- Personal and other information we collect about you;
- How we use your information;
- How we may share your information with third parties; and
- Your choices regarding the personal information we collect about you.
2. Collection of Your Personal and Other Information
When you register for, or use our Services, we collect Personal Information. By “Personal Information” we mean information that can identify or reasonably be linked to an individual, such as:
- Personal or business addresses;
- Email addresses;
- Phone numbers;
- Social Security numbers; and
- Government-issued identification numbers.
Certain aspects of the Services may also access certain features of your mobile device or web browser, including its location services (GPS) and collect information from those features, such as your precise location. You consent to this access.
You may choose not to provide Personal Information or prevent the Services from accessing certain features of your mobile device, (subject to the controls offered by your mobile device’s operating system), but this may prevent you from receiving certain features of the Services.
We also collect non-Personal Information relating to the Services, that is, information that does not personally identify an individual. The non-Personal Information we collect includes how you interact with the Services, information generally collected or “logged” by Internet websites or Internet services when accessed or used by users, and information about your web browser or device accessing or using the Services.
Examples of the non-Personal Information we collect are:
- Your Internet Protocol (IP address);
- Information about your computer or mobile device, such as its maker or operating system version, and HTTP header information;
- The pages of our website that you viewed during a visit;
- What information, content or advertisements you view or interact with using the Services;
- Language preferences;
- The city and state in which you are located (but not your precise geographic location); and
- Unique identifiers that are not connected and cannot reasonably be connected to your identity.
3. Use of Your Information
We may use the information we collect to:
- Contact you about our products or services;
- Assist us in providing, maintaining, and protecting the Services;
- Set up, maintain, and protect accounts to use the Services;
- Improve our products and services;
- Process transactions requested by you;
- Provide customer service to you;
- Communicate with you, such as provide you with account- or transaction—related communications, or other newsletters, RSS feeds, and/or other communications relating to the Services;
- Send or display offers and other content that is customized to your interests or preferences, including your Service activity;
- Perform research and analysis aimed at improving our products and services and developing new products or services; and
- Manage and maintain the systems that provide the Services.
4. Disclosure of Your Information
We may disclose your Personal Information to third parties as described below.
We may disclose Personal Information to provide the Services, or when you authorize or instruct us to do so. We may also disclose Personal Information and non-Personal Information to companies, agents, contractors, service providers, or others engaged to perform functions on our behalf (such as provision of data storage, hosting of our website, marketing of our products and services, conducting audits, sending e-mail newsletters, and performing web analytics). We may license third party software to include in or use with the Services, in which case we may disclose Personal Information and/or Non-Personal Information to the licensor.
We may also disclose your Personal Information to third parties when we believe, in good faith and in our sole discretion, that such disclosure is reasonably necessary to (a) enforce or apply the terms and conditions of the Services, including investigation of potential violations thereof, (b) comply with legal or regulatory requirements or an enforceable governmental request, (c) protect the rights, property or safety of us, our users or other third parties, (d) prevent a crime or protect national security, or (e) detect, prevent or otherwise address fraud, security or technical issues.
Finally, we reserve the right to transfer information (including your Personal Information) to a third party in the event of a sale, merger, or transfer of all or substantially all of the assets of our company relating to the Services, or in the unlikely event of a bankruptcy, liquidation, or receivership of our business. We will use commercially reasonable efforts to notify you of such transfer, for example via email or by posting notice on our website.
Lastly, we may also disclose (including by selling) non-Personal Information, aggregated with information about our other users, to our clients, business partners, merchants, advertisers, investors, potential buyers and other third parties if we deem such disclosure, in our sole discretion, to have sound business reasons or justifications.
5. Cookies and Automatic Information Gathering Technologies
Every time you use the Services (e.g., access a Service webpage, navigate to a specific tool within the Service), we collect non-Personal Information (discussed above in Section 2) regarding that use. For example, to improve our Services, we collect how, when, and which parts of the Services or its features you use, which social media platforms you connect to the Services, and when, how, and what you post to the social media platforms through the Service. Also, we may use your device’s unique identifier (UDID), media access control address (MAC Address), or other unique identifiers (including identifiers we create) to assist us in collecting and analyzing this data.
To assist us in collecting and storing this non-Personal Information, we may employ a variety of technologies, including “Cookies,” local browser storage, and “Web Beacons.” A “Cookie” is a small amount of data a website operator, or a third party whose content is embedded in that website, may store in your web browser and that the website operator or, as applicable, the third party, can access when you visit the website. A Cookie may also refer to web-browser-based storage provided by Adobe’s Flash plugin (a “Flash Cookie”). A “Web Beacon” is a small, usually-transparent image placed on a web page that allows the operator of that image, which may be the operator of the website you visit or a third party, to read or write a Cookie.
More information about managing Cookies is available here. Cookie management tools provided by your browser may not affect Flash Cookies. More information about managing Flash Cookies is available here. To learn how to manage privacy and storage settings for your local browser storage, please refer to the end user documentation for your browser.
To help us collect this information, we use third-party software and services. These third parties’ collection and use of non-Personal Information are subject to their own privacy policies, which you can read here: Google Analytics and Google Tag Manager
6. Transparency and Choice; Do Not Track Signals
You may request access to your Personal Information by sending an email to email@example.com. We will try to locate and provide you with your Personal Information and give you the opportunity to correct this data, if it is inaccurate, or to delete it, at your request. But, in either case, we may need to retain it for legal reasons or for legitimate business purposes. You may also remove any content that you post to the Services using the deletion or removal options within the Service. However, we (and you) are not able to control information that you have already shared with other users or made available to third parties through the Services.
If you need further assistance with removing any content you posted through the Services, you can email us at firstname.lastname@example.org. Removal of your posted content may not ensure complete or comprehensive removal from our computer systems.
We ask individual users to identify themselves and the information requested to be accessed, corrected, or removed before processing such requests, and we may decline to process requests that are unreasonably repetitive or systematic, require disproportionate technical effort, jeopardize the privacy of others, would be extremely impractical (for instance, requests concerning information residing on backups), or relate to information that is not associated with your Personal Information. In any case, where we provide information access and correction, we perform this service free of charge, except if doing so would require a disproportionate effort.
Please be aware that if you request us to delete your Personal Information, you may not be able to continue to use the Services. Also, even if you request that we delete your Personal Information, we may need to retain certain information for a limited period of time to satisfy our legal, audit and/or dispute resolution requirements.
At this time, the Services do not respond to “do not track” signals that may be sent from your browser.
You can opt out of receiving marketing e-mails from us by clicking on the “unsubscribe” link in the e-mails. Please note that it may take up to ten (10) business days for your opt-out request to be processed. Also, even if you opt out of marketing e-mails, we may continue to send you certain account-related e-mails, such as notices about your account and confirmations of transactions you have requested.
The Services are not intended for users under 18 years of age. We do not knowingly collect Personal Information from users under 18 years of age. We do not authorize users under 18 years of age to use the Services.
8. Information Security
We utilize reasonable information security measures to safeguard your Personal Information against unauthorized access, modification, or destruction. For example, we utilize Secure Socket Layer (SSL), Transport Layer Security (TLS), or similar encryption technology when sensitive data is transmitted over the Internet, and use firewalls to help prevent external access into our network. However, no data transmission over the Internet and no method of data storage can be guaranteed to be 100% secure. Therefore, while we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its security.
We restrict access to Personal Information to our employees, contractors, and agents who need to know that information in order to operate, develop, improve or support our Services. If we share Personal Information with service providers, we require that they also use reasonable information security measures to safeguard your Personal Information, and only use your Personal Information for the purposes for which we share it with them.
9. Your California Privacy Rights
A California resident who has provided Personal Information to a business with whom he/she has established a business relationship for personal, family, or household purposes (“California Customer”) is entitled to request information about whether the business has disclosed Personal Information to any third parties for the third parties’ direct marketing purposes. In general, if the business has made such a disclosure of Personal Information, upon receipt of a request by a California Customer, the business is required to provide a list of all third parties to whom Personal Information was disclosed in the preceding calendar year, as well as a list of the categories of Personal Information that were disclosed.
California Customers may request further information about our compliance with California’s privacy law by e-mailing email@example.com. Please note that we are only required to respond to one request per customer each year, and we are not required to respond to requests made by means other than through this e-mail address.
10. Third Party Websites
Please note that the Services may link or integrate with third-party sites, services or apps. We are not responsible for the privacy or security policies or practices or the content of such third parties. Accordingly, we encourage you to review the privacy and security policies and terms of service of those third parties so that you understand how those websites collect, use, share and protect your information.
11. Changes to this Policy