Information Company Collects
In order to utilize the Services, the Company may collect personal and personally identifiable information from you. Such information may include, but is not limited to, your name, email address, mailing address, phone number, date of birth and a username and password for an account that is unique to you. Additionally, the Company may capture other information including, but not limited to, your IP address, geolocation, information stored in cookies, pixel tags, and web beacons.
Social Networking Data
In the event that Company allows you to integrate any social media function—eg use of Facebook, Twitter, or LinkedIn—into your use of the Company’s website, the Company may collect your username associated with any such social media website you use. We may also collect any information that you make public through that website or that such website has shared with us, including, but not limited to profile information, pages you have “liked,” and friend lists.
Disclosure and Use of Information
By using the Services you acknowledge and agree that the Company may release your personal or personally identifiable information to third-party contractors or their agents that have formed a relationship with the Company.
Company may also transfer your personal or personally identifiable information to respond to a duly authorized subpoena or court order, to respond to regulatory requests by government authorities, to protect the safety or security of the Company, the Services, its employees, and its users, and, where necessary, to protect against fraud, false advertising, or the violation of any law, statute, ordinance, regulation, or treaty, whether local, state, provincial, national or international.
Security of Information
The Company works to protect the security of your personal and personally identifiable information using commercially reasonable security measures and has implemented industry standard encryption to protect against unauthorized access to or interception of your personal and personally identifiable information. However, no security measures entirely impenetrable. As such, the Company is not responsible for the circumvention of its security measures by any User or third parties.