Stay inspired
Sign up today for free to start living your happy & mindful life
We protect your personal data. View our privacy policy.

Privacy Policy

by Agata Dzierżawa
Privacy Policy

Here you will find basic information about the privacy policy and personal data management procedures on the blog “A Journey to Yourself” located at the following addresses: and

Privacy Policy Details

By filling out forms containing your personal data – you consent to their collection and processing by the Administrator. You have the right to access, modify and request to stop processing your data.

We can use the data can to provide services and to trade contact.

I Personal Data Administrator.

The Administrator of your personal data on the blog: “A Journey to Yourself” is a natural person – AJTY Agata Dzierżawa, address for correspondence Dietla 66/4a, Kraków Email:

If you have any questions or concerns about our personal data security policy or update or delete your personal data, if you can not do it yourself, please contact me by email at:

The Administrator acquires information about the User and his/her behavior by:

II Type of collected personal data, purpose, and period of their use.

The Administrator processes the personal data of Users using the blog in the following scope:

  1. Name and surname;
  2. Email address;

The blog “A Journey to yourself” is hosted by OVH.

We use the WordPress platform to run the blog, which does not collect any data about blog readers. However, some of the plugins used may collect additional data. You can find detailed information below. As a rule, the data are processed until the consent is withdrawn or the effective opposition to the data processing is filled in cases where the legal basis for data processing is the Administrator’s interest.

Google Universal Analytics monitors blog traffic, but if you wish you can block their operation.

We also use cookies of:





WP Social sharing – Facebook, Twitter, Instagram, LinkedIn, Youtube

WP statistics and WP subscriptions

The purpose of personal data processing:

  • Traffic monitoring on the blog and analysis of advertising effectiveness – see Cookies Policy.
  • Comment system – anyone visiting the blog may voluntarily give a nickname, name or surname, and email address. The IP address of the User and his/her browser we store to detect spam. An anonymous string of characters (hash) created based on the email address can also be sent to Gravatar to check if the User is using it and use his/her profile picture (gravatar) publicly after confirming the comment. If the User leaves a comment, its content and metadata will be kept indefinitely in order to automatically recognize and approve future comments.
  • Support for the subscription module, observing entries or new comments – notification of new entries or comments on the blog by means of an email using the email address and gravatar, when there is one. These data can become a collection of potential blog Administrator’s customers.
  • Informing about planned technical work.
  • Technical services, including answers to Users’ questions.
  • Direct commercial contact- if the User agrees or asks for it.
  • Sending marketing information by email, if the User has consented by subscribing to the newsletter.
  • Server log management to administer the website and ensure the most efficient service of hosting services.

In addition, the time of arrival inquiry and sending a response, the name of the User station – identification performed by the http protocol, https, url address of the previously visited page (refer link) in the case where the transition to the blog took place through a link, information about the User’s browser, and the IP address. The information is not associated with specific people browsing the blog and we use it only for the purposes of administering the server.

III Data protection methods.

The Administrator uses various types of protection mechanisms for personal data, in particular against unauthorized access and loss of data:

  • SSL certificate,
  • WordPress Database backup plugin,
  • Akismet Anti-spam plugin,
  • Anti-virus protection on hardware used for data processing,
  • Access to the equipment and blog is protected by a unique username and password,
  • Creation and updating of the list of personal data entrusted,
  • Creating a record of incidents of breaches of personal data protection,
  • Blog monitoring for incidents of personal data breaches,
  • Carrying out and writing down the risk analysis and the effects of data processing,
  • Placing information clauses and fields on consent to the processing of data in those places on the blog where personal data are collected,

IV Sharing of personal data.

  1. The Administrator does not transfer, sell or lend the collected User’s personal data to third parties unless it is done with the express consent or at the request of the User or at the request of those entitled under the law of state authorities in connection with pending proceedings.
  2. We would send the advertising and promotional materials only to the User if he/she agrees to it. This applies in particular to the newsletter sent to the User if he/she confirms clearly indicated by us the link containing acceptance for receiving the newsletter about current promotions, discounts, and news offered by the Website. These materials concern only the offer of the website.

V User rights.

The User has the right to dissent from the Administrator: access to their personal data, their updating, deletion, limitation of processing and data transfer, and the right to object. In the event of additional consent, the right to withdraw it at any time without affecting the legality of the processing, which was made on the basis of consent before its withdrawal. The right of complaint to the Administrator to the supervisory body dealing with the protection of personal data.

VI Special risks related to the use of services provided by electronic means.

The use of electronic services involves the risk of infecting the IT system with undesirable software, including the one whose only purpose is to cause damage. Therefore, we recommend installing antivirus software on the end device used by the User. You should This software should constantly update this software. We also recommend using a firewall.

Among the possible threats are also hacker attacks, the Administrator declares that on her website she uses security measures to hinder the User’s system.

VII Final provisions.

By using the “A Journey to Yourself” blog and the functions provided by the operator, you agree to the provisions contained in this Privacy Policy. The Administrator reserves the right to make changes to this Privacy Policy with the reservation that these changes will not adversely affect the processing of User data.

The Website may include links to other websites. Such websites operate independently from the Website and are not supervised by the Website in any way. These websites may have their own privacy policies and regulations, which we recommend reading.

The term GDPR means General Data Protection Regulation of European Parliament and Council EU 2016/679 27thof April 2016 on the protection of individuals with regard to the processing of personal data and on the free movement of such data and the repeal of Directive 95.46.WE.

The newsletter is an electronic message we send in connection with the subject of the website “A Journey to Yourself”, which contains promotional, commercial, educational, or informational information and on which the User has given his/her consent by registering at the Administrator’s website confirming the provision of his email address or telephone number. The User may at any time opt-out of receiving the Newsletter.