, or allusive name is included in the notice in one of the categories; it could only be indicated or named and classified if we have fully set it, not while it is in the development phase or if it is being set in progress. Make a decision in advance and uncheck that category. If you do not wish to be tracked by advertising, uncheck the categories that apply to this.

Among other cookies that may appear are WordPress test cookies, visit cookies, age cookies, cookie acceptance cookies, and the PHP session cookie, which is never seen but is enabled. We add “sessionphp” to this cookie, a synonym or similar reference, in our cookie notice banner.
Your acceptance of these cookies, your age, and your visit are the cookies that are saved. No information is saved; you are only informed. When you access an area that offers this option, you will be asked again.

What information or personal data do we collect from visits?

DATA
Information automatically collected about your use of our website and/or tools. When you visit, connect to, or use our website, we may automatically collect, record, generate, or create certain functional data about you through third-party tools, utilities, and/or services. For example, the hashed public IP address, device type (mobile or desktop), operating system, search engine (if available), number of visits from the same search engine, date and time of use, region of visit, individual times of the visit, interaction, and different actions of visitors and users on the website.

The IP address and browser user agent string help us, for example, detect spam, malfunctions due to incompatibility, errors linking the database to the searched item, etc.

Usage: Site availability, analytics, tasks; tasks are anything cumulative or marginal that requires maintenance before completion. Whether the task is completed, stopped, or changed mostly refers to quantities such as cache, which is for more dynamic use. RDE, quality control (such as language) until we obtain productive tools or a final website, and security improvements.

We conduct security research to detect errors, prevent them, or resolve them. As a result, we perform risk assessments and make decisions to resolve situations and conditions arising from or related to obvious failures, regardless of the reason.
We do this autonomously, either automatically through tools or with the help of third-party tools or service providers, including the use of cookies and other subsequent innovations. This data can fundamentally determine the availability of the website.

COOKIES: Your visit to the site will set a temporary cookie to determine your acceptance and whether your browser accepts cookies. This cookie contains no personal data and is deleted when you close or restart your browser.

Statistical cookies: These cookies help us understand visitors’ wishes or preferences and the future prospects for visits to our site. They collect data on total site traffic and maintain our statistics.

Analytical or performance cookies: These collect anonymous data on website usage and performance. These cookies provide valuable insights into visitor behavior, allowing webmasters to analyze trends, identify areas for improvement, and optimize website performance.

PHPINI: Session cookie to retain certain data; in this case, it is used for PHP login, not for the usual user session. PHP assigns each visitor a unique ID, the so-called session ID, not a user session ID (login); in this case, it is used for PHP (PHPSESSID). This is stored in a user cookie or propagated in the URL (samesite). This PHP cookie function takes the ID generated by PHP during your visit, regenerates a new one, and serializes it, which increases the security and integrity of the website. At the same time, it renews it approximately every 30 minutes; this means that if you spent an hour on the website, it regenerates it twice, and when you exit, it is discarded.

In the meantime, we would like to let you know that you can delete cookies whenever you want by clicking the lock icon in the navigation bar, selecting and deleting. You can also search for more information or details about them.

Our Cookies list:

Cookie NameCookie CategoryDescriptionDuration
wordpress_2WordPress cookie for a logged in user.session
wordpress_logged_in_2WordPress cookie for a logged in usersession
wordpress_test_2WordPress cookie for a logged in usersession
wordpress_test_cookie2WordPress test cookiesession
wp-settings-1Wordpress also sets a few wp-settings-[UID] cookies. The number on the end is your individual user ID from the users database table. This is used to customize your view of admin interface, and possibly also the main site interface. 1 year
wp-settings-time-2Wordpress also sets a few wp-settings-{time}-[UID] cookies. The number on the end is your individual user ID from the users database table. This is used to customize your view of admin interface, and possibly also the main site interface. 1 year
PHPSESSID1To identify your unique session on the websitesession
SESS1To ensure that you are recognised when you move from page to page within the site and that any information you have entered is remembered.session

WHERE IS THE DATA SENT?
Where is your data or information sent? The data stays here.

WHO WE SHARE YOUR DATA WITH.
Analytics services or applications where your data is anonymized and your IP address is encrypted.

In addition, for advertising purposes, we do not use your data or personal information to display third-party targeted advertising on the site. You may receive the cookie and choose to decline or accept it, as we leave future or preliminary options, but they don’t work. At least in this case.

HOW LONG WE KEEP YOUR DATA.
In this case, the data is retained for an indeterminate period of time, basically 24 to 31 minutes, 24 hours, a week, a month, a year, or in other cases until you close or restart your browser.

We receive public posts, comments, and ratings, which will remain there for an indeterminate period or until you request an RDE. This varies, and some data disappears from our system when you close your browser. We can answer that we try to set everything to 24 hours, which applies to everything, but some defaults, as they say, are for a month or even a year.

DATA AND INFORMATION RECORDING PURPOSES.
Explore current and past data, including any malfunctions, errors, bug information, and any other relevant information. Correct and improve the service, including core reinforcement. Understand our statistics, usage preferences, the most common ones, etc. Delve into the present and past of this.

We are required to retain data and information for administrative, legal, and security purposes, and to complement the website, its services, and its use. For example, when you purchase a product or service, you will receive a receipt with some information provided by you. This, in turn, begins to compile statistics on the sale of items or services. Therefore, the purposes of data record keeping are for security or legal reasons and to complement the website.

Data and records are retained and vary. The information of users who register on our website is retained indefinitely. We also store the personal information provided in the user profile, even if you delete your profile, although your public profile disappears.

WHAT RIGHTS DO YOU HAVE OVER YOUR DATA?
Questions, problems, and complaints about data.
If you have an account on this site, you can request to receive an archive of the data we hold about you, including any information you have provided to us. This can be done in the margins of this website.
You and any commenter can also request that we delete any information or data we hold about you. This does not include information or data we are required to retain for administrative, legal, or security purposes. You have the right by law to request a copy of your personal information at any time by contacting us.

If you have any questions about how we use your personal information, please contact us. Remember that, where applicable, each user can view, edit, or delete their account at any time.

COMPLAINTS INFORMATION MANAGEMENT PROCEDURE

Use the contact form to communicate your disagreement.
If you file a complaint about our handling of your personal information, it will be handled in accordance with this complaints handling procedure.

In the first instance, a member of our team will review it and respond to you within 14 days. If you are not satisfied with this response, you can request a review of your complaints again. In that case, we will review your complaint, any details you provided, and the initial response, and provide you with a further response within 13 days of your request.

The privacy policy doesn’t change significantly unless more features or services are added that include other cookies. It’s basically a functional data protocol to provide utility through the community, and this doesn’t change. We try to simplify everything so it’s understandable and easy for everyone.

Legal changes to online privacy regulations. We will implement them as soon as we are aware of them and are up to date.

Once this online privacy policy is established, we will include a link to it on our website, on the first major page after accessing it and in a prominent location, such as the footer or main menu (tabs better known as “privacy” and titled “privacy policy”).

Our link to the ONLINE PRIVACY POLICY includes the term “Privacy.”
You will be notified of any changes to the ONLINE PRIVACY POLICY by email or a prominent notice on the homepage or throughout the website.