1.1 What information we collect and why we collect it.
1.2 How we use that information.
1.3 The choices we offer, including how to access and update information.
2. Information we collect
We collect information to provide better services to all of our users – from figuring out basic things like your name, to more complex things like which time zone you are in.
We collect information in two ways:
2.1 Information you give us. For example, some of our services require you to sign up for an Account. When you do, we’ll ask for personal information, like your name, email address, where you live or how old you are. If you want to take full advantage of the sharing features we offer, we encourage you to create an Account.
2.2 Information we get from your use of our services. We may collect information about the services that you use and how you use them, like when you visit a website that uses our services or you view and interact with our services. This information includes:
2.2.1 Device information. We may collect device-specific information (such as your hardware model, operating system version, unique device identifiers, and mobile network information including phone number). We may associate your device identifiers or phone number with your Account.
2.2.2 Log information. When you use our services or view content provided by us, we may automatically collect and store certain information in server logs. This may include:
126.96.36.199 Details of how you used our service, such as your search queries or subject matter reviewed.
188.8.131.52 Telephony log information like your phone number, calling-party number, forwarding numbers, time and date of calls, duration of calls, SMS routing information and types of calls.
184.108.40.206 Internet protocol address.
220.127.116.11 Device event information such as crashes, system activity, hardware settings, browser type, browser language, the date and time of your request and referral URL.
18.104.22.168 Cookies that may uniquely identify your browser or your Account.
2.2.3 Location information. When you use a location-enabled service, we may collect and process information about your actual location, like GPS signals. We may also use various technologies to determine location, such as sensor data from your device that may, for example, provide information on nearby Wi-Fi access points and cell towers.
2.2.4 Unique application numbers. Certain services include a unique application number. This number and information about your installation (for example, the operating system type and application version number) may be sent to us when you install or uninstall that service or when that service periodically contacts our servers, such as for automatic updates.
2.2.5 Local storage. We may collect and store information (including personal information) locally on your device using mechanisms such as browser web storage (including HTML 5) and application data caches.
3. How we use information we collect
3.1 We use the information we collect from all of our services to provide, maintain, protect and improve them, to develop new ones, and to protect us and our users. We also use this information to offer you tailored content.
3.2 We may use the name you provide for your Account across all of the services we offer. In addition, we may replace past names associated with your Account so that you are represented consistently across all our services. If other users already have your email, or other information that identifies you, we may show them your publicly visible Account information, such as your name and photo.
3.3 When you contact us, we may keep a record of your communication to help solve any issues you might be facing. We may use your email address to inform you about our services, such as letting you know about upcoming changes or improvements.
3.4 We may use information collected from cookies and other technologies, like pixel tags, to improve your user experience and the overall quality of our services. For example, by saving your time zone, we’ll be able to have our services that produce time sensitive content provide the information when you need it.
3.5 We may combine personal information from one service with information, including personal information, from other services – for example to make it easier to share things with people you know.
3.7 We may process personal information on our servers from many countries around the world. We may process your personal information on a server located outside the country where you live.
4. Transparency and choice
People have different privacy concerns. Our goal is to be clear about what information we collect, so that you can make meaningful choices about how it is used. For example, you can:
4.1 Control who you share information with.
4.2 Request that we remove information from our services.
You may also set your browser to block all cookies, including cookies associated with our services, or to indicate when a cookie is being set by us. However, it’s important to remember that many of our services may not function properly if your cookies are disabled. For example, we may not remember your time zone.
5. Information you share
Many of our services let you share information with others.
Remember that when you share information publicly, it may be indexable by search engines.
Our services provide you with different options on sharing and removing your content.
We may reject removal requests that are unreasonably repetitive, require disproportionate technical effort (for example, developing a new system or fundamentally changing an existing practice), risk the privacy of others, or would be extremely impractical (for instance, requests concerning information residing on backup tapes, disks or drives).
Where we can provide information access and correction, we will do so for free, except where it would require a disproportionate effort. We aim to maintain our services in a manner that protects information from accidental or malicious destruction. Because of this, after you delete information from our services, we may not immediately delete residual copies from our active servers and may not remove information from our backup systems.
6. Information we share
We do not share personal information with companies, organizations and individuals who we are not affiliated with unless one of the following circumstances apply:
6.1 With your consent
6.1.1 We will share personal information with companies, organizations or individuals outside of our current affiliates when we have your consent to do so. We require consent for the sharing of any sensitive personal information.
6.2 With domain administrators
If your Account is managed for you by an administrator then your administrator and agents who provide user support to your organization will have access to your Account information (including your email and other data). Your administrator may be able to:
6.2.1 View statistics regarding your account, like statistics regarding applications you install or use.
6.2.2 Change your account password.
6.2.3 Suspend or terminate your account access.
6.2.4 Access or retain information stored as part of your account.
6.2.5 Receive your account information in order to satisfy applicable law, regulation, legal process or enforceable governmental request.
6.2.6 Restrict your ability to delete or edit information or privacy settings.
6.3 For external processing
6.4 For legal reasons
We will share personal information with companies, organizations or individuals if we have a good-faith belief that access, use, preservation or disclosure of the information is reasonably necessary to:
6.4.1 Meet any applicable law, regulation, legal process or enforceable governmental request.
6.4.2 Enforce applicable Terms of Service, including investigation of potential violations.
6.4.3 Detect, prevent, or otherwise address fraud, security or technical issues.
6.4.4 Protect against harm to the rights, property or safety of us, our users or the public as required or permitted by law.
6.5 We may share aggregated, non-personally identifiable information publicly and with our partners – like publishers, advertisers or connected sites. For example, we may share information publicly to show trends about the general use of our services.
7. Information security
We work hard to protect our systems and our users from unauthorized access to or unauthorized alteration, disclosure or destruction of information we hold. In particular:
7.1 We encrypt some of our services and data.
7.2 We review our information collection, storage and processing practices, including physical security measures, to guard against unauthorized access to systems.
7.3 We restrict access to personal information to employees, contractors and agents who need to know that information in order to process it for us, and who are subject to strict contractual confidentiality obligations and may be disciplined or terminated if they fail to meet these obligations.