Who we are

Our website address is: https://yahwehvirtualuniversity.com.

What personal data do we collect and why do we collect it


When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.


If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

Contact forms are for the continual effective communication between our team and anyone using our services. We only ask for information that is needed to communicate with our users in a professional and effective manner to ensure continual growth and success with our users.


If you leave a comment on our site you may opt-in to saving your name, email address, and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.


Google Analytics is an analytics tool that we used to track and analyze actions on our website, such as the number of visitors, the number of page views, and the site’s bounce rate.

All data is anonymized on it, we can easily understand user behavior and traffic flow of the site alongside traffic sources to understand where visitors to our sites come from.

Who do we share your data with

We take all reasonable steps to ensure that our staff protect your personal data and are aware of their information security obligations. We limit access to your personal data to those who have a business need to know it. We may also share your personal data with trusted third parties including:

Service providers contracted to us in connection with the provision of the products and services; this includes the service provider which runs elections and voting at our monthly committee meeting;

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights do you have over your data

If you have an account on this site or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where do we send your data

Visitor comments may be checked through an automated spam detection service. However, we do check all comments to ensure moral content.

Your contact information

Contact information is stored in our database to ensure proper communication with students, parents, teachers, etc. It is also used for emergency purposes.

How we protect your data

Personal data is encrypted. Modern tools make it possible for anyone to encrypt emails and other information. A lot has changed in recent years and keeping personal information encrypted is much easier than before. In particular, various publicly available tools have taken the rocket science out of encrypting (and decrypting) emails and files. GPG for Mail, for example, is an open-source plug-in for the Apple Mail program that makes it easy to encrypt, decrypt, sign and verify emails using the OpenPGP standard. And for protecting files, newer versions of Apple’s OS X operating system come with FileVault, a program that encrypts the hard drive of a computer. Those running Microsoft Windows have a similar program. 

What data breach procedures do we have in place

We understand that not all risks can be mitigated, we operate a strict and structured system of controls, measures, and processes to help protect data subjects and their personal information from any risks associated with processing data. The protection and security of the personal data that we process are of paramount importance to us and we have developed data-specific protocols for any breaches.

We have a legal, regulatory, and ethical business obligation to ensure that personal information is protected whilst being processed by our Company. Our technical and organizational measures are detailed in our Data Protection Procedures and Information Security System.

We carry out periodic information audits to ensure that all personal data processed by us is adequately and accurately identified, assessed, classified, and recorded. We carry out risk assessments that assess the scope and impact of any potential data breach; both on the processing activity and the data subject. We have implemented adequate, effective, and appropriate technical and organizational measures to ensure a level of security appropriate to as many risks at hand.