Publish date on 11-12-2018
Our web servers automatically log your IP address and information about your web browser. This helps us find people who abuse the service. We retain this information for 30 days. We use Google Analytics and Google Optimize to see how you use the site. Google sets cookies automatically when you visit our website. When you leave our web site by clicking on a link, we include a unique ID provided by Google Analytics. That lets us track whether certain devices, for example, make a purchase our partner web sites. All this seems pretty reasonable to us. Please email [email protected] to let us know what we could do better.
Information We Collect
Log information: When you access our Services, our servers automatically record information that your browser sends whenever you visit a website. These server logs may include information such as your web request, Internet Protocol address, browser type, browser language, the date and time of your request and one or more cookies that may uniquely identify your browser. We use this information in aggregate to help understand what types of devices use the Service, and to help detect abuse of the Service. We retain this information for 30 days.
How we Use collected Information
Providing Services to our users;
Research and analysis in order to maintain, protect and improve our services;
Ensuring the technical functioning of our network; andDeveloping new services.
If you provide us with personal information when you sign up to our Services and we use that information in a manner different than the purpose for which it was collected, then we will ask for your consent prior to such use.
Security Rules processes personal information on servers in Canada, the United States of America and in other countries. In some cases, we process personal information on a server outside your own country. We may process personal information to provide our own Services.
Our Services may allow you to opt-out of certain information gathering and sharing or to opt-out of certain Services or features. You will be explained how to do so at each occasion where you have such choices.
Accessing, updating, and deleting personal information
When you use Security Rules’s Services, we will make efforts to provide you with reasonable access to your personal information, so that such data can be either updated or deleted at your request if it is not otherwise required to be retained by law or for legitimate business purposes. We ask users to identify themselves and the information requested to be accessed processing such requests. We may decline to process unreasonable requests, requests which require disproportionate technical effort, jeopardize the privacy of others, or would be extremely impractical, or for which access is not otherwise required. Please contact us at [email protected]
if you would like access to whatever information we are able to associate with you, or if you would like us to delete any information we are able to associate with you.