Informationsecurity Report may collect personal information and data including, but not limited to, application and Website usage data, file transfer and viewing data, email and personal contact information, and other identifiable information provided to us by our Users. Informationsecurity Report may use technological means for tagging and tracking data including, but not limited to, harmless cookies, clear GIFs, and other technologies to track and correlate data. Specifically, but not limited to, the following information is collected:
1. User Provided Data: Users may provide personally identifiable information (such as a name, credit card data, address, telephone, and an email address) as well as sensitive information (such as Tax ID or Social Security Number) to Informationsecurity Report when choosing to participate in the services and activities available on the Website (collectively, the "Services").
2. Cookies: Cookies, a harmless small text file containing a string of alphanumeric characters, are deployed to your computer so as to uniquely identify your presence and use. Informationsecurity Report may use session cookies and persistent cookies for the purpose of tracking various important data. Use of these cookies can also help to speed your access to the Website as they serve as 'reminders' as to who you are to our programming. While we recommend that you allow these cookies to perform their tasks, you may adjust your computer's settings to restrict or refuse them. However, some features or sections of the Website may not function properly, or not all, if the ability to accept cookies is disabled. We do not link the information we store in cookies to any personally identifiable information you submit while on our site.
3. Clear GIFs: Informationsecurity Report may choose to utilize "clear GIFs" to track the online usage patterns of our Users in a non-personally identifiable manner. Additionally, Informationsecurity Report may also use clear GIFs in HTML-based emails dispatched to Users so as to track which emails are being opened by the recipients. This act helps Informationsecurity Report to determine active and inactive email addresses.
4. Log File Data: When Users log-in to their Informationsecurity Report account, our servers will automatically record and archive certain information that web-browsers send whenever visiting a website. These server logs may include information vital to validating the User's authorization to access the account. Information, such as a Web request, Internet Protocol (the "IP") address, browser type, browser language, referring pages, exit pages and visited URLs, platform type, click counts, pages viewed and in what order, time spent, the date and time of the request, and other important data is necessary to validate and authorize a User's entry and activity on the Website.
Informationsecurity Report may collect information from other sources to help us correct or supplement our records, improve the quality or personalization of our service to you, and prevent or detect fraud. We work closely with third parties (for example, business partners, service providers, sub-contractors, advertising networks, analytics providers, search information providers, fraud protection services) and may receive information about you from them.
Further, and in order to provide the services and improve Informationsecurity Report’s websites, we may engage the services of third-party vendors. In the process of supplying services to Informationsecurity Report, these third-party vendors may need to collect Personal Information about you.
1. Personally identifiable information submitted by a User is used to operate, maintain, and provide features, general and unique, of the Website for the User's use and for to provide its Services.
2. All personal information, data, or content that a User voluntarily discloses to the Website becomes available to other Users, consistent with the Services being provided by Informationsecurity Report, and can be collected and used by other authorized Users. Your account Username is displayed to other Users when you negotiate pricing, edit campaign information, or upload creative through the Website.
3. Informationsecurity Report does use personally identifiable information and certain non-personally identifiable information, such as but not limited to, anonymous User usage data, browser type, cookies, IP addresses, clickstream data, and the like, to improve the quality and use designs of the Website through analysis of this data and trends.
4. Informationsecurity Report uses clear GIFs and log file data to:
i. provide custom content and preferences;
ii. remember information necessary for logging in to your Website account so as to save you time in re-entering such information;
iii. monitor the impact and effectiveness of Informationsecurity Report marketing efforts;
iv. monitor aggregate metrics providing detailed data on User activities while on the Website;
v. track your submissions, entries, and status.
5. Users have the ability to indirectly communicate with each other via dashboard activities. These activities include but are not limited to: negotiation of lead pricing; the start, pausing, and stopping of a campaign; the ability to upload campaign creative; and editing of campaign criteria.
Disclosure of Information
1. Informationsecurity Report will not rent or sell your Personal Information to others but may disclose personal information with third-party vendors and service providers that work with Informationsecurity Report. We will only share personal information to these vendors and service providers to help us provide a product or service to you. Examples of third parties we work with are call center operators, shippers, servicers, information processors, financial institutions, data appending and surge scoring companies. These third parties only have access to personal information necessary for them to complete their service.
3. Informationsecurity Report reserves the right to disclose personally identifiable and/or non-personally identifiable information that is believed, in good faith, to be appropriate or necessary for the purpose of enforcing the Informationsecurity Report Terms of Service, or other governing Informationsecurity Report policies. Other causes of release of data may be due to, but not limited to:
i. taking precautions against liability issues;
ii. to assist government enforcement agencies;
iii. to investigate and defend Informationsecurity Report against third party claims or allegations;
iv. to protect the security or integrity of the Website and/or Services; and/or
v. to protect the rights, property, or personal safety of Informationsecurity Report, Users of the Website, or others.
4. Informationsecurity Report does not share personally identifiable information with other non-affiliated third-party companies for their commercial use or marketing use without your consent, except as part of Services.
5. Informationsecurity Report does share non-personally identifiable information, such as anonymous User data and traffic data, with interested third parties to assist them in understanding the usage patterns and trends analysis for certain content, advertisements, promotions, services, and/or functionality of the Website.
6. Informationsecurity Report may release any information available if required to do so by law, or in the good faith belief that such action is necessary to comply with law or the powers of government enforcement agencies. Other causes for release of information could be for needs to comply with copyright laws or to respond to a court order, subpoena, and/or search warrant. We also may be required to disclose an individual’s personal information in response to a lawful request by public authorities, including to meet national security or law enforcement requirements.
Decline to Accept: You may decline to submit or allow the submission of personally identifiable information through the Website, in which case Informationsecurity Report may not be able to provide certain Services. You may, at any time, update or edit your profile information and email preferences by visiting your Informationsecurity Report account profile page.
Links and Third-Party Advertisers: Informationsecurity Report allows other companies, also referred to as Third Party Advertisers, Ad Servers, or Ad Networks (collectively, the "Advertisers") to serve advertisements via the Website. These Advertisers may use technology to send directly to your Web browser advertisements and links that appear on the Website. This technology may capture certain non-personally identifiable data, such as your IP address, etc. This technology may also measure the effectiveness of their advertisements and to personalize the advertising content you may view on the Website.
Data Security: In an effort to provide maximum protection of User's privacy, Informationsecurity Report routinely utilizes commercially reasonable physical, technical, and managerial safeguards to preserve the integrity and security of your personal information. However, Informationsecurity Report cannot ensure or warrant the security of any information you transmit to Informationsecurity Report or place upon the Website and you do so at your own risk. Once Informationsecurity Report receive said transmission of personal information, Informationsecurity Report engages commercially reasonable efforts to ensure the security of its systems and the personal information you provided. This is not a guarantee that such information may not be accessed, altered, disclosed, or destroyed by breach of any of our physical, technical, or managerial safeguards. The security of your personal information is important to us. When you enter sensitive information (such as social security number or Tax ID) on our registration or order forms, we encrypt that information using secure socket layer technology (SSL).
California Privacy Rights
California Civil Code Section 1798.83 permits individual California residents to request certain information regarding Informationsecurity Report's disclosure of personal information to third parties for their direct marketing purposes. To make such a request, please write to firstname.lastname@example.org. Please include your name, mailing address, and email address if you want to receive a response by email. Otherwise, we will respond by postal mail within the time required by applicable law.
If you are a California resident under age 18 and are a registered user of any of the services, then you may request that we remove any content that you created and publicly posted on our website ("User Content"). To request removal of your User Content, please send an email with a detailed description of the specific Data User Content to email@example.com.
Informationsecurity Report reserves the right to request that you provide information that will enable us to confirm that the User Content that you want removed was created and posted by you. Informationsecurity Report will make a good faith effort to delete or remove your User Content from public view as soon as reasonably practicable. Please note, however, that your request that we delete your User Content does not ensure complete or comprehensive removal of your User Content. Your User Content may remain on backup media, cached or otherwise retained by Informationsecurity Report for administrative or legal purposes or your User Content may remain publicly available if you or someone else has forwarded or re-posted your User Content on another website or service prior to its deletion. Informationsecurity Report may also be required by law to not remove (or allow removal) of your User Content. Updating or Correcting Personally Identifiable Information if you no longer desire to use Informationsecurity Report’s Services or need to update your contact information, you may correct or update it by emailing our privacy team at firstname.lastname@example.org, or by contacting us by telephone or postal mail at the contact information listed below. Your rights to access, to limit use, and to limit disclosure: European Union individuals have the right to access personal data about them, and to limit use and disclosure of their personal data. If you wish to request access, to limit use, or to limit disclosure, please email Informationsecurity Report privacy team at email@example.com or send a written request to the contact information provided below.
Children's Privacy: Informationsecurity Report complies with the Children's Online Privacy Protection Act of 1998 (COPPA) and does recognize the responsibility to protect the privacy of young children at all times and to the best of everyone's ability. For that reason, Informationsecurity Report does not knowingly collect or maintain any information via the Website from persons under the age of thirteen (13), and no part of our Website is directed to persons under the age of thirteen (13). If an underage person provides such information and Informationsecurity Report has unknowingly collected said information, then Informationsecurity Report will take the appropriate steps to delete this information immediately.
Transfer of Rights: Should Informationsecurity Report be acquired, merged, or endeavor to become closed for business, Informationsecurity Report reserves the right, in any of these circumstances, to transfer or assign the information collected, during the due course of business, from Users of the Website. This information may be held as part of any such acquisition, merger, sale, or other change of control or business entity status. In the unlikely event of a bankruptcy, assignment for the benefit of creditors, insolvency, receivership, reorganization, or the application of laws or legally recognized enforcements and/or actions, Informationsecurity Report may not be able to control how Users' personal information is accessed, treated, transferred, and/or used. In any of these circumstances, you hold harmless and indemnify Informationsecurity Report and its officers, directors, employees, agents, and assignees from and against any claims of responsibility, damages, costs, debts, losses, liabilities, obligations, fees and/or expenses.
Contact Information: You may contact Informationsecurity Report Customer Service at: Informationsecurity Report Attention: 4th Floor, Alpha 2 Giga Space, Viman Nagar Pune, Maharashtra 411014 INDIA, Email: firstname.lastname@example.org, Direct Dial (International): (1) 844-900-9595.
Presiding Language: This Agreement and all Informationsecurity Report policies are written and executed in English, which is considered the prevailing language for purposes of interpretation or laws of contract. If this Agreement is translated into any other language, the English version shall be considered the primary binding legal document.