What Types of Information We Collect
While not all information that you provide or that we collect is personally identifiable information, this policy includes all information that we collect, that you provide, or that is provided to us by a third party, including personally identifiable information. Personally identifiable information includes, but is not limited to, your name, address, phone number, email address, user name and password for restricted access portions of our sites and those of our partners, and information about your devices used to access the sites. While providing some requested information on our sites is completely voluntary (for example, participating in surveys), certain parts of our sites require your personally identifiable information to either access the site or to permit the site to process correctly. This policy covers both mandatory information that you provide, as well as any voluntary information that you provide.
Additional examples of information that we collect include:
How We Collect Information
We receive and store any information you knowingly enter on a site, whether via computer, mobile phone, other wireless device, or that you provide to us in any other way. We also receive and store information that is automatically collected through the technology. In addition, we receive and store information that is provided by third parties. We explain each method for collecting information and the types of information collected through each method in greater detail below. This policy does not apply to websites, services or practices of companies that we do not own or control, which are subject to their own terms and conditions, even if they help us operate our sites or even if you interact with us. However, this policy does apply to information that is collected by us through third-party websites, social media sites, or services.
Information That You Provide
You may choose to voluntarily provide us with information about you at various places on the sites. Information, including personal information, may be collected at any point on our sites. You may provide information to us when you engage in any of the following activities:
YOU ARE SOLELY RESPONSIBLE FOR THE CONTENT OF THE INFORMATION YOU PROVIDE ON THE SITES AND AGREE TO PERMIT US TO ACCESS, USE OR REUSE SUCH CONTENT AS PERMITTED IN THIS POLICY AND IN OUR USER GENERATED CONTENT POLICY, IF APPLICABLE.
Automatically Collected Information
The sites automatically log information about you from your browser or mobile device when you visit the sites. The sites may use tracking pixels, web beacons, cookies and other technology to get and store information like your IP addresses, clickstream data, date and time of visits, and browser, Operating System and Internet Service Provider information, as well as other information.
Cookies enable us to offer secure pages to you without asking you to sign in repeatedly. Most browsers allow you to control cookies, including whether or not to accept them and how to remove them. You may set most browsers to notify you if you receive a cookie, or you may choose to block cookies with your browser, and you can also set how you wish the browser to delete cookies. Disabling cookies may affect the functionality of a site or may require that you reenter data each time you visit a site, however.
Web beacons and other technologies like pixels allow us and our authorized third parties to monitor and collect certain information about users of the sites, web-based documents, e-mail messages or other communications, such as the type of browser requesting the web beacon, the device identifier of the device that the web beacon is sent to and the time the web beacon was viewed.
Information Provided By Third Parties
We engage with service providers that we use, data management or analytics companies, advertising networks, demographics companies, third parties that provide us information about you and your devices, and other collaborative third parties. We also receive information about you from our family of companies, including subsidiaries, affiliates, and parent, that you have interacted with.
How We Use the Information That We Collect and Store
We and authorized third parties engaged by us to provide services may use the information on the basis of various legal grounds, which are more fully explained in this section. We may use the information for compliance purposes, in situations where you provide consent for its use, as might be required to perform a contract with you, or for legitimate business purposes. More specifically, legitimate business purposes may include the following:
How We Share Information
We are not in the business of selling or renting your personally identifiable information. We may share information about you with third parties under the following circumstances; however, these third parties are not permitted to share or use the information for any purposes, except providing services to us:
We may disclose personally identifiable information under special circumstances, such as to comply with subpoenas, court orders, legal process or other valid law enforcement measures; to comply with a legal obligation; at the request of governmental authorities conducting an investigation; to verify or enforce compliance with the policies governing the sites and applicable laws; to protect the legal rights, interests, or safety of the sites, our users or others; or when your actions violate our terms. Such disclosures may be carried out without notice to you.
We may transfer personally identifiable information as an asset in connection with a proposed or actual merger or sale (including any transfers made as part of an insolvency or bankruptcy proceeding) involving all or part of our business or as part of a corporate reorganization, stock sale or other change in control.
How We Secure Information
The sites take appropriate organizational, technical, administrative, and physical precautions to protect your personally identifiable information in compliance with applicable laws. We have in place a team that is responsible for implementing information security controls that are appropriate for the nature of the data involved. Our information security procedures are reviewed regularly and updated as necessary to meet the sensitivity of the information we handle, our legitimate business needs, and regulatory changes, as well as to respond to changing technology. While we believe our measures reduce the likelihood of security problems to a level consistent with the type of data involved, we cannot guarantee the security of your personal information.
How We Retain Information
Social Media Platforms
You may have rights under various United States and other laws. We will honor your rights under applicable data protection laws. Your rights may vary under the laws of each country. Please contact us using the information in the “Contact Information” Section below to make a request to access your information for a permitted purpose under applicable law. If you are not satisfied with our handling of your access request, you may have the ability to lodge a complaint with the appropriate supervisory authority if you live, work, or were infringed upon within the European Economic Area.
We provide mechanisms for updating and correcting your personal information on the sites. If you have registered for an online account, you may access and update certain personal information that you have provided to us by logging into your online account and using the features and functionalities available there.
In addition, you may also make a request for access to, to rectify or remove, or to restrict use of your personal information by sending an email at firstname.lastname@example.org. You may also have rights to object to your personal information being used, to ask for the transfer of personal information you have made available to us and to withdraw consent to the use of your personal information. Please contact us at email@example.com to make a request.
We may request additional information from you in order to verify your identity before accommodating an access request. If we are unable to honor a request, we will explain why.
Opting Out of Certain Contact
We may contact you if you have opted in to receive messages from us. If you no longer wish to receive messages, you may opt out of receiving these communications by changing your notification settings in your account or by opting out of a mobile messaging campaign or by unsubscribing via the opt-out link included in each e-mail or by otherwise following the instructions in the applicable technology. You may also opt out at any time by emailing firstname.lastname@example.org. You may also manage some third party advertising preferences through third party opt-out and do-not-call programs. In addition, you may choose not to provide your location to us in connection with your use of our mobile applications by declining any prompt requesting location information and by customizing your mobile device settings to prevent sharing of location information. If you turn off ad tracking or location tracking, we will no longer use information collected from your device’s advertising identifier for the purposes of advertising.
If you are not 16 or older, you are not authorized to use the sites. We do not solicit or knowingly collect any personal information from children, and we will delete any information later determined to be from a user younger than 16.
Notification of Changes
This Policy is effective June 15, 2018.