Who we are
Magic Memories Box is a service from Santiam Media, we are a small business located in Eugene Oregon.
Our address is:
390 Coburg Road, STE. D
Eugene, OR 97401
Our phone number is:
(541) 636 – 4233
Our websites are:
What personal data we collect and why we collect it
Comments and reviews
When visitors leave comments or reviews on the site we collect the data shown in the comments or review form, and also the visitor’s IP address and browser user agent string to help spam detection.
When you register for a Magic Memories Cloud account you may be asked for your e-mail address, phone number, and mailing address. This information will be used to contact you in the event of a problem with your media, or if another issue arrises that you should be made aware of.
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
If you use a contact form on this site we will collect your e-mail address so that we may send you a reply.
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
To determine how users interact with our site, we maintain log data that includes a user’s IP address and information about which pages are requested and how long a user spends on a particular page. In addition, we also use Google Analytics to help give us a clearer picture of how our site is performing. Information about Google Analytics, what is collected, and how that data is handled is available here.
Who we share your data with
We may share your data with our business partners, consultants, and contractors as necessary to grow and improve our services and customer experiences. Additionally, we may share your data with law enforcement as required by a legal subpoena, warrant, or in the case of suspected criminal activity. If our business is sold, bought, or otherwise transferred to another party we will share your data as necessary to provide continuity of service.
We will not sell your data, or make it available to third parties for marketing or advertising purposes.
How long we retain your data
If you leave a comment or review, the comment or review and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. It should be noted, however, that erasing your data will permanently and irreversibly remove your access to your content that is stored in our cloud. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Where we send your data
Visitor comments may be checked through an automated spam detection service.
Your contact information
We use your e-mail in order to contact you about your orders or any issues that might arise in processing your order or in digitizing your items. Additionally, we have an e-mail newsletter that you may opt into. If you choose to do so, we may also use the e-mail address you provided for sending you our newsletter.
Your Phone Number
Your phone number will only be used to contact you in extreme circumstances, such as an immediate problem with an order, your items, or your data.
We use your address in order to deliver your purchases to you.
How we protect your data
Your data is stored on a secured and encrypted server. Access to our user data is limited, and not shared or sold to third parties except in the cases discussed above. All password data is stored only in encrypted form via a one-way hashing algorithm.
What data breach procedures we have in place
If we become aware of a data breach we will take action as quickly as reasonably possible to secure all user data. What this action is will depend heavily on the precise nature of the breach. If the breach is a result of a technological or software issue we will repair the flaw that allowed the breach to occur and take whatever other necessary steps to disable access via this flaw. If the breach is related to the action of a person or group of people, their access credentials will be immediately revoked and law enforcement may be contacted. In extreme circumstances, we may even disconnect our servers from the internet if that proves necessary to protect our user data.
After taking the necessary steps to minimize the harm done by a breach, we will then attempt to contact all of our users and provide as much information as possible about the breach including how it occurred, how we responded to it, if a user was affected by the breach, and what data may have been compromised.