COLLECTION OF INFORMATION
We gather different data when you enroll with Company, amid your use of our items and administrations, when you visit pages of our accomplices. We may consolidate data about you that we have with data we acquire from different accomplices or different organizations keeping in mind the end goal to give you a superior affair or to enhance the nature of our administrations. When you sign into our administrations, you are not mysterious to us. We naturally get and record data from your PC and program, including your IP address, our treat data, programming and equipment traits, the page you ask for and other standard program parameters.
When you utilize our services, we send at least one treats – a little document on preparing a series of characters – to your gadget that interestingly recognizes your program. We utilize treats to enhance the nature of our administration, including for putting away client inclinations, following client drifts, and giving you a superior affair. We may set at least one treats in your program when you utilize our administrations or one of our accomplice’s services. When you send messages, distribute content, post material, transmit data or email through our administrations, we may hold the same with a specific end goal to prepare your request, react to your solicitations and enhance our administrations.
Our infrastructure consists of servers deployed at multiple datacenters that are owned and operated by us or our partners. All information collected within our services resides on this network of servers.
USE OF INFORMATION
- Communicating with you
- Making the sites or services easier to use by eliminating the need for you to repeatedly enter the same information
- Providing our services
- Auditing, research and analysis in order to maintain, protect and improve our services
- Ensuring the technical functioning of our network
- Protecting our rights or property and that of our users
- Developing new services
- As described in the respective terms of service of each of our services and in the Hacks Release Customer Master Agreement
We have a strict No-Spam Policy prohibiting the use of any data collected to send spam. We will not sell any contact information to third parties.
CHOICES FOR PERSONAL INFORMATION
When you agree to a specific administration that requires enlistment, we request that you give individual data. In the event that we utilize this data in a way not the same as the reason characterized thus and in the terms of the administrations offered then we will request your agree preceding such utilize. Most programs are at first set up to acknowledge treats, however you can reset your program to decline all treats or to show when a treat is being sent. Be that as it may, some of our elements and administrations may not work appropriately if your treats are incapacitated. You can decay to submit individual data to any of our administrations, in which case we will most likely be unable to give those administrations to you.
We only share personal information with other companies or individuals in the following limited circumstances:
- We have your consent
- We have a good faith belief that access, use, preservation or disclosure of such information is reasonably necessary to:
(a) satisfy any applicable law, regulation, legal process or enforceable governmental request,
(b) enforce applicable Terms of Service, including investigation of potential violations thereof,
(c) detect, prevent, or otherwise address fraud, security or technical issues, or
(d) protect against harm to rights, property or safety, of our users, us or the public as required or permitted by law.
- We may share with third parties certain pieces of aggregated, non-personal information, such as the number of users by demographic. Such information does not identify you individually.
- As permitted and described in the respective terms of service of each of our services and in the Hacks Release Customer Master Agreement
We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, as well as physical security measures to guard against unauthorized access to systems where we store personal data.
We restrict access to personal information to our employees, contractors and agents who need to know that information in order to operate, develop or improve our services. These individuals are bound by confidentiality obligations and may be subject to discipline, including termination and criminal prosecution, if they fail to meet these obligations.
ACCESSING AND UPDATING PERSONAL INFORMATION
When you use our services, we make good faith efforts to provide you with access to your personal information and to correct this data if it is inaccurate.