Privacy Protocol (Field Manual Edition)


Welcome, fellow survivor, to our Safe Zone! In this ruthless corporate apocalypse, we understand that your data is as valuable as your last ration of food. This Privacy Protocol is our promise to you: we’ll protect your personal intel and ensure it doesn’t fall into the wrong hands. By using our Safe Zone (the “Site”), you’re trusting us with your privacy, and we take that as seriously as spotting a new zombie variant.


1. Intel We Collect

We gather two types of intel to keep our Safe Zone running smoothly:

1.1 Intel You Voluntarily Share with Us This is the intel you give us directly to aid in your own survival and to help us improve the resistance.

  • Signups: Your name and email when you enlist for our newsletter dispatches.
  • Supply Crate Orders: Your billing and shipping coordinates when you purchase gear from our store.
  • Survivor Logs: Any field reports or battle stories you share on our blog or forums.

1.2 Intel We Collect Automatically This is the intel we passively scavenge from the digital wasteland to learn how to better protect our Safe Zone.

  • Comms & Trackers: We use digital trackers to understand how survivors navigate our Site, helping us fortify our defenses and improve the layout of our Safe Zone.
  • Scout Reports: Information like your browser type, the pages you scouted, and the time you spent gathering intel.

2. How We Deploy Your Intel

We use your intel for critical survival missions:

  • Sending you the newsletter dispatches you enlisted for.
  • Processing your supply crate orders and offering you support.
  • Fortifying and improving the layout and functionality of our Safe Zone.
  • Detecting and neutralizing any zombie-like threats, spam, or other hostile activity.

3. Sharing Your Intel

Let’s be clear: we do not sell your intel to anyone. We may share it with trusted allied factions (third-party service providers, like our dispatch service, our data scouts, and our supply processors) but only to ensure the Safe Zone operates without a hitch.


4. Comms & Tracking Technologies

Our trackers (cookies) are essential tools for:

  • Remembering your preferences, like the last survival guide you were reading.
  • Understanding how the resistance uses our Site so we can reinforce it.
  • Showing you the most relevant survival tips and gear.

You can disengage these trackers in your browser settings, but be warned: doing so may compromise your experience in the Safe Zone.


5. Your Survivor Rights

You have rights as a member of the resistance. Depending on your location, you may have the right to:

  • Access, correct, or destroy your personal intel.
  • Opt out of our dispatches at any time.
  • Request that we limit or halt our processing of your data.

To exercise these rights or report a new zombie variant, use the comms channel below.


6. Data Fortifications

We employ strong defenses to protect your intel. However, no safe zone is a perfect fortress, and we cannot guarantee absolute security against a relentless horde. Always stay vigilant.


Our Site may link to other survival camps. We are not responsible for the privacy practices or security protocols of those other camps. We recommend you scout their rules of engagement before you enter.


8. Children’s Privacy

This Safe Zone is built for adult survivors. We do not knowingly collect intel from children under 13.


9. Protocol Updates

New threats emerge every day, and we may update this Privacy Protocol to adapt. The date at the top of this document will reflect the latest version of our Field Manual.


10. Contact Us

For any questions about this Privacy Protocol or to report new intel, contact us at:

no-reply@corporatezombiesurvival.com


Last Updated: August 1, 2025