Effective Date: September 15, 2020
You provide us personal information about yourself when you:
Examples of the Personal Information categories you provide are:
Personal Information we collect from you automatically. We automatically obtain personal information from you and your devices when you use our Services, including when you visit our websites or applications without logging in.
The types of personal information that we receive automatically include:
Device, transaction records, usage information. We collect personal information on your devices, such as computers, cell phones or tablets, and information on how you use the Services we provide.
Data that we accumulate from other sources. We may collect your personal information from others, such as:
Third Party Sources. Examples of third-party sources include investors, analysts, affiliates, service providers and those who are permitted to share the personal details with us.
Other Customers. Other existing customers can provide us with your personal details. For example, if a customer wants to refer you to our product or service, he or she will give us your name and email address.
Personal information that we collect & process on our customers' behalf. When customers use our Services, we process and store some personal information on their behalf, acting as a data processor. For instance, when a user uploads text or images via MintData, we act as a data processor and process the information on behalf of the customer and in accordance with their instructions. In such cases , the customer is the data controller and is responsible for most aspects of the processing of personal information.
In general, we collect, use, store and process your personal information for the purpose of delivering, upgrading and enhancing our Services, developing new Services, and marketing our products and services. Below are some examples of how we use collected personal information:
Additional Uses. We can combine the personal information we collect ("aggregate") or delete pieces of personal information ("de-identify") to restrict or prevent any specific user or machine from being identified to help with goals such as research and marketing.
We usually collect and use personal information from you or others only if we have consent to do so, whether we need the personal information to conduct a contract with you, or if the collection is in our business interests and is not conflicting with your data protection interests or fundamental rights. In certain cases we may have a legal duty to obtain or maintain personal information, or may need personal information to protect your or someone else's interests. For example:
We do not transfer nor reveal your personal details to any third party in a manner which may be considered a sale under applicable law.
The personal information is shared by us as follows:
Personal information can also be shared by the means described below:
We retain your personal information for no longer than is required for the purposes for which it is processed. The period of time for which we keep personal information depends on the reason for which it has been obtained and used and/or as necessary to comply with applicable laws. Where there are technological limitations that restrict deletion or anonymization, we safeguard and restrict the active use of personal information.
See Section 5 for options about the protection of your personal information.
This section explains many of the steps you can take to adjust or restrict the retention or use of your personal information.
Our Services are not intended for or targeted towards people under the age of 16 ('minors'). We do not knowingly collect or request personal information from minors. We do not knowingly allow minors to use our Services. If you are a minor, please do not use our Services or provide us with your personal information. We delete the personal information we believe might have been obtained from a minor without parental consent. Please contact us at firstname.lastname@example.org if you feel that we might have personal details from or about a minor.
You may have certain rights in relation to your personal information, subject to your local data protection legislation. These rights may include the following:
We take reasonable steps to verify your identity. If you have an account with us, we can verify you via your account email. If you do not have an account with us, we can request confirmation by email or request additional identification details, including government-issued identification, to verify your identity.
You may allow an agent to make a request to us on your behalf. We may verify the identity of your agent or designated legal representative by either obtaining confirmation or authorization documents allowing the agent to operate on your behalf.
Your rights and options vary depending on your location. Some personal information can be removed from such requests under applicable law. We need certain kinds of personally identifiable information so that we can provide you with a product or service. If you ask us to delete it, we may no longer be able to provide access to our products and services.
If you would like to exercise these rights, please contact us at email@example.com.
Transfers to the United States and other countries. We can pass your personal information outside your state for further processing.
California. California residents can request a list of third parties who have received your personal information for direct marketing purposes during the preceding calendar year. This list also includes the categories of personal information transmitted. We provide this list at no expense. If you are a resident of California and would like to obtain this information, please contact us at firstname.lastname@example.org.
We use physical, electronic, and managerial tools to secure your personal information. We apply these tools on the basis of the sensitivity of data we receive, use and store, and the latest state of technology. We protect your sensitive information by technological and organizational protection mechanisms to minimize the risk associated with data loss, abuse, unauthorized access and unwanted distribution and modification.