Privacy Policy
Effective Date: May 19, 2026.
You came here to learn how to dominate the map pack. You did not come here to have your inbox sold to third-party lead brokers. We run Local SEO Marketing Pro to help businesses fix NAP consistency, optimize their Google Business Profiles, and drive actual phone calls. We treat your data with the exact same operational discipline.
The local SEO industry suffers from a massive trust deficit. Agencies scrape emails, buy lists, and spam business owners with fake audit reports. We refuse to participate in that ecosystem. This policy outlines exactly what we track, why we track it, and how you control it.
Read this policy. Understand our tracking. Know your rights.
The Information We Actually Collect
We collect data in two specific buckets. Direct input. Passive analytics. Zero hidden trackers.
When you fill out our contact form, you provide specific details. You give us your name, your email address, and your website URL. You leave a comment explaining your current problem. We require your website URL so we can check your current citation profile before we reply. We require your email address so we can actually send that reply.
We also collect automated technical data when you browse the site. Our servers log your IP address, your browser type, and your operating system. We record the exact time you accessed our pages. We track the referring website that sent you to us.
We do not scrape your public Google Business Profile to build a shadow profile of your company. We do not purchase supplemental demographic data from external brokers to append to your contact record. You only give us what you choose to type into our forms.
How We Deploy Your Data
We use your email address to answer your specific questions. If you ask us why your service area business dropped out of the local 3-pack, we email you an operational answer. We do not take that email address and dump it into a daily promotional sequence.
We use passive analytics to illuminate our blind spots. We monitor which guides get read and which ones get ignored. If our breakdown of proximity signals holds your attention for four minutes, we know we hit the mark. If you bounce after ten seconds, we rewrite the page.
Analytics improve our content quality. They show us the friction points in our site navigation. If fifty people search our internal site for information on review velocity, we write a definitive guide on that exact topic. We use aggregated data to build a better resource for local business owners.
We do not use your data to train public machine learning models. We do not use your data to run automated outbound sales campaigns.
Cookies And Tracking Mechanisms
We use cookies to make this website function and to measure our traffic. A cookie is a small text file placed on your device. It allows our server to recognize your browser during your visit.
We deploy functional cookies to maintain your session state. If you close a pop-up notification, a functional cookie remembers that choice. You will not see the same pop-up on the next page. These cookies expire when you close your browser.
We deploy analytical cookies through Google Analytics and Google Search Console. These persistent cookies remain on your device for up to 14 months. They allow us to distinguish between a first-time visitor and a returning reader. They track your journey through our internal links.
You control your browser. You can block all cookies through your browser settings. The site will still load. You will still be able to read our guides on local link building. You will simply appear as a new visitor every time you click a new page.
Third-Party Infrastructure And Data Sharing
We do not sell your personal information. Ever.
We share data only with the infrastructure providers that keep this site online. Our web host processes our server logs. Our email provider routes our outbound replies. Our CRM provider stores your contact form submissions.
These vendors operate under strict data processing agreements. They cannot legally use your email address for their own marketing. They act strictly as data processors on our behalf.
If law enforcement presents a valid subpoena, we comply. We hand over the requested logs. We do not hand over data based on informal requests from any government agency or private entity.
External Links And Third-Party Tools
We link out to external local SEO tools constantly. We recommend specific citation builders, local rank trackers, and review management platforms. We link directly to Google’s own documentation.
We do not control those external websites. When you click a link to a third-party tool, you leave our jurisdiction. You enter their tracking environment. They deploy their own cookies and enforce their own privacy policies.
Read the privacy policy of any tool before you create an account. We take no responsibility for how external software companies handle your data.
Data Retention Timelines
We do not hoard data indefinitely. Storing old data creates unnecessary security risks.
We keep contact form submissions for 24 months. If we have not communicated with you for two years, we purge your record from our CRM. We delete the email thread. We remove your website URL from our active files.
We configure Google Analytics to retain user-level and event-level data for 14 months. After 14 months, Google automatically deletes that specific tracking data. We only retain the high-level, aggregated traffic numbers for historical comparison.
Your Legal Rights
You own your data.
You have the right to know exactly what information we hold about you. You have the right to request a complete export of your contact record. You have the right to demand we correct any inaccurate information.
You have the right to demand total deletion. If you want us to erase your email address from our systems, you tell us. We execute the deletion.
Send an email to [email protected] to exercise any of these rights. Tell us what you want. We process these requests within 72 hours. We do not make you jump through administrative hoops. We do not require a notarized letter.
Security Realities
We secure this site with standard SSL encryption. We enforce two-factor authentication on all our administrative accounts. We limit backend access to our core operations team.
Total security is a myth.
Any agency promising absolute data invulnerability is lying to you. We mitigate risk through strict access controls and regular software updates. We patch our server software the day an update drops. We monitor our firewall logs for brute-force login attempts.
If a data breach occurs, we execute our incident response plan. We identify the compromised data. We patch the vulnerability. We notify you via email within 48 hours of discovering the breach. We tell you exactly what data was exposed and what steps we took to stop the leak.