Who we are

Ninja Kwik Lock Co is run and operated by Shad Everett of 6831 Coralberry Lane, Jacksonville, Florida  32244. Ninja Kwik Lock Co, has been operational since 2013. Our website address is: http://ninjakwiklock.com.

What personal data we collect and why we collect it


When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.


If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms


If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracing your interaction with the embedded content if you have an account and are logged in to that website.


Ninja Kwik Lock Co. utilizes a wordpress plug-in known as Google Analytics which helps provide Ninja Kwik Lock Co. with incoming data.

At Google, we are keenly aware of the trust you place in us and our responsibility to keep your privacy and data secure. As part of this responsibility, we let you know what information we collect when you use our products and services, why we collect it, and how we use it to improve your experience. The Google privacy policy & principles describes how we treat personal information when you use Google’s products and services, including Google Analytics.

Who we share your data with

Ninja Kwik Lock Co. does not share your information voluntarily with any third party affiliate.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Your contact information

If you have any further questions please contact Shad at ninja.kwiklocksmith@gmail.com

Additional information

How we protect your data

We utilize spam and virus protection to keep your information and ours safe.

What data breach procedures we have in place

Ninja Kwik Lock Co., defines a personal data breach as “a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data”.

They highlight that “personal data breaches” can include:

  • Access by an unauthorized third party;
  • Deliberate or accidental action (or inaction) by a controller or processor;
  • Sending personal data to an unintended recipient;
  • Lost or stolen computing devices containing personal data;
  • Unauthorized alteration of personal data; and
  • Loss of availability of personal data.

1. Determine what was stolen.

You’ll need to pin down exactly what kind of information was lost in the data breach. Sensitive information falls into three general categories:

Least sensitive: Names and street addresses. Such information was pretty harmless when it was printed in the phone book. Today, a name typed into a search engine can yield data useful to online marketers and nosy neighbors, but probably not enough to cause serious trouble.

More sensitive: Email addresses, dates of birth and payment-card account numbers. (Payment cards include debit cards, credit cards and charge cards like an American Express card.)

A stolen email address may result in increased spam; a stolen credit card will often result in fraudulent charges, but the card holder is generally protected from liability (see below). A date of birth by itself is useless, but when combined with a name, it’s more valuable than an address, because it never changes and is often used to verify identity.

Most sensitive: Social Security numbers or (in Canada) Social Insurance Numbers, online-account passwords, financial-account numbers and payment-card security codes (the three- or four-digit number printed on the front or back of payment cards).

An online-account password, combined with an email address, can be used to hijack online accounts. A card security code lets a thief use a stolen card number for online and telephone shopping. A bank account number lets snoops track your financial history and even move money into (but probably not out of) an account.

2. Change all affected passwords.

If an online account has been compromised, change the password on that account right away. If you used the same password for any other accounts, change those as well, and make up a new, strong password for each and every account.

Don’t reuse the password for a second account. That way, you’ll be limiting the damage next time there’s a data breach, and you won’t have to go through this process again.

If the online company offers two-factor authentication to protect an account, use it. With two-factor authentication, a thief who attempts to log into an online account can’t get in, even with the right password, unless he has a numeric code that the company texts to the legitimate user’s cellphone.

If creating and remembering all those new passwords is difficult, use a password manager to handle it all for you. With a password manager, you’ll need to remember only one password; the software will take care of the rest. The downside is that if the “master password” is compromised, all your accounts will be as well.

3. Contact relevant financial institutions.

If a payment-card number has been stolen, contact the bank or organization that issued the card — immediately. (Most credit cards have toll-free customer-service numbers printed on the back.) Make sure you speak to a live human representative. Explain that your account is at risk of fraud, and ask the card issuer to alert you if it detects suspicious activity on your account. The bank will almost certainly cancel the card and issue you a new one straight away.

Professional credit-card thieves often try to “bust out” stolen card numbers with many purchases in a matter of hours, often on weekends when banks are not fully staffed, before the banks can cut off the card. Nevertheless, in the United States, federal rules limit the customer’s liability for fraud. If you alert the banks or card issuers before any fraudulent transactions take place, you’re covered.

But if fraud does take place before the bank is notified, the rules differ between credit cards and debit cards. For credit cards, the customer can report a card stolen or lost at any time, yet will be on the hook for at most $50 of fraudulent charges. For fraudulent charges on a monthly billing statement, the customer has up to 60 days to dispute the charges, in writing.

Debit cards have much less protection if fraudulent charges are rung up before the bank is notified. To get the $50 limited liability, the customer has only two business days after learning of the fraud to tell the bank. After that, you may be liable for up to $500; if more than 60 days go by and you still haven’t told the bank, you could be on the hook for the whole thing.

4. Contact the credit-reporting bureaus.

Contact the major consumer credit-reporting bureaus and ask each to place a fraud alert on your name. This way, if anyone tries to steal your financial identity — for example, by trying to open a credit-card account in your name — you’ll know. (You’ll also learn when anyone tries to look up your credit.)

In the U.S., fraud alerts, also known as credit alerts, are free and can be renewed every 90 days. Once an alert is requested, the customer will get a free credit report.

U.S. residents can either request a credit alert online or call the bureau directly: Equifax (1-888-766-0008), Experian (1-888-397-3742), Innovis (1-800-540-2505) and TransUnion (1-800-680-7289). Each bureau is required to contact the other three if an individual requests a fraud alert, and consumers need not provide any reason.

What third parties we receive data from

Google Analytics, Bing, Ninja Forms

What automated decision making and/or profiling we do with user data

No automated decision making and/or profiling is used.