The Other Way Martial Consulting
Effective Date: May 27, 2025
Last Updated: December 12, 2025
Your Digital Safety is Part of Your Physical Defense
Most companies treat data as a commodity. We treat it as a tactical vulnerability. At The Other Way Martial Consulting, we deal in objective reality. Guarding your identity is a structural necessity, equal in importance to guarding your physical well-being. We do not coddle you with legal jargon, nor do we hide behind complex terminology. We simply follow a code.
We will never sell, rent, or trade personal dossiers. Trust is the currency of this dojo. We refuse to devalue it.
1. Information Collection Protocols
Information You Provide Directly
- Contact Information: Name and email address. This is required strictly to deliver the specific training manuals and safety strategies requested.
- Consultation Details: Information shared during one-on-one consultations, group classes, and seminars.
- Personal Experiences: Past experiences, security concerns, or personal situations shared for training purposes.
2. Utilization of Data
We utilize information solely to:
- Respond to inquiries and provide requested services.
- Deliver personal safety consultations and educational content.
- Comply with legal obligations if required.
We do NOT utilize information to:
- Send unsolicited marketing emails.
- Create profiles for third-party advertising.
- Share data with third-party marketers.
3. Third-Party Integration
We utilize specific trusted third-party providers to maintain operational integrity.
- AWeber: Our email service provider. They store contact details under strict privacy agreements and cannot utilize information for their own purposes.
- Analytics: Tools used to understand website usage. This data is anonymized and cannot identify individuals personally.
4. Security Protocols
Given the nature of personal safety consulting, we implement elevated protections for sensitive information.
We treat consultation notes with the same rigorous confidentiality as a therapist or attorney. Vulnerabilities are safe here. We utilize encryption standards that meet or exceed industry benchmarks for private security firms.
5. Rights and Data Retention
Control remains with the user. Requests to view, correct, or delete information are honored immediately, subject to legal retention requirements. Information is retained only as long as necessary for professional standards and ongoing safety.
6. Contact Protocols
Direct Access: Reach Sensei Duncan regarding privacy or safety concerns.
The Other Way Martial Consulting
Arkansas, USA