Blogify LogoModelsThatMatter

Privacy Policy

Last updated July 22 2025This Privacy Notice for ModelsThatMatter Blog ("we," "us," or "our"), describes how and why we might access, collect, store, use, and/or share ("process") your personal information when you use our services ("Services"), including when you:Visit our website at https://modelsthatmatter.com/ or any website of ours that links to this Privacy NoticeUse ModelsThatMatter. ModelsThatMatter is an educational blog platform that explores mental models, decision-making frameworks, and cognitive biases to help individuals and leaders think more clearly, make smarter choices, and avoid common reasoning traps. The content is designed to be accessible, research-backed, and practical for professionals, students, and lifelong learners.Engage with us in other related ways, including any sales, marketing, or eventsQuestions or concerns? Reading this Privacy Notice will help you understand your privacy rights and choices. We are responsible for making decisions about how your personal information is processed. If you do not agree with our policies and practices, please do not use our Services. If you still have any questions or concerns, please contact us at psushilkumar@gmail.com.SUMMARY OF KEY POINTSThis summary provides key points from our Privacy Notice, but you can find out more details about any of these topics by clicking the link following each key point or by using our table of contents below to find the section you are looking for.What personal information do we process? When you visit, use, or navigate our Services, we may process personal information depending on how you interact with us and the Services, the choices you make, and the products and features you use. Learn more about personal information you disclose to us.Do we process any sensitive personal information? Some of the information may be considered "special" or "sensitive" in certain jurisdictions, for example your racial or ethnic origins, sexual orientation, and religious beliefs. We do not process sensitive personal information.Do we collect any information from third parties? We do not collect any information from third parties.How do we process your information? We process your information to provide, improve, and administer our Services, communicate with you, for security and fraud prevention, and to comply with law. We may also process your information for other purposes with your consent. We process your information only when we have a valid legal reason to do so. Learn more about how we process your information.In what situations and with which parties do we share personal information? We may share information in specific situations and with specific third parties. Learn more about when and with whom we share your personal information.How do we keep your information safe? We have adequate organizational and technical processes and procedures in place to protect your personal information. However, no electronic transmission over the internet or information storage technology can be guaranteed to be 100% secure, so we cannot promise or guarantee that hackers, cybercriminals, or other unauthorized third parties will not be able to defeat our security and improperly collect, access, steal, or modify your information. Learn more about how we keep your information safe.What are your rights? Depending on where you are located geographically, the applicable privacy law may mean you have certain rights regarding your personal information. Learn more about your privacy rights.How do you exercise your rights? The easiest way to exercise your rights is by submitting a data subject access request, or by contacting us. We will consider and act upon any request in accordance with applicable data protection laws.Want to learn more about what we do with any information we collect? Review the Privacy Notice in full.TABLE OF CONTENTS1. WHAT INFORMATION DO WE COLLECT?2. HOW DO WE PROCESS YOUR INFORMATION?3. WHAT LEGAL BASES DO WE RELY ON TO PROCESS YOUR PERSONAL INFORMATION?4. WHEN AND WITH WHOM DO WE SHARE YOUR PERSONAL INFORMATION?5. WHAT IS OUR STANCE ON THIRD-PARTY WEBSITES?6. DO WE USE COOKIES AND OTHER TRACKING TECHNOLOGIES?7. HOW LONG DO WE KEEP YOUR INFORMATION?8. HOW DO WE KEEP YOUR INFORMATION SAFE?9. DO WE COLLECT INFORMATION FROM MINORS?10. WHAT ARE YOUR PRIVACY RIGHTS?11. CONTROLS FOR DO-NOT-TRACK FEATURES12. DO UNITED STATES RESIDENTS HAVE SPECIFIC PRIVACY RIGHTS?13. DO OTHER REGIONS HAVE SPECIFIC PRIVACY RIGHTS?14. DO WE MAKE UPDATES TO THIS NOTICE?15. HOW CAN YOU CONTACT US ABOUT THIS NOTICE?16. HOW CAN YOU REVIEW, UPDATE, OR DELETE THE DATA WE COLLECT FROM YOU?1. WHAT INFORMATION DO WE COLLECT?Personal information you disclose to usIn Short: We collect personal information that you provide to us.We collect personal information that you voluntarily provide to us when you express an interest in obtaining information about us or our products and Services, when you participate in activities on the Services, or otherwise when you contact us.Personal Information Provided by You. The personal information that we collect depends on the context of your interactions with us and the Services, the choices you make, and the products and features you use. The personal information we collect may include the following:namesemail addressesmailing addressesSensitive Information. We do not process sensitive information.All personal information that you provide to us must be true, complete, and accurate, and you must notify us of any changes to such personal information.Information automatically collectedIn Short: Some information — such as your Internet Protocol (IP) address and/or browser and device characteristics — is collected automatically when you visit our Services.We automatically collect certain information when you visit, use, or navigate the Services. This information does not reveal your specific identity (like your name or contact information) but may include device and usage information, such as your IP address, browser and device characteristics, operating system, language preferences, referring URLs, device name, country, location, information about how and when you use our Services, and other technical information. This information is primarily needed to maintain the security and operation of our Services, and for our internal analytics and reporting purposes.The information we collect includes:Log and Usage Data. Log and usage data is service-related, diagnostic, usage, and performance information our servers automatically collect when you access or use our Services and which we record in log files. Depending on how you interact with us, this log data may include your IP address, device information, browser type, and settings and information about your activity in the Services (such as the date/time stamps associated with your usage, pages and files viewed, searches, and other actions you take such as which features you use), device event information (such as system activity, error reports (sometimes called "crash dumps"), and hardware settings).Device Data. We collect device data such as information about your computer, phone, tablet, or other device you use to access the Services. Depending on the device used, this device data may include information such as your IP address (or proxy server), device and application identification numbers, location, browser type, hardware model, Internet service provider and/or mobile carrier, operating system, and system configuration information.Location Data. We collect location data such as information about your device's location, which can be either precise or imprecise. How much information we collect depends on the type and settings of the device you use to access the Services. For example, we may use GPS and other technologies to collect geolocation data that tells us your current location (based on your IP address). You can opt out of allowing us to collect this information either by refusing access to the information or by disabling your Location setting on your device. However, if you choose to opt out, you may not be able to use certain aspects of the Services.2. HOW DO WE PROCESS YOUR INFORMATION?In Short: We process your information to provide, improve, and administer our Services, communicate with you, for security and fraud prevention, and to comply with law. We process the personal information for the following purposes listed below. We may also process your information for other purposes only with your prior explicit consent.We process your personal information for a variety of reasons, depending on how you interact with our Services, including:To save or protect an individual's vital interest. We may process your information when necessary to save or protect an individual’s vital interest, such as to prevent harm.3. WHAT LEGAL BASES DO WE RELY ON TO PROCESS YOUR INFORMATION?In Short: We only process your personal information when we believe it is necessary and we have a valid legal reason (i.e., legal basis) to do so under applicable law, like with your consent, to comply with laws, to provide you with services to enter into or fulfill our contractual obligations, to protect your rights, or to fulfill our legitimate business interests.If you are located in the EU or UK, this section applies to you.The General Data Protection Regulation (GDPR) and UK GDPR require us to explain the valid legal bases we rely on in order to process your personal information. As such, we may rely on the following legal bases to process your personal information:Consent. We may process your information if you have given us permission (i.e., consent) to use your personal information for a specific purpose. You can withdraw your consent at any time. Learn more about withdrawing your consent.Legal Obligations. We may process your information where we believe it is necessary for compliance with our legal obligations, such as to cooperate with a law enforcement body or regulatory agency, exercise or defend our legal rights, or disclose your information as evidence in litigation in which we are involved.Vital Interests. We may process your information where we believe it is necessary to protect your vital interests or the vital interests of a third party, such as situations involving potential threats to the safety of any person.If you are located in Canada, this section applies to you.We may process your information if you have given us specific permission (i.e., express consent) to use your personal information for a specific purpose, or in situations where your permission can be inferred (i.e., implied consent). You can withdraw your consent at any time.In some exceptional cases, we may be legally permitted under applicable law to process your information without your consent, including, for example:If collection is clearly in the interests of an individual and consent cannot be obtained in a timely wayFor investigations and fraud detection and preventionFor business transactions provided certain conditions are metIf it is contained in a witness statement and the collection is necessary to assess, process, or settle an insurance claimFor identifying injured, ill, or deceased persons and communicating with next of kinIf we have reasonable grounds to believe an individual has been, is, or may be victim of financial abuseIf it is reasonable to expect collection and use with consent would compromise the availability or the accuracy of the information and the collection is reasonable for purposes related to investigating a breach of an agreement or a contravention of the laws of Canada or a provinceIf disclosure is required to comply with a subpoena, warrant, court order, or rules of the court relating to the production of recordsIf it was produced by an individual in the course of their employment, business, or profession and the collection is consistent with the purposes for which the information was producedIf the collection is solely for journalistic, artistic, or literary purposesIf the information is publicly available and is specified by the regulationsWe may disclose de-identified information for approved research or statistics projects, subject to ethics oversight and confidentiality commitments4. WHEN AND WITH WHOM DO WE SHARE YOUR PERSONAL INFORMATION?In Short: We may share information in specific situations described in this section and/or with the following third parties.We may need to share your personal information in the following situations:Business Transfers. We may share or transfer your information in connection with, or during negotiations of, any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company.5. WHAT IS OUR STANCE ON THIRD-PARTY WEBSITES?In Short: We are not responsible for the safety of any information that you share with third parties that we may link to or who advertise on our Services, but are not affiliated with, our Services.The Services may link to third-party websites, online services, or mobile applications and/or contain advertisements from third parties that are not affiliated with us and which may link to other websites, services, or applications. Accordingly, we do not make any guarantee regarding any such third parties, and we will not be liable for any loss or damage caused by the use of such third-party websites, services, or applications. The inclusion of a link towards a third-party website, service, or application does not imply an endorsement by us. We cannot guarantee the safety and privacy of data you provide to any third-party websites. Any data collected by third parties is not covered by this Privacy Notice. We are not responsible for the content or privacy and security practices and policies of any third parties, including other websites, services, or applications that may be linked to or from the Services. You should review the policies of such third parties and contact them directly to respond to your questions.6. DO WE USE COOKIES AND OTHER TRACKING TECHNOLOGIES?In Short: We may use cookies and other tracking technologies to collect and store your information.We may use cookies and similar tracking technologies (like web beacons and pixels) to gather information when you interact with our Services. Some online tracking technologies help us maintain the security of our Services, prevent crashes, fix bugs, save your preferences, and assist with basic site functions.We also permit third parties and service providers to use online tracking technologies on our Services for analytics and advertising, including to help manage and display advertisements, to tailor advertisements to your interests, or to send abandoned shopping cart reminders (depending on your communication preferences). The third parties and service providers use their technology to provide advertising about products and services tailored to your interests which may appear either on our Services or on other websites.To the extent these online tracking technologies are deemed to be a "sale"/"sharing" (which includes targeted advertising, as defined under the applicable laws) under applicable US state laws, you can opt out of these online tracking technologies by submitting a request as described below under section "DO UNITED STATES RESIDENTS HAVE SPECIFIC PRIVACY RIGHTS?"Specific information about how we use such technologies and how you can refuse certain cookies is set out in our Cookie Notice.Google AnalyticsWe may share your information with Google Analytics to track and analyze the use of the Services. To opt out of being tracked by Google Analytics across the Services, visit https://tools.google.com/dlpage/gaoptout. For more information on the privacy practices of Google, please visit the Google Privacy & Terms page.7. HOW LONG DO WE KEEP YOUR INFORMATION?In Short: We keep your information for as long as necessary to fulfill the purposes outlined in this Privacy Notice unless otherwise required by law.We will only keep your personal information for as long as it is necessary for the purposes set out in this Privacy Notice, unless a longer retention period is required or permitted by law (such as tax, accounting, or other legal requirements).When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize such information, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible.8. HOW DO WE KEEP YOUR INFORMATION SAFE?In Short: We aim to protect your personal information through a system of organizational and technical security measures.We have implemented appropriate and reasonable technical and organizational security measures designed to protect the security of any personal information we process. However, despite our safeguards and efforts to secure your information, no electronic transmission over the Internet or information storage technology can be guaranteed to be 100% secure, so we cannot promise or guarantee that hackers, cybercriminals, or other unauthorized third parties will not be able to defeat our security and improperly collect, access, steal, or modify your information. Although we will do our best to protect your personal information, transmission of personal information to and from our Services is at your own risk. You should only access the Services within a secure environment.9. DO WE COLLECT INFORMATION FROM MINORS?In Short: We do not knowingly collect data from or market to children under 18 years of age or the equivalent age as specified by law in your jurisdiction.We do not knowingly collect, solicit data from, or market to children under 18 years of age or the equivalent age as specified by law in your jurisdiction, nor do we knowingly sell such personal information. By using the Services, you represent that you are at least 18 or the equivalent age as specified by law in your jurisdiction or that you are the parent or guardian of such a minor and consent to such minor dependent’s use of the Services. If we learn that personal information from users less than 18 years of age or the equivalent age as specified by law in your jurisdiction has been collected, we will deactivate the account and take reasonable measures to promptly delete such data from our records. If you become aware of any data we may have collected from children under age 18 or the equivalent age as specified by law in your jurisdiction, please contact us at psushilkumar@gmail.com.10. WHAT ARE YOUR PRIVACY RIGHTS?In Short: Depending on your state of residence in the US or in some regions, such as the European Economic Area (EEA), United Kingdom (UK), Switzerland, and Canada, you have rights that allow you greater access to and control over your personal information. You may review, change, or terminate your account at any time, depending on your country, province, or state of residence.In some regions (like the EEA, UK, Switzerland, and Canada), you have certain rights under applicable data protection laws. These may include the right (i) to request access and obtain a copy of your personal information, (ii) to request rectification or erasure; (iii) to restrict the processing of your personal information; (iv) if applicable, to data portability; and (v) not to be subject to automated decision-making. If a decision that produces legal or similarly significant effects is made solely by automated means, we will inform you, explain the main factors, and offer a simple way to request human review. In certain circumstances, you may also have the right to object to the processing of your personal information. You can make such a request by contacting us by using the contact details provided in the section "HOW CAN YOU CONTACT US ABOUT THIS NOTICE?" below.We will consider and act upon any request in accordance with applicable data protection laws. If you are located in the EEA or UK and you believe we are unlawfully processing your personal information, you also have the right to complain to your Member State data protection authority or UK data protection authority.If you are located in Switzerland, you may contact the Federal Data Protection and Information Commissioner.Withdrawing your consent: If we are relying on your consent to process your personal information, which may be express and/or implied consent depending on the applicable law, you have the right to withdraw your consent at any time. You can withdraw your consent at any time by contacting us by using the contact details provided in the section "HOW CAN YOU CONTACT US ABOUT THIS NOTICE?" below.However, please note that this will not affect the lawfulness of the processing before its withdrawal nor, when applicable law allows, will it affect the processing of your personal information conducted in reliance on lawful processing grounds other than consent.Opting out of marketing and promotional communications: You can unsubscribe from our marketing and promotional communications at any time by clicking on the unsubscribe link in the emails that we send, replying "STOP" or "UNSUBSCRIBE" to the SMS messages that we send, or by contacting us using the details provided in the section "HOW CAN YOU CONTACT US ABOUT THIS NOTICE?" below. You will then be removed from the marketing lists. However, we may still communicate with you — for example, to send you service-related messages that are necessary for the administration and use of your account, to respond to service requests, or for other non-marketing purposes.If you have questions or comments about your privacy rights, you may email us at psushilkumar@gmail.com.11. CONTROLS FOR DO-NOT-TRACK FEATURESMost web browsers and some mobile operating systems and mobile applications include a Do-Not-Track ("DNT") feature or setting you can activate to signal your privacy preference not to have data about your online browsing activities monitored and collected. At this stage, no uniform technology standard for recognizing and implementing DNT signals has been finalized. As such, we do not currently respond to DNT browser signals or any other mechanism that automatically communicates your choice not to be tracked online. If a standard for online tracking is adopted that we must follow in the future, we will inform you about that practice in a revised version of this Privacy Notice.California law requires us to let you know how we respond to web browser DNT signals. Because there currently is not an industry or legal standard for recognizing or honoring DNT signals, we do not respond to them at this time.12. DO UNITED STATES RESIDENTS HAVE SPECIFIC PRIVACY RIGHTS?In Short: If you are a resident of California, Colorado, Connecticut, Delaware, Florida, Indiana, Iowa, Kentucky, Maryland, Minnesota, Montana, Nebraska, New Hampshire, New Jersey, Oregon, Rhode Island, Tennessee, Texas, Utah, or Virginia, you may have the right to request access to and receive details about the personal information we maintain about you and how we have processed it, correct inaccuracies, get a copy of, or delete your personal information. You may also have the right to withdraw your consent to our processing of your personal information. These rights may be limited in some circumstances by applicable law. More information is provided below.Categories of Personal Information We CollectThe table below shows the categories of personal information we have collected in the past twelve (12) months. The table includes illustrative examples of each category and does not reflect the personal information we collect from you. For a comprehensive inventory of all personal information we process, please refer to the section "WHAT INFORMATION DO WE COLLECT?"CategoryExamplesCollectedA. IdentifiersContact details, such as real name, alias, postal address, telephone or mobile contact number, unique personal identifier, online identifier, Internet Protocol address, email address, and account nameNOB. Personal information as defined in the California Customer Records statuteName, contact information, education, employment, employment history, and financial informationNOC. Protected classification characteristics under state or federal lawGender, age, date of birth, race and ethnicity, national origin, marital status, and other demographic dataNOD. Commercial informationTransaction information, purchase history, financial details, and payment informationNOE. Biometric informationFingerprints and voiceprintsNOF. Internet or other similar network activityBrowsing history, search history, online behavior, interest data, and interactions with our and other websites, applications, systems, and advertisementsNOG. Geolocation dataDevice locationNOH. Audio, electronic, sensory, or similar informationImages and audio, video or call recordings created in connection with our business activitiesNOI. Professional or employment-related informationBusiness contact details in order to provide you our Services at a business level or job title, work history, and professional qualifications if you apply for a job with usNOJ. Education InformationStudent records and directory informationNOK. Inferences drawn from collected personal informationInferences drawn from any of the collected personal information listed above to create a profile or summary about, for example, an individual’s preferences and characteristicsNOL. Sensitive personal InformationNOWe may also collect other personal information outside of these categories through instances where you interact with us in person, online, or by phone or mail in the context of:Receiving help through our customer support channels;Participation in customer surveys or contests; andFacilitation in the delivery of our Services and to respond to your inquiries.Sources of Personal InformationLearn more about the sources of personal information we collect in "WHAT INFORMATION DO WE COLLECT?"How We Use and Share Personal InformationLearn more about how we use your personal information in the section, "HOW DO WE PROCESS YOUR INFORMATION?"Will your information be shared with anyone else?We may disclose your personal information with our service providers pursuant to a written contract between us and each service provider. Learn more about how we disclose personal information to in the section, "WHEN AND WITH WHOM DO WE SHARE YOUR PERSONAL INFORMATION?"We may use your personal information for our own business purposes, such as for undertaking internal research for technological development and demonstration. This is not considered to be "selling" of your personal information.We have not disclosed, sold, or shared any personal information to third parties for a business or commercial purpose in the preceding twelve (12) months. We will not sell or share personal information in the future belonging to website visitors, users, and other consumers.Your RightsYou have rights under certain US state data protection laws. However, these rights are not absolute, and in certain cases, we may decline your request as permitted by law. These rights include:Right to know whether or not we are processing your personal dataRight to access your personal dataRight to correct inaccuracies in your personal dataRight to request the deletion of your personal dataRight to obtain a copy of the personal data you previously shared with usRight to non-discrimination for exercising your rightsRight to opt out of the processing of your personal data if it is used for targeted advertising (or sharing as defined under California’s privacy law), the sale of personal data, or profiling in furtherance of decisions that produce legal or similarly significant effects ("profiling")Depending upon the state where you live, you may also have the following rights:Right to access the categories of personal data being processed (as permitted by applicable law, including the privacy law in Minnesota)Right to obtain a list of the categories of third parties to which we have disclosed personal data (as permitted by applicable law, including the privacy law in California, Delaware, and Maryland)Right to obtain a list of specific third parties to which we have disclosed personal data (as permitted by applicable law, including the privacy law in Minnesota and Oregon)Right to review, understand, question, and correct how personal data has been profiled (as permitted by applicable law, including the privacy law in Minnesota)Right to limit use and disclosure of sensitive personal data (as permitted by applicable law, including the privacy law in California)Right to opt out of the collection of sensitive data and personal data collected through the operation of a voice or facial recognition feature (as permitted by applicable law, including the privacy law in Florida)How to Exercise Your RightsTo exercise these rights, you can contact us by submitting a data subject access request, by emailing us at psushilkumar@gmail.com, or by referring to the contact details at the bottom of this document.Under certain US state data protection laws, you can designate an authorized agent to make a request on your behalf. We may deny a request from an authorized agent that does not submit proof that they have been validly authorized to act on your behalf in accordance with applicable laws.Request VerificationUpon receiving your request, we will need to verify your identity to determine you are the same person about whom we have the information in our system. We will only use personal information provided in your request to verify your identity or authority to make the request. However, if we cannot verify your identity from the information already maintained by us, we may request that you provide additional information for the purposes of verifying your identity and for security or fraud-prevention purposes.If you submit the request through an authorized agent, we may need to collect additional information to verify your identity before processing your request and the agent will need to provide a written and signed permission from you to submit such request on your behalf.AppealsUnder certain US state data protection laws, if we decline to take action regarding your request, you may appeal our decision by emailing us at psushilkumar@gmail.com. We will inform you in writing of any action taken or not taken in response to the appeal, including a written explanation of the reasons for the decisions. If your appeal is denied, you may submit a complaint to your state attorney general.California "Shine The Light" LawCalifornia Civil Code Section 1798.83, also known as the "Shine The Light" law, permits our users who are California residents to request and obtain from us, once a year and free of charge, information about categories of personal information (if any) we disclosed to third parties for direct marketing purposes and the names and addresses of all third parties with which we shared personal information in the immediately preceding calendar year. If you are a California resident and would like to make such a request, please submit your request in writing to us by using the contact details provided in the section "HOW CAN YOU CONTACT US ABOUT THIS NOTICE?"13. DO OTHER REGIONS HAVE SPECIFIC PRIVACY RIGHTS?In Short: You may have additional rights based on the country you reside in.Australia and New ZealandWe collect and process your personal information under the obligations and conditions set by Australia's Privacy Act 1988 and New Zealand's Privacy Act 2020 (Privacy Act).This Privacy Notice satisfies the notice requirements defined in both Privacy Acts, in particular: what personal information we collect from you, from which sources, for which purposes, and other recipients of your personal information.If you do not wish to provide the personal information necessary to fulfill their applicable purpose, it may affect our ability to provide our services, in particular:offer you the products or services that you wantrespond to or help with your requestsAt any time, you have the right to request access to or correction of your personal information. You can make such a request by contacting us by using the contact details provided in the section "HOW CAN YOU REVIEW, UPDATE, OR DELETE THE DATA WE COLLECT FROM YOU?"If you believe we are unlawfully processing your personal information, you have the right to submit a complaint about a breach of the Australian Privacy Principles to the Office of the Australian Information Commissioner and a breach of New Zealand's Privacy Principles to the Office of New Zealand Privacy Commissioner.Republic of South AfricaAt any time, you have the right to request access to or correction of your personal information. You can make such a request by contacting us by using the contact details provided in the section "HOW CAN YOU REVIEW, UPDATE, OR DELETE THE DATA WE COLLECT FROM YOU?"If you are unsatisfied with the manner in which we address any complaint with regard to our processing of personal information, you can contact the office of the regulator, the details of which are:The Information Regulator (South Africa)General enquiries: enquiries@inforegulator.org.zaComplaints (complete POPIA/PAIA form 5): PAIAComplaints@inforegulator.org.za & POPIAComplaints@inforegulator.org.za14. DO WE MAKE UPDATES TO THIS NOTICE?In Short: Yes, we will update this notice as necessary to stay compliant with relevant laws.We may update this Privacy Notice from time to time. The updated version will be indicated by an updated "Revised" date at the top of this Privacy Notice. If we make material changes to this Privacy Notice, we may notify you either by prominently posting a notice of such changes or by directly sending you a notification. We encourage you to review this Privacy Notice frequently to be informed of how we are protecting your information.15. HOW CAN YOU CONTACT US ABOUT THIS NOTICE?If you have questions or comments about this notice, you may email us at psushilkumar@gmail.com or contact us by post at:ModelsThatMatter BlogWaslRas Al KhorDubai 00000United Arab Emirates16. HOW CAN YOU REVIEW, UPDATE, OR DELETE THE DATA WE COLLECT FROM YOU?Based on the applicable laws of your country or state of residence in the US, you may have the right to request access to the personal information we collect from you, details about how we have processed it, correct inaccuracies, or delete your personal information. You may also have the right to withdraw your consent to our processing of your personal information. These rights may be limited in some circumstances by applicable law. To request to review, update, or delete your personal information, please fill out and submit a data subject access request.

SK

Sushil Kumar

Jul 21, 2025 27 Minutes Read

Privacy Policy Cover
MTM2 - Survivorship Bias: The Danger You Don't See Cover

Jul 21, 2025

MTM2 - Survivorship Bias: The Danger You Don't See

I’ll be honest—there was a phase when I was hooked on every business bestseller out there. I thought if I could just crack the code behind the “secrets of unicorn founders,” I’d find my breakthrough. Then one day, I saw this old black-and-white photo of a WWII bomber, full of bullet holes—and it completely changed how I think. That’s when I stumbled onto survivorship bias. It makes us focus on the winners while ignoring everything (and everyone) that didn’t make it. And that’s where some of the most valuable lessons are hiding. So, ready to dig a little deeper? Let’s explore what success stories don’t always tell you.What Survivorship Bias Actually Is (And Where You Didn’t Know It Lurks)Survivorship bias is one of those invisible forces that shape your decisions, often without you realizing it. At its core, it’s the tendency to focus on the people or things that made it past a certain selection process—while ignoring those that didn’t. This can lead you to draw conclusions that are overly optimistic or simply inaccurate, because you’re only seeing part of the picture.Think of it this way: if you only study the winners, you’ll miss the lessons buried in the stories of those who failed. Research shows that this bias is a type of sample selection bias, where the “sample” you’re analyzing is incomplete. The missing data—sometimes called “silent evidence”—is just as important as what’s visible.Abraham Wald and the WWII Bomber PlanesOne of the most famous examples comes from World War II. Statisticians were asked to figure out how to reinforce bomber planes so more would return from missions. The military brought in Abraham Wald, who noticed something everyone else missed. The planes that came back were riddled with bullet holes in certain spots. The obvious answer seemed to be: reinforce those areas.But Wald realized the real danger lay in the places that weren’t damaged on the returning planes. His insight? The planes that didn’t come back were probably hit in those very spots. So, he recommended reinforcing the undamaged areas, not the bullet-riddled ones. This story is a classic illustration of survivorship bias—focusing on survivors while ignoring the silent evidence of those that didn’t survive.Where Survivorship Bias Hides in Everyday LifeYou might think this is just a historical curiosity, but survivorship bias is everywhere. Take the world of business advice. You’ll often read about college dropout billionaires—think Steve Jobs or Mark Zuckerberg. The message seems clear: dropping out is a path to success. But what about the thousands who dropped out and didn’t make it? Their stories rarely make headlines or motivational speeches.The same goes for mutual fund advertisements. Studies indicate that financial firms often highlight only the funds that performed well, quietly omitting those that closed due to poor performance. This creates a misleading picture of how easy it is to “beat the market.” If you’re not careful, you might believe that success is more common than it really is.A Personal Twist: Lessons That Don’t Get ToldLet’s bring this closer to home. A friend of mine once tried to launch a home bakery. She poured her heart into it, but after a year, she had to close shop. Her story—full of lessons about cash flow, marketing missteps, and burnout—never made it into the glossy food blogs that celebrate overnight success. The reality is, for every bakery that makes it, there are dozens that quietly disappear. Their lessons are just as valuable, if not more so.Best Practices and OutliersEven in leadership, you’ll find survivorship bias lurking. Many organizations copy “best practices” from outliers—companies that succeeded against the odds. But these practices might not be the reason for their success, or they might not work in a different context. Without considering the failures, you risk chasing after strategies that only worked for a lucky few.Hospitals adopting digital transformation often emulate pioneers like Mayo Clinic. But without studying the failed tech implementations in smaller systems, they risk repeating costly integration mistakes.The Leadership Trap: Why Chasing Winners BackfiresIt’s almost irresistible: you see a company like Apple dominating the market, and your first instinct is to study their every move. You want to know what they’re doing right, hoping you can replicate that success in your own organization. This is the classic benchmarking temptation—comparing yourself only to the winners. But here’s the trap: by focusing solely on thriving competitors, you’re only seeing part of the picture. The failures, the companies that tried and fell short, are left out of the story. And that’s where survivorship bias quietly creeps in.Research shows that survivorship bias is a cognitive shortcut where we pay attention only to those who made it through, ignoring the silent evidence of those who didn’t. In business, this means you might copy Apple’s product launches, but overlook the dozens of failed smartphone makers who followed similar strategies and vanished without a trace. As a leader, this selective vision can be dangerous. You end up with a skewed sense of what works, and your decisions are shaped by incomplete data.Another common leadership mistake is ignoring the experiences of people who’ve left your organization—or why your competitors folded. When you only listen to current employees or analyze surviving companies, you miss out on critical lessons. Departed team members often hold valuable insights about what went wrong, what was missing, or why they felt compelled to leave. Similarly, understanding why a competitor failed can be far more instructive than simply copying the playbook of a winner.Imagine you become captivated by a hot SaaS company’s growth story—slick marketing, rapid scaling, a charismatic founder. You decide to mimic their approach, pushing your team to adopt the same tactics. But did you ever pause to ask: how many other startups tried this and failed? What hidden pitfalls did the headlines gloss over? Within months, your team is burned out, results are flat, and morale is slipping. You’ve fallen for the illusion of easy success, never seeing the failures that should have guided your caution.The major risk here is clear: when you make decisions with incomplete data, you almost always overestimate your odds of success and underestimate the risks involved. Studies indicate that this kind of bias can lead to overconfident strategies, wasted resources, and missed warning signs. As Abraham Wald famously demonstrated during WWII, the damage you don’t see—the silent evidence—matters just as much, if not more, than what’s visible. Ignoring the full spectrum of outcomes means you’re flying blind, even if you think you’re following a proven path.So, the next time you’re tempted to chase the winners, pause and ask: what am I not seeing? Who failed, and why? What stories aren’t being told? The answers might not be as glamorous, but they’re often the ones that will keep you—and your team—out of the leadership trap.Escaping the Trap: How to Hunt for 'Silent Evidence'Survivorship bias is a subtle but powerful force that can distort your judgment as a leader. It’s easy to focus on the winners—the companies that made it, the strategies that worked, the leaders who succeeded. But what about the silent evidence? The failures, the flops, the stories that never made headlines? If you want to avoid costly mistakes, you need to actively seek out what’s missing from the picture.Step 1: Ask, “What am I not seeing?”Before you make any major decision, pause and ask yourself: Who failed following the advice I’m about to take? This simple question can be a game-changer. Research shows that ignoring failed cases leads to overly optimistic conclusions and poor risk assessment. In business, for example, you might read about a startup that grew rapidly after adopting a certain marketing strategy. But how many others tried the same approach and quietly disappeared? If you don’t ask, you’ll never know—and you’ll be walking blind into the same traps.Seek Out Failure StoriesTo balance your outlook, make it a habit to look for post-mortems, exit interviews, and industry failure stories. These are goldmines of insight. Studies indicate that post-mortems reveal hidden pitfalls and systemic issues that success stories gloss over. Exit interviews, too, can uncover patterns of missteps that aren’t obvious from the outside. By collecting these stories, you build a more realistic understanding of what works—and what doesn’t.Read case studies about failed startups, not just unicorns.Attend talks or panels focused on lessons learned from failure.Encourage your team to share mistakes openly, without fear of blame.Imagine a “Most Instructive Flop” AwardPicture this: What if every industry had an award for the Most Instructive Flop? Instead of just celebrating success, we’d honor the teams and leaders who learned the most from failure. What would we learn from these stories? Probably more than from the usual highlight reels. As Abraham Wald’s WWII research famously showed, sometimes the most important lessons come from the holes in the data—the planes that didn’t return, the businesses that didn’t survive.Failure isn’t the opposite of success—it’s part of the dataset. Until we normalize sharing flops, we’ll keep building strategies on incomplete maps.Adopt a Survivorship Bias Mental ModelFinally, use survivorship bias awareness as a regular check, especially before adopting new strategies or buying into “best practices.” Ask yourself:Are these results based only on survivors?What silent evidence might I be missing?How can I find data on those who didn’t succeed?Research suggests that leaders who regularly challenge their assumptions with these questions make more balanced, resilient decisions. It’s not about being pessimistic—it’s about being realistic. By hunting for silent evidence, you protect yourself and your organization from the hidden dangers that come from only seeing one side of the story.Smart leaders and analysts account for survivorship bias by using tools like stratified sampling, reverse case studies, and failure-inclusive dashboards that capture both successes and silent failures. Techniques like red teaming and devil’s advocacy ensure your assumptions are challenged before decisions are locked in. It’s not just about having data—it’s about asking if your data tells the whole story.ConclusionSuccess stories are inspiring — but they're only half the truth. If you want to lead wisely, you need to look beyond the headlines and dig into what didn’t work. Research shows that survivorship bias, the tendency to focus on winners while ignoring the silent failures, can seriously distort your understanding of what drives real success. It’s easy to get swept up in the stories of companies that made it big, the products that soared, or the careers that skyrocketed. But if you only study those, you’re missing the other side of the story — and that’s where the real lessons often hide.So, next time you read a glowing case study or hear about a breakthrough entrepreneur, pause for a moment. Ask yourself: What am I not being told? Who tried and didn’t make it? Why did they fail? This simple shift in mindset can help you avoid the trap of drawing conclusions from incomplete data. As studies indicate, ignoring the failures can lead to overconfidence, risky decisions, and missed warning signs.Whether you’re launching a new product, investing in a promising idea, or mapping out your own career path, let data from both survivors and failures guide your choices. In finance, for example, analysts who only look at funds that survived the last decade end up with a skewed view of performance. The same goes for business strategy — if you only study the companies that are still standing, you’ll overlook the factors that led others to close their doors. As Abraham Wald’s famous WWII analysis of bomber planes showed, sometimes the most important evidence is what you don’t see: the silent failures, the missing data, the stories that never made the news.Use survivorship bias as a mental filter in your everyday thinking. When you’re evaluating options, making plans, or even just reading the latest business bestseller, remind yourself to look for the missing voices. What risks are being glossed over? What challenges did others face that aren’t mentioned? By actively seeking out the lessons from both sides — success and failure — you’ll uncover hidden risks and find smarter, more resilient paths forward.In the end, the unsung failures might just hold the lesson that saves your next big bet. Leadership isn’t about chasing every trend or copying the latest success story. It’s about understanding the full landscape — the wins, the losses, and everything in between. So, as you move ahead, let survivorship bias be a reminder: wisdom comes not just from those who made it, but from those who didn’t. That’s how you build a foundation for smarter leadership and sustainable growth.TL;DR – Key TakeawaysSurvivorship bias hides the failures and highlights only the winners.This leads to distorted benchmarks, flawed strategies, and overconfidence.Great leaders ask, “What am I not seeing?”Seek post-mortems, exit interviews, and failure case studies.Let both success and failure guide your decisions.

11 Minutes Read

MTM1 -Asch Conformity Effect: Why Social Influence Makes Us Doubt Ourselves Cover

Jul 21, 2025

MTM1 -Asch Conformity Effect: Why Social Influence Makes Us Doubt Ourselves

Picture this: It’s your first big meeting at a new job. The team is nodding at an idea you secretly think is terrible. You stay quiet, worrying you’ll look foolish if you speak up. Most of us have been there, and it’s a classic example of Asch Conformity—where our survival instinct to fit in overrides our drive to stand out. Let’s peel back the layers of why we second-guess our inner voice in a room full of nodding heads.Understanding the Asch Conformity Study: Why Smart People Stay SilentHave you ever found yourself nodding along with a group, even when something inside you is screaming, “Wait, that’s not right!”? If so, you’re definitely not alone. Conformity isn’t just a social quirk—it’s something that’s deeply rooted in our wiring. In fact, research shows that the urge to blend in with the crowd has been a matter of survival for humans for thousands of years.Think about it: back in the days when humans lived in small tribes, standing out could be risky. If you challenged the group or broke the rules, you might get kicked out. And being on your own in the wild? That was pretty much a death sentence. So, over time, our brains learned that it’s safer to stick with the group, even if that means going along with things that don’t quite feel right.Fast forward to the 1950s, and this instinct to conform was put to the test in a now-famous series of experiments by psychologist Solomon Asch. The setup was simple, but the results were shocking. Participants were shown a line and then asked to pick which of three comparison lines matched its length. The catch? Everyone else in the room (who were actually in on the experiment) would deliberately give the wrong answer. And here’s the wild part: more than one-third of the real participants went along with the obviously incorrect group answer. Just to fit in. Just to avoid standing out.“The tendency to conform in our society is so strong that reasonably intelligent and well-meaning young people are willing to call white black. This is a matter of concern.” — Solomon AschSo, why do we do this? Psychologists break it down into two main types of social influence:Normative influence: This is all about wanting to be liked and accepted. You go along with the group because you’re afraid of being rejected or looking foolish. It’s that sinking feeling you get when you think, “If I speak up, will everyone think I’m weird?”Informational influence: Sometimes, you genuinely believe the group knows better. Maybe you start to doubt your own judgment. “If everyone else is saying this, maybe I missed something?”Picture this: you're at a group trivia night, and you're sure you know the right answer to a question. But everyone else is confidently choosing something else. You second-guess yourself, go with the group’s answer—and later find out your original choice was actually right. That sting of regret? That’s the Asch effect in real life.It’s wild how powerful the pull to fit in can be, even when it goes against what we know is true. Whether it’s a simple game or a big life decision, the science is clear: our urge to conform runs deep, and it’s shaped by both our evolutionary past and the social pressures we feel every day.Group Pressure and Social Influence in Everyday LifeYou might think of conformity as something that only happens in a psychology experiment, with people nervously picking the wrong answer because everyone else did. But honestly, it’s everywhere. It’s in your office meetings, your group chats, even at your family’s dinner table. It’s sneaky like that. You probably don’t even notice it most of the time—until you catch yourself nodding along, even when you’re not totally convinced.Let’s start with the classic boardroom. Imagine you’re in a meeting, and someone tosses out an idea that you’re not sure about. Maybe it sounds a little off, or you have a better suggestion in mind. But then, one by one, everyone else in the room starts agreeing. Suddenly, you feel this weird pressure—like, if you speak up, you’ll be the odd one out. So you just go with it. Research shows this is exactly what Solomon Asch found in his famous experiments: people will often agree with the group, even when the group is clearly wrong, just to avoid sticking out.It’s not just big decisions, either. Think about those moments in class when the teacher asks a question, and you’re pretty sure you know the answer. But then, someone else says something different, and everyone nods. You start doubting yourself. Maybe they’re right? Maybe you’re missing something? That’s conformity at work—your brain quietly nudging you to fit in, even if it means ignoring what you actually believe.Here’s a wild card analogy for you: groupthink is like a potluck dinner where everyone brings the same dish. Why? Because nobody wants to be the one who stands out with something different. It’s safer to blend in, even if it means ending up with seven bowls of potato salad and nothing else. It’s funny, but also a little sad—how often do we miss out on something great, just because we don’t want to look odd?And then there’s social media. Ever notice how some trends just explode overnight? It’s not always because everyone genuinely loves them. Sometimes, it’s just that nobody wants to be left out. You see a meme or a challenge popping up everywhere, and suddenly you feel like you have to join in too, or risk being the only one who missed the joke. Studies indicate that this kind of online conformity is just a digital twist on the same old story: we crave belonging, so we go along, even if we’re not totally sold.The tricky part is recognizing when it’s happening. Are you agreeing because you really believe it, or just because everyone else seems to? It’s not always easy to tell. But once you start noticing those little nudges—when you hesitate to speak up, or when you hit “like” on something just because everyone else did—you’ll see just how often conformity sneaks into your day-to-day life. It’s not about being weak-willed; it’s just human nature. But knowing it’s there? That’s the first step to doing something about it.How to Break Free from the Asch Effect and GroupthinkLet’s be honest—going along with the crowd is easy. It feels safe. But if you’ve ever sat in a meeting, biting your tongue while everyone nods along to an idea you secretly think is off-base, you know that uneasy feeling. That’s the Asch Conformity Effect in action: the subtle, powerful pull to fit in, even when your gut says otherwise. Research shows that more than a third of people will agree with a group’s wrong answer just to avoid standing out. So, how do you break that spell?Encouraging Dissent: The Role of Leadership in Psychological SafetyHere’s the thing—whether you’re leading a team, supporting a friend, or just trying to be a good partner, your job isn’t to keep everyone in line. It’s to make space for disagreement. That means you have to invite people to speak up, not just tolerate it when they do. If you’re only hearing agreement, you’re probably missing out on the best ideas (and maybe heading for a groupthink disaster).Simple Strategies to Break the Conformity SpellOpenly acknowledge dissent: When someone disagrees, thank them. Say it out loud. “I appreciate you bringing a different perspective.” It sounds simple, but it matters.Reward honest feedback: Don’t just nod—show that you value honesty. Maybe it’s a shout-out in a meeting, or just a private thank you. People notice when you reward courage.Build trust with small risks: Start with low-stakes disagreements. Ask for opinions on something minor, and show you’re open to pushback. Over time, people will feel safer sharing bigger concerns.Real-World Examples of Conformity vs. OpennessWe’ve all heard about the mythical “open-door policy,” but every now and then, you meet a manager who really means it. You know the type—they ask, “What am I missing?” and pause, waiting for someone to speak up. They might even say, “If everyone agrees, we’re probably missing something.” And when you do disagree? They don’t get defensive. They lean in, ask questions, and sometimes even change their mind. That’s psychological safety in action. It’s not about being nice—it’s about being real.Using Devil’s Advocate Roles to Disrupt Conformity to MajorityPicture this: you’re in a meeting, and it’s a rule that everyone has to play devil’s advocate at least once. Suddenly, it’s not weird to question the plan—it’s expected. The pressure to conform drops, and new ideas start to surface. Sure, it might feel awkward at first, but research indicates that environments like this help people break free from the Asch Effect. When disagreement is normalized, you get more honest conversations, smarter decisions, and a team that actually trusts each other.It’s not about being contrarian for the sake of it. It’s about making sure everyone feels safe enough to say, “I see it differently.” That’s how you break the spell of conformity—one honest conversation at a time.Key Takeaways from the Asch Experiment and Choosing When to ConformSo, after diving into the Asch Conformity Effect and seeing just how powerful group pressure can be, you might be left wondering—when should you actually go along with the crowd, and when is it better to stand your ground? It’s not always a simple choice. Sometimes, blending in makes life easier or helps you build connections. Other times, following the group just doesn’t feel right, especially when you know deep down that the majority is wrong.Research shows that people often conform to group norms, even when those norms go against their own judgment. The Asch experiments made this painfully clear. Imagine sitting in a room, knowing the right answer, but everyone else is confidently saying something different. It’s tough not to second-guess yourself. Asch’s studies found that more than a third of participants ended up agreeing with the group’s wrong answer, just to avoid sticking out. That’s a pretty big deal.But here’s the thing: conformity isn’t always a bad thing. Sometimes, it’s a way to keep the peace or show respect for others’ opinions. It can help teams work together smoothly and make social interactions less awkward. Still, there’s a fine line between healthy cooperation and losing your own voice. The real challenge is figuring out where that line is for you.If you’ve ever felt that uncomfortable tug inside—like you’re about to agree with something you know isn’t right—you’re not alone. The Asch Effect reminds us that this is a very human experience. It’s not just about being weak-willed or easily swayed. It’s about the deep need to belong and avoid rejection. But as studies indicate, too much conformity can lead to groupthink, where everyone just goes along without questioning, and that can be risky, especially in workplaces or important decision-making situations.So, what can you do? One approach is to pause and check in with yourself before you go along with the group. Ask: “Am I agreeing because I truly believe this, or just because everyone else does?” Sometimes, it’s worth speaking up, even if it feels uncomfortable. Other times, it’s okay to let small things slide. The key is to be aware of why you’re choosing to conform—or not.Leaders and teams can help, too. Creating an environment where it’s safe to disagree makes a huge difference. When people feel comfortable sharing different ideas, everyone benefits. Asch’s work is a good reminder that we all have the power to shape the groups we’re part of, just by being a little braver and a little more thoughtful.In the end, choosing when to conform is about balance. It’s about knowing yourself, trusting your instincts, and remembering that sometimes, the crowd gets it wrong. And that’s okay. Your voice matters—even if it’s the only one in the room.TL;DR: Social pressure can nudge us into silence or agreement, even when we know better. Understanding Asch Conformity doesn’t mean you’ll always rebel—but it will help you spot those invisible forces so you can choose your response wisely.

11 Minutes Read

About Models That Matter Cover

Jul 21, 2025

About Models That Matter

Welcome to Models That Matter – where thinking better begins.Ever wondered why smart people sometimes make poor decisions? Or why some strategies succeed while others fail despite similar resources?The answer often lies not in what we know, but how we think.At Models That Matter, we explore timeless mental models — the powerful thinking frameworks used by the world’s best decision-makers, innovators, investors, and leaders. These aren’t just concepts for academics or CEOs. They’re practical tools you can use every day — in your career, business, relationships, and personal growth.What Are Mental Models?Mental models are the lenses through which we interpret the world. They help us make sense of complexity, avoid blind spots, and approach problems with clarity and precision. From Inversion Thinking to First Principles, from Second-Order Effects to the 80/20 Rule — these models are shortcuts to sharper insight and wiser action.About MeHi, I’m Sushil Kumar, a lifelong learner, digital strategist, and passionate advocate of clear thinking.After spending over a decade working with leaders across industries — from technology to healthcare — I realized that the most successful people don’t just work harder; they think differently. They consistently apply better mental models to solve problems, seize opportunities, and build systems that work.I started Models That Matter to share those tools with anyone who wants to improve how they think, decide, and lead.Whether you're a student trying to navigate life, a founder scaling your startup, or a manager making critical choices under uncertainty — you’ll find something here to help you think clearer and act smarter.What You'll Find HereWeekly Mental Models explained simplyReal-world examples and applicationsPractical frameworks for decision-making, product strategy, leadership, and personal growthA growing library of models categorized by domain and purpose(Coming soon) Video explainers, cheat sheets, and toolkitsWhat is MTM2?MTM2 stands for Models That Matter - 2nd Model. It’s a curated number that provides an index of powerful mental models—simple thinking tools that help you cut through complexity, make smarter decisions, and lead with clarity. Each model is chosen for its real-world impact, helping you spot hidden biases, challenge assumptions, and navigate life and leadership more effectively.Join the JourneyWant one mental model in your inbox every week?Subscribe to Models That Matter Weekly and never miss a new post.Let’s build a smarter world — one model at a time.

2 Minutes Read