• Skip to main content
  • Skip to secondary navigation
  • Skip to primary sidebar
  • Skip to footer

M. Darusha Wehm

Explorer of Worlds Real and Imagined

  • News
  • Buy Books
    • Digital Download Store
    • Get Print Books
  • Podcasts
  • About
    • Bio
    • Demographic Info
    • Bibliography
    • Press Kit
    • Privacy Policy
  • Contact
  • Now
  • Short Stories
    • Bodies at Rest, Bodies in Motion
    • Fire. Escape. – Sample
    • The Foreigner
    • Major Tom and the Lucky Lady
    • The Interview
    • Lucidity
    • Fame
    • Chekhov’s Phaser
    • Career Opportunities
  • Science Fiction
    • Beautiful Red
    • Children of Arkadia
    • Andersson Dexter
      • Self Made
      • Act of Will
      • The Beauty of Our Weapons
      • Pixels and Flesh
    • Modern Love and other stories
    • The Voyage of the White Cloud
    • Retaking Elysium
    • The Qubit Zirconium
    • Hamlet, Prince of Robots
  • Mainstream Fiction
    • Devi Jones’ Locker
      • Packet Trade
      • Sea Change
      • Storm Cloud
      • Floating Point
    • The Home for Wayward Parrots
  • Anthologies
    • The Stars Beyond
    • Year’s Best Aotearoa New Zealand Science Fiction & Fantasy, Volume 4
    • KeyForge: Tales From the Crucible
    • Trans-Galactic Bike Ride
    • Fireweed: Stories from the Revolution
    • Year’s Best Aotearoa New Zealand Science Fiction and Fantasy: Volume I
    • The Dame Was Trouble
    • Dystopia Utopia Short Stories
    • Science Fiction Short Stories
    • Procyon Press Science Fiction Anthology 2016
    • Use Only As Directed
  • Games/Interactive
    • The Martian Job
    • Alexander Systems
    • You Do You
    • if ink could flow backward
  • Books

Privacy Policy

Effective date: May 07, 2018

M. Darusha Wehm (“us”, “we”, or “our”) operates the http://darusha.ca website (the “Service”).

This page informs you of our policies regarding the collection, use, and disclosure of personal data when you use our Service and the choices you have associated with that data. This Privacy Policy for M. Darusha Wehm is powered by TermsFeed.

We use your data to provide and improve the Service. By using the Service, you agree to the collection and use of information in accordance with this policy. Unless otherwise defined in this Privacy Policy, terms used in this Privacy Policy have the same meanings as in our Terms and Conditions, accessible from http://darusha.ca

Information Collection And Use

We collect several different types of information for various purposes to provide and improve our Service to you.

Types of Data Collected

Personal Data

While using our Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you (“Personal Data”). Personally identifiable information may include, but is not limited to:

  • Email address
  • First name and last name
  • Cookies and Usage Data

Usage Data

We may also collect information how the Service is accessed and used (“Usage Data”). This Usage Data may include information such as your computer’s Internet Protocol address (e.g. IP address), browser type, browser version, the pages of our Service that you visit, the time and date of your visit, the time spent on those pages, unique device identifiers and other diagnostic data.

Tracking & Cookies Data

We use cookies and similar tracking technologies to track the activity on our Service and hold certain information.

Cookies are files with small amount of data which may include an anonymous unique identifier. Cookies are sent to your browser from a website and stored on your device. Tracking technologies also used are beacons, tags, and scripts to collect and track information and to improve and analyze our Service.

You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Service.

Examples of Cookies we use:

  • Session Cookies. We use Session Cookies to operate our Service.
  • Preference Cookies. We use Preference Cookies to remember your preferences and various settings.
  • Security Cookies. We use Security Cookies for security purposes.

Use of Data

M. Darusha Wehm uses the collected data for various purposes:

  • To provide and maintain the Service
  • To notify you about changes to our Service
  • To allow you to participate in interactive features of our Service when you choose to do so
  • To provide customer care and support
  • To provide analysis or valuable information so that we can improve the Service
  • To monitor the usage of the Service
  • To detect, prevent and address technical issues

Transfer Of Data

Your information, including Personal Data, may be transferred to — and maintained on — computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ than those from your jurisdiction.

If you are located outside New Zealand and choose to provide information to us, please note that we transfer the data, including Personal Data, to New Zealand and process it there.

Your consent to this Privacy Policy followed by your submission of such information represents your agreement to that transfer.

M. Darusha Wehm will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal information.

Disclosure Of Data

Legal Requirements

M. Darusha Wehm may disclose your Personal Data in the good faith belief that such action is necessary to:

  • To comply with a legal obligation
  • To protect and defend the rights or property of M. Darusha Wehm
  • To prevent or investigate possible wrongdoing in connection with the Service
  • To protect the personal safety of users of the Service or the public
  • To protect against legal liability

Security Of Data

The security of your data is important to us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Data, we cannot guarantee its absolute security.

Service Providers

We may employ third party companies and individuals to facilitate our Service (“Service Providers”), to provide the Service on our behalf, to perform Service-related services or to assist us in analyzing how our Service is used.

These third parties have access to your Personal Data only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.

WordPress.com Data

Comment Likes

This feature is only accessible to users logged in to WordPress.com.

Data Used: In order to process a comment like, the following information is used: WordPress.com user ID/username (you must be logged in to use this feature), the local site-specific user ID (if the user is signed in to the site on which the like occurred), and a true/false data point that tells us if the user liked a specific comment. If you perform a like action from one of our mobile apps, some additional information is used to track the activity: IP address, user agent, timestamp of event, blog ID, browser language, country code, and device info.

Activity Tracked: Comment likes.

Gravatar Hovercards

Data Used: This feature will send a hash of the user’s email address (if logged in to the site or WordPress.com — or if they submitted a comment on the site using their email address that is attached to an active Gravatar profile) to the Gravatar service (also owned by Automattic) in order to retrieve their profile image.

Jetpack Comments

Data Used: Commenter’s name, email address, and site URL (if provided via the comment form), timestamp, and IP address. Additionally, a jetpack.wordpress.com IFrame receives the following data: WordPress.com blog ID attached to the site, ID of the post on which the comment is being submitted, commenter’s local user ID (if available), commenter’s local username (if available), commenter’s site URL (if available), MD5 hash of the commenter’s email address (if available), and the comment content. If Akismet (also owned by Automattic) is enabled on the site, the following information is sent to the service for the sole purpose of spam checking: commenter’s name, email address, site URL, IP address, and user agent.

Activity Tracked: The comment author’s name, email address, and site URL (if provided during the comment submission) are stored in cookies. Learn more about these cookies.

Data Synced (?): All data and metadata (see above) associated with comments. This includes the status of the comment and, if Akismet is enabled on the site, whether or not it was classified as spam by Akismet.

Likes

This feature is only accessible to users logged in to WordPress.com.

Data Used: In order to process a post like action, the following information is used: IP address, WordPress.com user ID, WordPress.com username, WordPress.com-connected site ID (on which the post was liked), post ID (of the post that was liked), user agent, timestamp of event, browser language, country code.

Activity Tracked: Post likes.

Mobile Theme

Data Used: A visitor’s preference on viewing the mobile version of a site.

Activity Tracked: A cookie (akm_mobile) is stored for 3.5 days to remember whether or not a visitor of the site wishes to view its mobile version. Learn more about this cookie.

Notifications

This feature is only accessible to registered users of the site who are logged in to WordPress.com.

Data Used: IP address, WordPress.com user ID, WordPress.com username, WordPress.com-connected site ID and URL, Jetpack version, user agent, visiting URL, referring URL, timestamp of event, browser language, country code. Some visitor-related information or activity may be sent to the site owner via this feature. This may include: email address, WordPress.com username, site URL, email address, comment content, follow actions, etc.

Activity Tracked: Sending notifications (i.e. when we send a notification to a particular user), opening notifications (i.e. when a user opens a notification that they receive), performing an action from within the notification panel (e.g. liking a comment or marking a comment as spam), and clicking on any link from within the notification panel/interface.

WordPress.com Stats

Data Used: IP address, WordPress.com user ID (if logged in), WordPress.com username (if logged in), user agent, visiting URL, referring URL, timestamp of event, browser language, country code. Important: The site owner does not have access to any of this information via this feature. For example, a site owner can see that a specific post has 285 views, but he/she cannot see which specific users/accounts viewed that post. Stats logs — containing visitor IP addresses and WordPress.com usernames (if available) — are retained by Automattic for 28 days and are used for the sole purpose of powering this feature.

Activity Tracked: Post and page views, video plays (if videos are hosted by WordPress.com), outbound link clicks, referring URLs and search engine terms, and country. When this module is enabled, Jetpack also tracks performance on each page load that includes the Javascript file used for tracking stats. This is exclusively for aggregate performance tracking across Jetpack sites in order to make sure that our plugin and code is not causing performance issues. This includes the tracking of page load times and resource loading duration (image files, Javascript files, CSS files, etc.). The site owner has the ability to force this feature to honor DNT settings of visitors. By default, DNT is currently not honored.

Links To Other Sites

Our Service may contain links to other sites that are not operated by us. If you click on a third party link, you will be directed to that third party’s site. We strongly advise you to review the Privacy Policy of every site you visit.

We have no control over and assume no responsibility for the content, privacy policies or practices of any third party sites or services.

Children’s Privacy

Our Service does not address anyone under the age of 18 (“Children”).

We do not knowingly collect personally identifiable information from anyone under the age of 18. If you are a parent or guardian and you are aware that your Children has provided us with Personal Data, please contact us. If we become aware that we have collected Personal Data from children without verification of parental consent, we take steps to remove that information from our servers.

Changes To This Privacy Policy

We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page.

We will let you know via email and/or a prominent notice on our Service, prior to the change becoming effective and update the “effective date” at the top of this Privacy Policy.

You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

Contact Us

If you have any questions about this Privacy Policy, please contact us:

  • By email: darusha@darusha.ca

Primary Sidebar

Book cover for “Hamlet, Prince of Robots” by M. Darusha Wehm. A blue-green robot skull with a golden crown in the style of a neon sign, over a dark glitchy background. In the top left is a quote reading “Enormous fun and a real gift to lovers of Shakespeare or science fiction or both. Familiar and surprising, clever and moving.” From Kate Heartfield, author of Sunday Times bestseller The Embroidered Book.

Hamlet, Prince of Robots

Like Succession meets Blade Runner … an extremely compelling and satisfying read that allowed me to investigate my own place in our time of communion and interdependence with machines.

—Pip Adam, author of Acorn Prize winner The New Animals

Something is rotten in the state of cybernetics.

Elsinore Robotics is on the cusp of a breakthrough—the company is poised to create the first humanoid androids powered by true artificial intelligence. Their only rival, Norwegian Technologies, lost a publicly streamed contest between their flagship model, Fortinbras, and Elsinore’s HAM(let) v.1.

But when the first Hamlet model is found irreparably deactivated, the apparent victim of wild malware, the field of consumer cybernetics is thrown wide open.

Learn More

Free Stories

Chekhov’s Phaser

I never planned to end up here. I've never planned anything, really. All my life has been like that: I see an opportunity and I take it. Sometimes that works out better than other times. So why should … Read More... about Chekhov’s Phaser

The Interview

Originally published in Podioracket Presents - Glimpses “I was working at this stim joint, a place called Ultra-Sissons. It’s not where I’m working now — I wasn’t a bartender then, just a busser. … Read More... about The Interview

Lucidity

last night I had the most wonderful dream Carly moaned softly in her sleep, and rolled over. She dreamed and dreamed, and when she woke, she found that she still had the lingering shadow of a … Read More... about Lucidity

Publications

  • . ….. ..story .. time
  • A Most Elegant Solution
  • A Most Elegant Solution (audio)
  • A Thorn in Your Memory
  • A Wish and a Hope and a Dream
  • Alexander Systems
  • Fear of Lying
  • Force Nine
  • Good Hunting
  • Home Sick
  • Home Sick (audio)
  • Homecoming
  • I Open My Eyes
  • if ink could flow backward
  • Microfiction @Thaumatrope
  • Modern Love
  • Modern Love (audio)
  • Preventative Maintenance
  • recursion
  • Reflections on a Life Story
  • Showing the Colours (audio)
  • The Care and Feeding of Mammalian Bipeds, v. 2.1
  • The Interview
  • The Stars Above Eos
  • War Profiteering
  • War Profiteering (audio)
  • we are all energy

Footer

Social

  • Facebook
  • Twitter

Connect

  • Email
  • RSS

Poetry

  • . ….. ..story .. time
  • 140 and Counting
  • creation myth
  • Force Nine
  • how to make time
  • if ink could flow backward
  • recursion
  • the chrononaut
  • we are all energy

Non-fiction

  • 90ways.com

Elsewhere

  • Darkly Lem
  • Many Worlds
  • Mastadon

Copyright © 2023 M. Darusha Wehm