Privacy Policy

The Wilder Blueprint
Effective Date: February 21, 2026
Last Updated: February 21, 2026


INTRODUCTION

The Wilder Blueprint (“we,” “us,” or “our”) operates the website wilderblueprint.com and provides distressed real estate acquisition training programs and related services (collectively, the “Services”). We are committed to protecting your privacy and handling your personal information with transparency and care.

This Privacy Policy explains what information we collect, how we use it, who we share it with, and your rights regarding your personal data. By accessing or using our Services, you agree to the collection and use of information in accordance with this Privacy Policy.


1. INFORMATION WE COLLECT

We collect several types of information from and about users of our Services to provide, maintain, and improve our offerings. The information we collect falls into the following categories:

1.1 Personal Information You Provide Directly

When you register for an account, purchase a membership, complete an application, or communicate with us, you voluntarily provide personal information that may include:

Account Registration Information: When you create an account on our platform, we collect your first name, last name, primary email address, and phone number. This information is necessary to establish your account, provide access to course materials, and communicate with you about your membership.

Billing and Payment Information: When you purchase a membership or any of our products, we collect billing information including your credit card number, billing address, and other payment details. Payment processing is handled securely through our third-party payment processor, Stripe. We do not store complete credit card numbers on our servers; instead, we retain only the last four digits of your card and expiration date for reference purposes.

Application Information: If you apply for premium membership tiers (Wilder Ops, Wilder Enterprise, or Legacy), we collect additional business information including your company name, website, years in business, current monthly deal volume, team size, annual revenue, primary markets, strategic goals, and other information relevant to your application. This information helps us assess whether the premium tier is appropriate for your business needs.

Communication Information: When you contact us via email, phone, support tickets, or through our community forums, we collect the content of your communications, including any attachments you send us. We also maintain records of your support requests and our responses to provide better customer service.

Profile and Preference Information: You may choose to provide additional optional information such as your company name, current role (DIY Cold Caller, VA Manager, or Inbound Marketer), experience level, primary market location, and how you heard about us. This information helps us personalize your experience and provide more relevant content.

1.2 Information We Collect Automatically

When you access or use our Services, we automatically collect certain information about your device and usage patterns:

Device and Browser Information: We collect information about the device you use to access our Services, including the hardware model, operating system and version, browser type and version, unique device identifiers, and mobile network information. This information helps us optimize our Services for different devices and troubleshoot technical issues.

Log Data: Our servers automatically record information when you access our Services, including your Internet Protocol (IP) address, the date and time of your visit, the pages you view, the time spent on each page, the links you click, the website that referred you to our Services, and other diagnostic data. We use this information to analyze trends, administer the Services, track user navigation patterns, and gather demographic information.

Location Information: We collect general location information based on your IP address to understand the geographic distribution of our users and to comply with regional legal requirements. We do not collect precise geolocation data unless you explicitly grant permission through your device settings.

Usage Data: We track how you interact with our Services, including which training modules you access, how long you spend on each lesson, your progress through the curriculum, quiz and assessment results, tools and templates you download, and features you use. This information helps us understand which content is most valuable and improve our training programs.

1.3 Cookies and Similar Tracking Technologies

We use cookies, web beacons, and similar tracking technologies to collect information about your browsing activities and to provide certain functionality:

Essential Cookies: These cookies are necessary for the operation of our Services. They enable core functionality such as security, authentication, and session management. You cannot opt out of essential cookies without affecting the functionality of our Services.

Functionality Cookies: These cookies allow us to remember your preferences and settings, such as your login information, language preferences, and customization choices. They enhance your user experience by providing personalized features.

Analytics Cookies: We use analytics cookies to understand how visitors interact with our Services. These cookies collect information about which pages you visit, how long you stay on each page, and which links you click. We use this information to improve our Services and create better content. We use analytics tools that may include Google Analytics or similar services.

Marketing Cookies: With your consent, we may use marketing cookies to deliver targeted advertisements and measure the effectiveness of our marketing campaigns. These cookies track your browsing activity across different websites to provide relevant advertisements.

You can control cookies through your browser settings. Most browsers allow you to refuse cookies or delete cookies that have already been set. However, if you disable or refuse cookies, some features of our Services may not function properly. For more information about cookies and how to manage them, visit www.allaboutcookies.org.

1.4 Information from Third Parties

We may receive information about you from third-party sources, including:

Social Media Platforms: If you interact with us on social media platforms such as Facebook, Instagram, LinkedIn, or YouTube, we may collect information from those platforms in accordance with their privacy policies and your privacy settings. This may include your profile information, posts, comments, and engagement metrics.

Business Partners and Affiliates: If you were referred to us by a business partner or affiliate, we may receive information about you from that partner, such as your contact information and the nature of your referral.

Public Sources: We may collect information about you from publicly available sources, such as business directories, social media profiles, and public records, particularly when evaluating applications for premium membership tiers.

Data Enhancement Services: We may use third-party data enhancement services to supplement the information we collect with additional demographic, firmographic, or other relevant data to better understand our users and improve our Services.


2. HOW WE USE INFORMATION

We use the information we collect for various purposes related to providing, maintaining, and improving our Services. The following describes how we use your personal information and the legal bases for such processing:

2.1 Course Delivery and Account Management

Providing Access to Training Materials: We use your account information (name, email, phone) to create and manage your account, authenticate your identity, and provide access to the training modules, tools, and resources included in your membership tier. This processing is necessary to perform our contract with you and deliver the Services you purchased.

Tracking Your Progress: We use your usage data to track your progress through the curriculum, record which modules you have completed, save your quiz and assessment results, and provide personalized recommendations for your learning path. This helps ensure you get the most value from your membership and allows us to identify areas where additional support may be beneficial.

Delivering Course Materials: We use your email address and account information to deliver course materials, provide access credentials, send lesson notifications, and communicate important updates about your training program. This includes automated emails triggered by your progress through the curriculum, such as congratulations messages when you complete a module or reminders when you have not accessed the platform recently.

Customer Support: We use your contact information and communication history to respond to your inquiries, provide technical support, troubleshoot issues, and resolve disputes. This processing is necessary to fulfill our contractual obligations and maintain the quality of our Services.

2.2 Payment Processing and Billing

Processing Transactions: We use your billing information to process payments for memberships, products, and services you purchase. This includes verifying payment information, processing charges, issuing refunds when applicable, and maintaining transaction records. Payment processing is necessary to complete your purchase and fulfill our contract with you.

Subscription Management: For recurring subscription memberships, we use your payment information to process automatic renewal charges, send billing reminders, provide receipts and invoices, and manage subscription changes or cancellations. We will notify you in advance of any subscription renewals and provide clear instructions for canceling if you choose to do so.

Fraud Prevention: We analyze transaction patterns and payment information to detect and prevent fraudulent activity, unauthorized access, and payment disputes. This processing is necessary to protect our legitimate business interests and maintain the security of our Services.

2.3 Marketing Communications and Promotional Activities

Sending Marketing Emails: With your consent or where permitted by law, we use your email address to send newsletters, promotional offers, announcements about new courses or features, success stories, and other marketing communications. Every marketing email includes an unsubscribe link, and you can opt out of marketing communications at any time while continuing to receive transactional emails related to your account.

Personalized Recommendations: We use your profile information, usage data, and preferences to provide personalized course recommendations, suggest relevant tools and resources, and tailor content to your specific operator type (DIY Cold Caller, VA Manager, or Inbound Marketer). This helps ensure you receive the most relevant training for your business model.

Promotional Campaigns: We may use your information to conduct contests, sweepstakes, or promotional campaigns, subject to additional terms and conditions. Participation in these activities is always voluntary, and we will clearly disclose what information is collected and how it will be used.

Referral Programs: If you participate in our referral program, we use your contact information and referral data to track referrals, attribute new customers to your account, and process any referral incentives or rewards you earn.

2.4 Service Improvement and Analytics

Analyzing Usage Patterns: We analyze usage data, log data, and analytics information to understand how users interact with our Services, identify which content is most valuable, determine which features are most frequently used, and discover areas for improvement. This helps us make data-driven decisions about product development and content creation.

A/B Testing and Experimentation: We may conduct A/B tests and experiments to evaluate different versions of our website, course materials, or features. This involves showing different versions to different users and measuring which version performs better. Your usage data may be included in these analyses, but results are always reported in aggregate form.

Quality Assurance: We use feedback, support tickets, and usage data to identify bugs, technical issues, and usability problems. This allows us to maintain high-quality Services and quickly address any issues that arise.

Research and Development: We use aggregated and anonymized data to conduct research, develop new products and services, create industry reports, and contribute to the broader real estate investment education community. When data is used for research purposes, it is always anonymized so that individual users cannot be identified.

2.5 Community Management and User Engagement

Facilitating Community Interaction: If you participate in our community forums, discussion groups, or member networking features, we use your profile information and contributions to facilitate connections between members, moderate discussions, and maintain a positive community environment.

Recognizing Achievements: We may use your success stories, testimonials, and results (with your explicit permission) to showcase member achievements, create case studies, and inspire other members. We will always obtain your consent before publicly sharing your personal success story.

Event Management: If we host webinars, live Q&A sessions, or in-person events, we use your registration information to manage attendance, send event reminders, provide access links, and follow up after the event.

2.6 Legal Compliance and Protection

Complying with Legal Obligations: We process your information as necessary to comply with applicable laws, regulations, legal processes, or enforceable governmental requests. This includes tax reporting, responding to subpoenas or court orders, and cooperating with law enforcement when legally required.

Enforcing Terms and Policies: We use your information to enforce our Terms of Service, detect and prevent violations of our policies, protect against fraudulent or illegal activity, and maintain the security and integrity of our Services.

Protecting Rights and Safety: We may use and disclose your information when we believe it is necessary to protect the rights, property, or safety of The Wilder Blueprint, our users, or the public. This includes sharing information with other companies and organizations for fraud protection and credit risk reduction.

Business Transfers: In the event of a merger, acquisition, reorganization, bankruptcy, or sale of assets, your information may be transferred as part of that transaction. We will notify you via email and/or a prominent notice on our website of any change in ownership or use of your personal information, as well as any choices you may have regarding your information.

2.7 Communication and Customer Relationship Management

Transactional Communications: We use your contact information to send important transactional messages such as order confirmations, payment receipts, password reset instructions, account security alerts, and changes to our terms or policies. These communications are essential to your use of our Services and cannot be opted out of while you maintain an active account.

Surveys and Feedback: We may use your contact information to request feedback about your experience with our Services, invite you to participate in surveys or user research, and gather testimonials. Participation is always voluntary, and we will clearly explain how your feedback will be used.

Administrative Communications: We use your information to send administrative messages about your account, such as membership expiration notices, renewal reminders, changes to features or pricing, and scheduled maintenance notifications.


3. THIRD-PARTY SERVICES AND DATA SHARING

We work with trusted third-party service providers to help us operate our business and deliver our Services. These providers have access to your personal information only to perform specific tasks on our behalf and are obligated to protect your information and use it only for the purposes we specify. We do not sell your personal information to third parties.

3.1 Payment Processing

Stripe: We use Stripe, Inc. as our primary payment processor to handle all credit card transactions, subscription billing, and payment management. When you make a purchase, your payment information is transmitted directly to Stripe using secure encryption. Stripe processes your payment information in accordance with Payment Card Industry Data Security Standards (PCI DSS) and their own privacy policy, which can be found at https://stripe.com/privacy. We receive only limited information from Stripe, such as confirmation of successful payment, the last four digits of your card, and transaction identifiers. We do not store complete credit card numbers on our servers.

PayPal: We may also offer PayPal as an alternative payment method. If you choose to pay via PayPal, your payment information is processed by PayPal in accordance with their privacy policy, available at https://www.paypal.com/privacy. PayPal may share transaction details with us, but we do not receive your PayPal login credentials or full financial account information.

3.2 Course Hosting and Learning Management

Skool Platform: We use Skool as our primary learning management system to host course content, facilitate community discussions, and track student progress. When you access our training materials, your account information and usage data are processed by Skool in accordance with their privacy policy. Skool provides us with analytics about course engagement and student progress, which we use to improve our training programs. For more information about how Skool handles your data, please visit their privacy policy at https://www.skool.com/privacy.

YouTube: Some of our training videos may be hosted on YouTube, a service provided by Google LLC. When you watch videos hosted on YouTube, Google may collect information about your viewing activity in accordance with their privacy policy, available at https://policies.google.com/privacy. YouTube may use cookies and similar technologies to track your viewing behavior and serve personalized advertisements.

Vimeo: We may also use Vimeo to host certain training videos. Vimeo’s privacy practices are governed by their privacy policy, available at https://vimeo.com/privacy. Vimeo may collect information about your video viewing activity and device information when you access videos hosted on their platform.

3.3 Email and Communication Services

Email Service Provider: We use professional email service providers (such as SendGrid, Mailchimp, or similar services) to send transactional emails, marketing communications, and course notifications. These providers have access to your email address and name, as well as information about your email engagement (such as open rates and click-through rates). They process this information solely to deliver emails on our behalf and provide us with analytics about email performance. Each provider maintains their own privacy policy governing their data practices.

Customer Support Platform: We may use customer support platforms (such as Zendesk, Intercom, or similar services) to manage support tickets, live chat, and customer inquiries. When you contact our support team, your communication history and contact information may be stored on these platforms. Support platform providers are contractually obligated to protect your information and use it only to provide support services to us.

3.4 Analytics and Performance Monitoring

Google Analytics: We use Google Analytics to understand how visitors use our website and Services. Google Analytics collects information such as how often users visit our site, what pages they visit, and what other sites they used prior to coming to our site. Google Analytics uses cookies and similar technologies to collect this information. The information generated by the cookie about your use of our Services (including your IP address) is transmitted to and stored by Google on servers in the United States. Google uses this information to evaluate your use of our Services, compile reports on website activity, and provide other services relating to website activity and internet usage. Google may also transfer this information to third parties where required to do so by law, or where such third parties process the information on Google’s behalf. For more information about Google Analytics and how to opt out, visit https://tools.google.com/dlpage/gaoptout.

Other Analytics Tools: We may use additional analytics and performance monitoring tools to track website performance, identify technical issues, and understand user behavior. These tools may include services such as Hotjar, Mixpanel, Amplitude, or similar platforms. Each of these services operates under their own privacy policies, and we configure them to respect user privacy to the extent possible.

3.5 Marketing and Advertising

Social Media Platforms: We maintain business pages on social media platforms including Facebook, Instagram, LinkedIn, YouTube, and Twitter/X. When you interact with our content on these platforms, your interactions are governed by the respective platform’s privacy policy. These platforms may provide us with aggregated analytics about our audience and content performance, but we do not receive personal information about individual users unless you choose to contact us directly through these platforms.

Advertising Networks: We may use advertising networks and platforms (such as Facebook Ads, Google Ads, LinkedIn Ads) to display advertisements for our Services to potential customers. These platforms may use cookies and similar technologies to track your browsing activity across different websites and serve targeted advertisements. You can control personalized advertising through your browser settings and the privacy settings on each advertising platform.

Retargeting Services: We may use retargeting services (such as Facebook Pixel, Google Remarketing) to show advertisements to people who have previously visited our website. These services use cookies to identify previous visitors and display relevant ads on other websites. You can opt out of retargeting by adjusting your browser cookie settings or using the opt-out mechanisms provided by each advertising network.

3.6 Cloud Storage and Infrastructure

Cloud Hosting Providers: We use cloud hosting services (such as Amazon Web Services, Google Cloud Platform, or Microsoft Azure) to store data and host our Services. These providers maintain robust security measures to protect data stored on their infrastructure. Data may be stored on servers located in the United States or other countries where these providers operate data centers. Cloud hosting providers process data solely as our service providers and in accordance with our instructions.

Content Delivery Networks: We use content delivery networks (CDNs) to deliver website content, images, and videos more efficiently to users around the world. CDNs may temporarily cache content on servers in various geographic locations to improve loading speeds. CDN providers do not use your personal information for their own purposes.

3.7 Business Tools and Productivity Services

Customer Relationship Management (CRM): We may use CRM platforms to manage customer relationships, track sales activities, and coordinate marketing campaigns. Your contact information and interaction history may be stored in our CRM system. We use CRM providers that maintain strong data protection standards and process information only as directed by us.

Communication and Collaboration Tools: We use various business communication tools (such as Slack, Microsoft Teams, or Google Workspace) for internal team collaboration. These tools may process your information when you communicate with our team members. We configure these tools to maintain appropriate security and privacy protections.

3.8 Data Sharing Practices

We share your personal information with third parties only in the following circumstances:

Service Providers: We share information with service providers who perform services on our behalf, such as payment processing, email delivery, hosting services, customer support, and analytics. These providers are contractually obligated to use your information only for the purposes we specify and to maintain appropriate security measures.

Business Partners: With your consent, we may share information with business partners who offer complementary services or products that may be of interest to you. We will always obtain your explicit permission before sharing your information with business partners for marketing purposes.

Legal Requirements: We may disclose your information if required to do so by law or in response to valid requests by public authorities (such as a court order or subpoena). We will notify you of such requests unless prohibited by law.

Business Transfers: If we are involved in a merger, acquisition, financing, reorganization, bankruptcy, or sale of assets, your information may be transferred as part of that transaction. We will notify you via email and/or a prominent notice on our website before your information is transferred and becomes subject to a different privacy policy.

Aggregated Data: We may share aggregated or anonymized information that cannot reasonably be used to identify you. For example, we may share statistics about course completion rates or general demographic information about our user base without identifying individual users.

With Your Consent: We may share your information for any other purpose with your explicit consent.

3.9 Third-Party Links

Our Services may contain links to third-party websites, applications, or services that are not operated by us. If you click on a third-party link, you will be directed to that third party’s site. We strongly advise you to review the privacy policy of every site you visit. We have no control over and assume no responsibility for the content, privacy policies, or practices of any third-party sites or services.

3.10 Social Media Features

Our Services may include social media features, such as the Facebook “Like” button, Twitter “Tweet” button, LinkedIn “Share” button, or other interactive mini-programs. These features may collect your IP address, track which page you are visiting on our site, and set a cookie to enable the feature to function properly. Social media features are either hosted by a third party or hosted directly on our Services. Your interactions with these features are governed by the privacy policy of the company providing them.


4. DATA SECURITY

The security of your personal information is critically important to us. We implement and maintain appropriate technical, administrative, and physical security measures designed to protect your information from unauthorized access, disclosure, alteration, and destruction. However, no method of transmission over the internet or electronic storage is completely secure, and we cannot guarantee absolute security.

4.1 Encryption and Secure Transmission

SSL/TLS Encryption: All data transmitted between your browser and our servers is encrypted using industry-standard Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols. This encryption protects your information as it travels across the internet, preventing unauthorized parties from intercepting sensitive data such as login credentials and payment information. You can verify that you are on a secure connection by looking for “https://” in your browser’s address bar and the padlock icon.

Data Encryption at Rest: Sensitive data stored in our databases, including personal information and account details, is encrypted at rest using strong encryption algorithms. This means that even if unauthorized individuals were to gain access to our storage systems, they would not be able to read the encrypted data without the appropriate decryption keys.

Payment Security: All payment transactions are processed through PCI DSS compliant payment processors (Stripe and PayPal). We do not store complete credit card numbers, CVV codes, or other sensitive payment information on our servers. Payment information is transmitted directly to our payment processors using secure, encrypted connections.

4.2 Access Controls and Authentication

Strong Password Requirements: We require users to create strong passwords that meet minimum complexity requirements, including a combination of letters, numbers, and special characters. We encourage users to choose unique passwords that are not used for other accounts and to change passwords regularly.

Multi-Factor Authentication: We offer optional multi-factor authentication (MFA) for user accounts, adding an additional layer of security beyond passwords. When MFA is enabled, users must provide a second form of verification (such as a code sent to their mobile device) in addition to their password when logging in.

Access Limitations: We implement strict access controls to ensure that only authorized personnel have access to personal information. Access is granted on a need-to-know basis and is limited to employees, contractors, and service providers who require access to perform their job functions. All personnel with access to personal information are bound by confidentiality obligations.

Regular Access Reviews: We conduct regular reviews of user access privileges to ensure that access rights remain appropriate and that former employees or contractors no longer have access to our systems.

4.3 Infrastructure Security

Secure Hosting Environment: Our Services are hosted on secure cloud infrastructure provided by reputable providers (such as Amazon Web Services, Google Cloud Platform, or Microsoft Azure) that maintain industry-leading security certifications and compliance standards. These providers implement multiple layers of physical and logical security controls to protect data centers and server infrastructure.

Firewalls and Intrusion Detection: We employ firewalls, intrusion detection systems, and intrusion prevention systems to monitor network traffic and protect against unauthorized access attempts, malware, and other security threats. These systems are continuously updated to defend against emerging threats.

Regular Security Updates: We maintain our software systems with the latest security patches and updates. Operating systems, applications, and security software are regularly updated to address known vulnerabilities and protect against new threats.

Network Segmentation: We use network segmentation to isolate different components of our infrastructure, limiting the potential impact of a security breach. Sensitive data and critical systems are separated from less sensitive resources.

4.4 Monitoring and Incident Response

Security Monitoring: We continuously monitor our systems for suspicious activity, unauthorized access attempts, and potential security incidents. Automated alerts notify our security team of anomalous behavior so that we can investigate and respond quickly.

Logging and Audit Trails: We maintain detailed logs of system access, user activities, and security events. These logs are regularly reviewed and analyzed to detect potential security issues and to support incident investigations when necessary.

Incident Response Plan: We have established a comprehensive incident response plan that outlines procedures for identifying, containing, investigating, and remediating security incidents. In the event of a data breach that affects your personal information, we will notify you and relevant authorities in accordance with applicable laws and regulations.

Regular Security Assessments: We conduct regular security assessments, vulnerability scans, and penetration testing to identify and address potential weaknesses in our systems. These assessments are performed by qualified security professionals and help us maintain a strong security posture.

4.5 Employee Training and Policies

Security Awareness Training: All employees and contractors receive regular security awareness training covering topics such as password security, phishing prevention, data handling procedures, and incident reporting. This training helps ensure that our team understands their role in protecting your information.

Confidentiality Agreements: All employees, contractors, and service providers with access to personal information are required to sign confidentiality agreements that legally bind them to protect the confidentiality and security of user data.

Data Handling Procedures: We have established clear policies and procedures governing how personal information should be collected, stored, accessed, transmitted, and disposed of. These procedures are designed to minimize the risk of unauthorized access or disclosure.

Background Checks: We conduct appropriate background checks on employees and contractors who will have access to sensitive personal information, in accordance with applicable laws.

4.6 Data Retention and Disposal

Retention Periods: We retain your personal information only for as long as necessary to fulfill the purposes for which it was collected, comply with legal obligations, resolve disputes, and enforce our agreements. Specific retention periods vary depending on the type of information and applicable legal requirements.

Secure Disposal: When personal information is no longer needed, we securely delete or destroy it using methods that prevent unauthorized recovery. Digital data is securely erased using data destruction techniques, and physical documents containing personal information are shredded or otherwise destroyed.

4.7 Limitations and User Responsibilities

While we implement robust security measures, no system is completely immune to security threats. Users also play an important role in protecting their information:

Account Security: You are responsible for maintaining the confidentiality of your account credentials and for all activities that occur under your account. Do not share your password with others, and notify us immediately if you suspect unauthorized access to your account.

Device Security: Ensure that devices you use to access our Services are protected with up-to-date antivirus software, firewalls, and operating system security updates. Use caution when accessing your account from public or shared computers.

Phishing Awareness: Be vigilant about phishing attempts. We will never ask you to provide your password, credit card information, or other sensitive data via email. If you receive suspicious communications claiming to be from The Wilder Blueprint, do not click on links or provide information, and report the communication to us immediately.

Secure Networks: Avoid accessing your account or transmitting sensitive information over unsecured public Wi-Fi networks. If you must use public Wi-Fi, consider using a virtual private network (VPN) to encrypt your connection.

4.8 Reporting Security Issues

If you discover a security vulnerability in our Services or believe that your account has been compromised, please contact us immediately at support@wilderblueprint.com or call 619-375-3015. We take all security reports seriously and will investigate promptly. We appreciate responsible disclosure and will work with security researchers to address confirmed vulnerabilities.


5. YOUR RIGHTS AND CHOICES

You have certain rights regarding your personal information, and we provide you with the tools and mechanisms to exercise these rights. The specific rights available to you may depend on your location and applicable privacy laws.

5.1 Access to Your Information

Right to Access: You have the right to request access to the personal information we hold about you. This includes the right to obtain confirmation of whether we are processing your personal information and, if so, to receive a copy of that information along with details about how it is being used.

How to Exercise: To request access to your information, log in to your account and navigate to your account settings, where you can view and download much of your personal information. For information not available through your account dashboard, you may submit a request by emailing support@wilderblueprint.com with the subject line “Access Request.” Please include your full name, email address associated with your account, and specific details about the information you wish to access.

Response Time: We will respond to access requests within thirty (30) days of receipt. If we require additional time to fulfill your request, we will notify you of the extension and the reason for the delay.

Verification: To protect your privacy and security, we may need to verify your identity before providing access to your personal information. We may ask you to provide additional information or answer security questions to confirm your identity.

5.2 Correction and Update

Right to Correction: You have the right to request that we correct inaccurate or incomplete personal information we hold about you. If you believe any information we have about you is incorrect or outdated, you can request that we update or correct it.

How to Exercise: You can update most of your personal information directly through your account settings. Simply log in, navigate to your profile or account settings, and make the necessary changes. If you are unable to update certain information through your account, or if you need assistance, contact us at support@wilderblueprint.com with the subject line “Correction Request” and specify the information that needs to be corrected.

Verification of Corrections: In some cases, we may ask you to provide documentation or additional information to verify the accuracy of the corrections you are requesting, particularly for sensitive information or information that affects your account status.

5.3 Deletion and Erasure

Right to Deletion: You have the right to request that we delete your personal information under certain circumstances, including when the information is no longer necessary for the purposes for which it was collected, when you withdraw consent (where consent was the basis for processing), when you object to processing and there are no overriding legitimate grounds, or when the information has been unlawfully processed.

How to Exercise: To request deletion of your personal information, send an email to support@wilderblueprint.com with the subject line “Deletion Request.” Please include your full name, email address associated with your account, and specify what information you would like deleted. Alternatively, you may request account deletion through your account settings.

Limitations on Deletion: Please note that we may not be able to delete all of your information in certain circumstances, such as when we are required to retain information to comply with legal obligations, resolve disputes, enforce our agreements, or for legitimate business purposes such as fraud prevention and security. When we cannot fully delete your information, we will inform you of the reasons and what information must be retained.

Account Closure: If you request deletion of your account, your access to course materials and membership benefits will be terminated. Account deletion is permanent and cannot be undone. We recommend downloading any course materials or data you wish to keep before requesting account deletion.

5.4 Data Portability

Right to Data Portability: You have the right to receive a copy of your personal information in a structured, commonly used, and machine-readable format. You also have the right to request that we transmit this information directly to another service provider where technically feasible.

How to Exercise: To request a portable copy of your data, email support@wilderblueprint.com with the subject line “Data Portability Request.” We will provide your information in a commonly used format such as CSV, JSON, or PDF, depending on the type of data requested.

Scope of Portability: Data portability applies to personal information you have provided to us and that we process based on your consent or to perform our contract with you. It does not include information that has been derived or inferred from your data through our analysis or processing.

5.5 Objection and Restriction

Right to Object: You have the right to object to our processing of your personal information in certain circumstances, particularly when processing is based on legitimate interests or for direct marketing purposes. When you object, we will stop processing your information unless we can demonstrate compelling legitimate grounds that override your interests, rights, and freedoms, or when processing is necessary for the establishment, exercise, or defense of legal claims.

Right to Restriction: You have the right to request that we restrict the processing of your personal information in certain situations, such as when you contest the accuracy of the information, when processing is unlawful but you do not want the information deleted, when we no longer need the information but you need it for legal claims, or when you have objected to processing and we are verifying whether our legitimate grounds override your objection.

How to Exercise: To object to processing or request restriction, email support@wilderblueprint.com with the subject line “Objection to Processing” or “Restriction Request” and explain the specific processing activities you object to or wish to restrict, along with your reasons.

5.6 Marketing Communications and Opt-Out

Right to Opt Out of Marketing: You have the right to opt out of receiving marketing communications from us at any time. This includes promotional emails, newsletters, and other marketing messages. Please note that even if you opt out of marketing communications, you will continue to receive transactional emails related to your account, such as order confirmations, password resets, and important service announcements.

How to Opt Out: Every marketing email we send includes an “Unsubscribe” link at the bottom. Click this link to immediately opt out of future marketing emails. Alternatively, you can manage your email preferences through your account settings or by emailing support@wilderblueprint.com with the subject line “Unsubscribe from Marketing.”

Processing Time: We will process your opt-out request as quickly as possible, typically within 48 hours. However, you may receive a few additional marketing emails that were already scheduled before your request was processed.

Targeted Advertising: To opt out of targeted advertising based on your browsing activity, you can adjust your cookie preferences through our cookie consent banner, use browser settings to block third-party cookies, or visit industry opt-out pages such as the Digital Advertising Alliance’s opt-out page at http://optout.aboutads.info or the Network Advertising Initiative’s opt-out page at http://optout.networkadvertising.org.

5.7 Withdrawal of Consent

Right to Withdraw Consent: Where we process your personal information based on your consent, you have the right to withdraw that consent at any time. Withdrawal of consent will not affect the lawfulness of processing that occurred before the withdrawal.

How to Exercise: To withdraw consent, contact us at support@wilderblueprint.com with the subject line “Withdraw Consent” and specify which consent you wish to withdraw. You can also manage certain consent preferences through your account settings.

Effect of Withdrawal: Depending on the type of consent you withdraw, we may no longer be able to provide certain services or features. For example, if you withdraw consent for us to process your payment information, we will not be able to process subscription renewals or future purchases.

5.8 Automated Decision-Making and Profiling

Right to Human Review: If we make decisions about you based solely on automated processing (including profiling) that produce legal effects or similarly significantly affect you, you have the right to request human intervention, express your point of view, and contest the decision.

Our Practices: We do not currently make decisions based solely on automated processing that produce legal effects or significantly affect you. If this changes in the future, we will update this Privacy Policy and provide you with information about your rights regarding automated decision-making.

5.9 Complaint to Supervisory Authority

Right to Lodge a Complaint: If you believe that we have violated your privacy rights or applicable data protection laws, you have the right to lodge a complaint with a supervisory authority, particularly in the country where you reside, work, or where the alleged violation occurred.

Contact Information for Supervisory Authorities: If you are located in the European Economic Area, you can find contact information for your local data protection authority at https://edpb.europa.eu/about-edpb/board/members_en. If you are located in the United Kingdom, you can contact the Information Commissioner’s Office at https://ico.org.uk/make-a-complaint.

Resolution with Us First: While you have the right to lodge a complaint with a supervisory authority, we encourage you to contact us first so that we can attempt to resolve your concerns directly. We are committed to working with you to address any privacy issues.

5.10 Exercising Your Rights

No Discrimination: We will not discriminate against you for exercising any of your privacy rights. You will not receive different pricing, service quality, or product offerings as a result of exercising your rights, except to the extent that differences are reasonably related to the value provided by your data or as permitted by law.

Verification Process: To protect your privacy and security, we will verify your identity before fulfilling requests to exercise your rights. The verification process may require you to provide information such as your email address, account details, or answers to security questions. For requests involving sensitive information or significant account changes, we may require additional verification.

Authorized Agents: You may designate an authorized agent to make requests on your behalf. To do so, you must provide the authorized agent with written permission, and we may require you to verify your identity directly with us and confirm that you provided the agent with permission to submit the request.

Response Time and Format: We will respond to requests to exercise your rights within the timeframes required by applicable law, typically within thirty (30) days. If we need additional time, we will inform you of the reason for the delay and the expected response time. We will provide our response in a commonly used electronic format unless you request otherwise.

Fees: We do not charge a fee to process or respond to your requests to exercise your rights unless your requests are manifestly unfounded, excessive, or repetitive. In such cases, we may charge a reasonable fee or refuse to act on the request. If we determine that a fee applies, we will notify you of the fee and provide an explanation before completing your request.


6. GDPR COMPLIANCE (EUROPEAN ECONOMIC AREA RESIDENTS)

If you are located in the European Economic Area (EEA), the United Kingdom, or Switzerland, you have additional rights under the General Data Protection Regulation (GDPR) and equivalent data protection laws. This section provides information specific to individuals in these regions.

6.1 Legal Basis for Processing

Under GDPR, we must have a legal basis to process your personal information. We rely on the following legal bases:

Performance of a Contract: We process your personal information to fulfill our contractual obligations to you when you purchase a membership or use our Services. This includes creating and managing your account, providing access to course materials, processing payments, and delivering customer support. Without this processing, we would be unable to provide the Services you have requested.

Consent: In some cases, we process your personal information based on your explicit consent. This includes processing for marketing communications (where required by law), certain cookies and tracking technologies, and sharing your information with third parties for purposes beyond service delivery. You have the right to withdraw your consent at any time, and we will stop processing your information for that purpose.

Legitimate Interests: We may process your personal information based on our legitimate business interests, provided that these interests do not override your fundamental rights and freedoms. Our legitimate interests include improving our Services, conducting analytics, preventing fraud and abuse, maintaining security, and pursuing business development opportunities. When we rely on legitimate interests, we conduct a balancing test to ensure that your rights are protected.

Legal Obligations: We process certain personal information to comply with legal obligations, such as tax reporting requirements, responding to legal requests from authorities, and maintaining records as required by law.

6.2 International Data Transfers

The Wilder Blueprint is based in the United States, and we process and store personal information primarily in the United States. If you are located in the EEA, UK, or Switzerland, this means that your personal information will be transferred to and processed in a country that may not provide the same level of data protection as your home country.

Transfer Mechanisms: When we transfer personal information from the EEA, UK, or Switzerland to the United States or other countries, we implement appropriate safeguards to protect your information. These safeguards may include:

  • Standard Contractual Clauses: We use Standard Contractual Clauses (also known as Model Clauses) approved by the European Commission to govern transfers of personal information to countries that do not provide adequate data protection. These clauses are legally binding contracts that require recipients to protect personal information in accordance with European data protection standards.
  • Adequacy Decisions: Where available, we may rely on adequacy decisions issued by the European Commission recognizing that certain countries provide an adequate level of data protection.
  • Service Provider Commitments: Our third-party service providers that receive personal information from the EEA, UK, or Switzerland are contractually obligated to implement appropriate technical and organizational measures to protect personal information and to process it only in accordance with our instructions and applicable data protection laws.
  • Additional Safeguards: In light of the Schrems II decision and ongoing developments in international data transfer regulations, we continuously review and enhance our data transfer mechanisms to ensure compliance with evolving legal requirements. This includes conducting transfer impact assessments and implementing supplementary measures where necessary.

6.3 Right to Be Forgotten (Erasure)

Under GDPR, you have an enhanced right to erasure, also known as the “right to be forgotten.” This right allows you to request deletion of your personal information in the following circumstances:

  • When Information Is No Longer Necessary
  • Withdrawal of Consent
  • Objection to Processing
  • Unlawful Processing
  • Legal Compliance
  • Children’s Data

Limitations: We may not be able to fulfill your erasure request if retention is necessary for compliance with legal obligations, for the establishment, exercise, or defense of legal claims, for reasons of public interest, or for archiving, research, or statistical purposes as permitted by law.

6.4 Data Portability Rights

Under GDPR, you have enhanced data portability rights that allow you to:

  • Receive your data in a structured, commonly used, and machine-readable format (such as CSV, JSON, or XML).
  • Request transmission to another controller where technically feasible.

Scope of Portability: This right applies to data you provided to us that we process based on consent or contract, and does not apply to derived or inferred data.

6.5 Automated Decision-Making and Profiling

We do not currently engage in automated decision-making or profiling that produces legal effects or similarly significantly affects you. If this changes, we will update this Privacy Policy and provide required disclosures and choices.

6.6 Data Protection Officer / Privacy Contact

While we are not currently required to appoint a Data Protection Officer under GDPR, we have designated a privacy contact person responsible for overseeing data protection matters and serving as the point of contact for data subjects and supervisory authorities.

Privacy Contact:
Email: support@wilderblueprint.com (Subject Line: “GDPR Privacy Inquiry”)
Phone: 619-375-3015
Address: 1420 Kettner Blvd #100, San Diego, CA 92101, USA

6.7 Supervisory Authority

If you are located in the EEA or UK, you have the right to lodge a complaint with your local data protection supervisory authority.

EEA: https://edpb.europa.eu/about-edpb/board/members_en
UK ICO: https://ico.org.uk
Swiss FDPIC: https://www.edoeb.admin.ch

We encourage you to contact us first so we can attempt to resolve your concerns directly.

6.8 Children’s Privacy

Our Services are not directed to children under the age of 16, and we do not knowingly collect personal information from children under 16 without parental consent. If we become aware that we have collected personal information from a child under 16 without proper parental consent, we will take steps to delete that information as quickly as possible.

If you are a parent or guardian and believe that your child under 16 has provided personal information to us without your consent, please contact us immediately at support@wilderblueprint.com.

6.9 Retention Periods

We retain personal information only for as long as necessary to fulfill the purposes for which it was collected, comply with legal obligations, resolve disputes, and enforce our agreements.

Specific retention periods include:

  • Account Information: Duration of active membership and a reasonable period thereafter for post-cancellation issues, compliance, and fraud prevention.
  • Payment Information: Transaction records typically seven (7) years.
  • Marketing Communications: Preferences and opt-out records retained indefinitely to honor your choices.
  • Usage Data and Analytics: Identifiable form up to two (2) years, then may be aggregated/anonymized.
  • Support Communications: Up to three (3) years.

When personal information is no longer needed, we securely delete or anonymize it.


7. CCPA / CPRA COMPLIANCE (CALIFORNIA RESIDENTS)

If you are a California resident, you have specific rights under the California Consumer Privacy Act (CCPA) and the California Privacy Rights Act (CPRA).

7.1 Categories of Personal Information We Collect

In the preceding 12 months, we have collected the following categories of personal information:

  • Identifiers: name, email, phone, IP address, username, device identifiers
  • Commercial Information: purchase records, payment history, transaction details
  • Internet or Network Activity: browsing and usage data, pages viewed, time on page, clicks
  • Geolocation Data: general location based on IP address (not precise unless permission granted)
  • Professional or Employment Information: for premium tier applicants (company, deal volume, revenue, markets, etc.)
  • Education Information: training progress, module completion, quiz/assessment results
  • Inferences: operator type preferences or behavior-based profiles to personalize content

7.2 Sources of Personal Information

  • Directly from you
  • Automatically via cookies/logs/analytics
  • Third parties (social platforms, partners/affiliates, payment processors, data enhancement services)

7.3 Business or Commercial Purposes

  • Providing Services
  • Improving Services
  • Marketing and communications (with consent where required)
  • Security and fraud prevention
  • Legal compliance
  • Internal business operations

7.4 Categories of Third Parties We Share With

  • Service providers (Stripe, PayPal, Skool, YouTube, Vimeo, email tools, support tools, analytics, hosting, etc.)
  • Business partners (with consent)
  • Advertising networks
  • Professional advisors
  • Legal/regulatory authorities
  • Business transferees

7.5 Sale and Sharing of Personal Information

We do not sell personal information for monetary consideration. However, under CCPA’s broad definition, certain data sharing for targeted advertising may be considered “sale” or “sharing.”

Right to Opt Out: California residents can opt out by:

  • Clicking “Do Not Sell or Share My Personal Information” in the website footer
  • Emailing support@wilderblueprint.com (Subject: “Do Not Sell My Personal Information”)
  • Calling 619-375-3015

You can also control cookies via our cookie banner or browser settings.

7.6 California Consumer Rights

California residents have the right to:

  • Know what personal information we collect/use/share
  • Delete personal information (with exceptions)
  • Correct inaccurate personal information
  • Opt out of sale/sharing
  • Limit use of sensitive personal information (where applicable)
  • Non-discrimination for exercising rights

7.7 How to Exercise Your California Rights

Submit requests by:

  • Email: support@wilderblueprint.com (Subject: “California Privacy Rights Request”)
  • Phone: 619-375-3015
  • Account settings (where applicable)

We will verify identity before fulfilling requests and may require additional verification for sensitive requests.

Response Time: within forty-five (45) days, with a possible 45-day extension if needed.

7.8 Retention of Personal Information

See Section 6.9.

7.9 Minors Under 16

We do not knowingly sell or share personal information of consumers under 16.

7.10 California Shine the Light

We do not share personal information with third parties for their direct marketing purposes without your consent. California residents may request information by emailing support@wilderblueprint.com.

7.11 Notice of Financial Incentive

Currently, we do not offer financial incentives that require a separate notice under CCPA. If this changes, we will update this Privacy Policy and provide appropriate notices.


8. CONTACT INFORMATION AND UPDATES

8.1 Contact Us

If you have questions, concerns, or requests regarding this Privacy Policy or our data practices, contact:

The Wilder Blueprint
Privacy Contact: Adam Wilder
Email: support@wilderblueprint.com
Phone: 619-375-3015
Office Address: 1420 Kettner Blvd #100, San Diego, CA 92101, United States
Business Hours: Monday through Friday, 9:00 AM to 5:00 PM Pacific Time

When contacting us about privacy matters, include “Privacy Inquiry” in the subject line and provide sufficient detail so we can respond effectively.

8.2 Response Time

General questions: within three (3) business days.
Formal privacy rights requests: within legally required timeframes (typically 30–45 days depending on jurisdiction).

8.3 Updates to This Privacy Policy

We may update this Privacy Policy from time to time. When we do, we will update the “Last Updated” date at the top.

Material Changes: If changes significantly affect your rights or our handling of personal information, we will provide prominent notice via email, website banners, in-app notifications, or other appropriate means.

Continued Use: Continued use after the effective date of changes constitutes acceptance of the revised policy. If you do not agree, discontinue use and contact us to close your account.

You can always find the most current version at: https://wilderblueprint.com/privacy-policy.

8.4 Additional Resources

FTC: https://www.ftc.gov/privacy
California AG (CCPA): https://oag.ca.gov/privacy/ccpa
EDPB (GDPR): https://edpb.europa.eu
All About Cookies: http://www.allaboutcookies.org
DAA Opt-Out: http://optout.aboutads.info
NAI Opt-Out: http://optout.networkadvertising.org


ACKNOWLEDGMENT AND CONSENT

By using our Services, you acknowledge that you have read and understood this Privacy Policy and agree to the collection, use, and disclosure of your personal information as described herein. If you do not agree with this Privacy Policy, please do not use our Services.

For users in jurisdictions where explicit consent is required for certain processing activities, we will obtain your consent through appropriate mechanisms such as consent forms, checkboxes, or other opt-in mechanisms before collecting or processing your personal information for those purposes.


EFFECTIVE DATE AND VERSION HISTORY

Effective Date: February 21, 2026
Last Updated: February 21, 2026

Version History:

  • Version 1.0 (February 21, 2026): Initial publication of Privacy Policy

SUMMARY OF KEY POINTS

While we encourage you to read this Privacy Policy in full, here is a summary of the key points:

What Information We Collect: We collect personal information you provide directly (name, email, phone, billing information), information we collect automatically (device information, usage data, cookies), and information from third parties (social media, business partners).

How We Use Your Information: We use your information to provide and improve our Services, process payments, communicate with you, personalize your experience, conduct analytics, prevent fraud, and comply with legal obligations.

Who We Share With: We share information with service providers who help us operate our business (payment processors, hosting providers, email services), business partners (with your consent), and legal authorities (when required by law). We do not sell your personal information for monetary consideration.

Your Rights: You have rights to access, correct, delete, and port your personal information. You can opt out of marketing communications and, if you are a California resident, opt out of the “sale” or “sharing” of your personal information. You can exercise these rights by contacting us at support@wilderblueprint.com or 619-375-3015.

Security: We implement industry-standard security measures including SSL/TLS encryption, secure payment processing, access controls, and regular security monitoring to protect your information.

International Transfers: If you are located outside the United States, your information will be transferred to and processed in the United States. We implement appropriate safeguards for international transfers, including Standard Contractual Clauses where required.

Contact Us: For questions or concerns about this Privacy Policy or to exercise your privacy rights, contact us at support@wilderblueprint.com or 619-375-3015.


© 2026 The Wilder Blueprint. All rights reserved.