There are many different ways you can use our services. As you use our services, we want you to be clear how we’re using information and the ways in which you can protect your privacy.
- What information we collect and why we collect it.
- How we use that information.
- The choices we offer, including how to access and update information.
We’ve tried to keep it as simple as possible, but if you’re not familiar with terms like cookies, IP addresses and browsers, then read about these key terms first. Your privacy matters to us so please do take the time to get to know our practices – and if you have any questions contact us.
Information we collect
We collect information to provide better services to all of our users. We collect information in the following ways:
- Information you give us. For example, many of our services require you to sign up. When you do, we’ll ask for personal information, like your name, email address, telephone number or etc.
- Information we get from your use of our services. We collect information about the services that you use and how you use them.
- Device information. We collect device-specific information (such as your hardware model, operating system version, unique device identifiers, and mobile network information including phone number).
- Location information. When you use our services, we may collect and process information about your actual location. We use various technologies to determine location, including IP address, GPS, and other sensors that may, for example, provide us with information on nearby devices, Wi-Fi access points and cell towers.
- Local storage. We may collect and store information (including personal information) locally on your device using mechanisms such as browser web storage (including HTML 5) and application data caches or Cookies and similar technologies.
How we use information we collect
We use the information we collect from all of our services to provide, maintain, protect and improve them, to develop new ones, and to protect us and our users.
When you contact us, we keep a record of your communication to help solve any issues you might be facing. We may use your email address to inform you about our services, such as letting you know about upcoming changes or improvements.
Accessing and updating your personal information
Whenever you use our services, we aim to provide you with access to your personal information. If that information is wrong, we strive to give you ways to update it quickly or to delete it – unless we have to keep that information for legitimate business or legal purposes. When updating your personal information, we may ask you to verify your identity before we can act on your request.
We may reject requests that are unreasonably repetitive, require disproportionate technical effort (for example, developing a new system or fundamentally changing an existing practice), risk the privacy of others, or would be extremely impractical (for instance, requests concerning information residing on backup systems).
Where we can provide information access and correction, we will do so for free, except where it would require a disproportionate effort. We aim to maintain our services in a manner that protects information from accidental or malicious destruction. Because of this, after you delete information from our services, we may not immediately delete residual copies from our active servers and may not remove information from our backup systems.
Information we share
We do not share personal information with companies, organizations and individuals outside of our institution unless one of the following circumstances applies:
- With your consent. We will share personal information with companies, organizations or individuals outside of our institution when we have your consent to do so. We require opt-in consent for the sharing of any sensitive personal information.
- For legal reasons. We will share personal information with companies, organizations or individuals outside of our institution if we have a good-faith belief that access, use, preservation or disclosure of the information is reasonably necessary to:
- meet any applicable law, regulation, legal process or enforceable governmental request.
- enforce applicable Terms of Service, including investigation of potential violations.
- detect, prevent, or otherwise address fraud, security or technical issues.
- protect against harm to the rights, property or safety of our institution, our users or the public as required or permitted by law.
We work hard to protect our users from unauthorized access to or unauthorized alteration, disclosure or destruction of information we hold. In particular:
- We encrypt many of our services using SSL.
- We offer you two step verification when you access your Account
- We review our information collection, storage and processing practices, including physical security measures, to guard against unauthorized access to systems.
- We restrict access to personal information to our employees, contractors and agents who need to know that information in order to process it for us, and who are subject to strict contractual confidentiality obligations and may be disciplined or terminated if they fail to meet these obligations.
We keep your personal information private and safe — and put you in control.