What information do we collect?
The first type of information is individually identifiable information, namely information that identifies an individual or may with reasonable effort identify an individual. We may gather Personal Information which may include the following: email address and phone number of the End User, End User’s full name, End User’s IP address etc. The second type of information is unidentified and non-identifiable information pertaining to you or to your End Users, which may be made available or gathered via your use of the Software. Non-Personal Information which is being collected may include usernames, directory names, server names, share names, file names, configurations, logs related to software. In addition, when you allow us (or our trusted third party service providers) to receive your End Users’ Feedback with regard to Software, we may gather Non-Personal Information which may include the following: Feedback rating, Feedback tags, Feedback text, browser type and language, operating system, viewport of the screen, page URL on which the Feedback has been given, screenshot of the screen on which Feedback was provided (with all textual strings redacted), and our clients. The Clients maintain sole ownership of this data and determine their own policies regarding the storage, access, deletion, sharing and retention of this data.
How do we use the information we collect?
We use the Personal Information for legitimate business purposes only, such as:
• To set up your account and to provide our services to you and to your End Users.
• To identify and authenticate End Users’ access to the Software.
• To support and troubleshoot our Software and to respond to queries.
With whom we share the information we collect?
How do we safeguard and transfer your information?
We are committed to making reasonable efforts, in accordance with market best practices, to ensure the security, confidentially and integrity of the personal information. We take great care in implementing and maintaining the security of the software and the personal information. Access to the personal information is based on the role-based access control systems, ensuring only authorized access to the personal information. We employ market best practice security measures to ensure the safety of your End Users Personal Information and prevent unauthorized use of any such information. Although we take steps to safeguard such information, we cannot be responsible for the acts of those who gain unauthorized access or abuse our software. If a password is used to help protect your accounts and personal information, it is your responsibility to keep your password confidential.
Protection of your personal data
Information you provide to us through the software is protected by encryption. Once we have received your informa- tion, we use strictly maintained physical, electronic and procedural safeguards to prevent unauthorized access. Where we have given you a password which enables you to access your software and you are responsible for keep- ing this password confidential. We ask you not to share any password with anyone. Once we have received your information, we will use strict procedures and security features to try to prevent unauthorized access.
How long we keep your personal data
We will keep your Personal Data no longer than is necessary for the purposes for which the data was provided. We retain user information for 1 years from the date a customer ceases to use our service, unless they specifically request us to remove their data sooner than this. Please note that in certain circumstances, we may hold your Personal Data for a longer period, for example, if we are processing an ongoing claim or believe in good faith that the law or a relevant regulator may reasonably in our view expect or require us to preserve your data, to maintain system backups, to maintain security, prevent fraud or abuse, to enforce our legal agreements.
You have the right under Data Protection Law, free of charge, to request:
Access to your personal data.
Rectification or deletion of your personal data.
A restriction on the processing of your personal data.
Object to the processing of your personal data.
Transfer of personal data in a structured, machine readable and commonly used format.
Withdraw your consent to us processing your personal data, at any time.