Terms
  • Terms of use
    • 1. Agreement to terms
    • 2. INTELLECTUAL PROPERTY RIGHTS
    • 3. USER REPRESENTATIONS
    • 4. USER REGISTRATION
    • 5. PRODUCTS
    • 6. PURCHASES AND PAYMENT
    • 7. REFUNDS POLICY
    • 8. PROHIBITED ACTIVITIES
    • 9. USER GENERATED CONTRIBUTIONS
    • 10. CONTRIBUTION LICENSE
    • 11. GUIDELINES FOR REVIEWS
    • 12. MOBILE APPLICATION LICENSE
    • 13. SUBMISSIONS
    • 14. SITE MANAGEMENT
    • 15. PRIVACY POLICY
    • 16. TERM AND TERMINATION
    • 17. MODIFICATIONS AND INTERRUPTIONS
    • 18. GOVERNING LAW
    • 19. DISPUTE RESOLUTION
    • 20. CORRECTIONS
    • 21. DISCLAIMER
    • 22. LIMITATIONS OF LIABILITY
    • 23. INDEMNIFICATION
    • 24. USER DATA
    • 25. ELECTRONIC COMMUNICATIONS, TRANSACTIONS, AND SIGNATURES
    • 26. MISCELLANEOUS
  • Privacy Policy
    • SUMMARY OF KEY POINTS
    • 1. WHAT INFORMATION DO WE COLLECT?
    • 2. HOW DO WE PROCESS YOUR INFORMATION?
    • 3. WHAT LEGAL BASES DO WE RELY ON TO PROCESS YOUR INFORMATION?
    • 4. WHEN AND WITH WHOM DO WE SHARE YOUR PERSONAL INFORMATION?
    • 5. HOW LONG DO WE KEEP YOUR INFORMATION?
    • 6. HOW DO WE KEEP YOUR INFORMATION SAFE?
    • 7. WHAT ARE YOUR PRIVACY RIGHTS?
    • 8. CONTROLS FOR DO-NOT-TRACK FEATURES
    • 9. DO CALIFORNIA RESIDENTS HAVE SPECIFIC PRIVACY RIGHTS?
    • 10. DO WE MAKE UPDATES TO THIS NOTICE?
    • 11. HOW CAN YOU CONTACT US ABOUT THIS NOTICE?
    • 12. HOW CAN YOU REVIEW, UPDATE, OR DELETE THE DATA WE COLLECT FROM YOU?
  • Disclaimer
Powered by GitBook
On this page
  1. Privacy Policy

6. HOW DO WE KEEP YOUR INFORMATION SAFE?

In Short: We aim to protect your personal information through a system of organisational and

technical security measures. We have implemented appropriate and reasonable technical and organisational security measures designed to protect the security of any personal information we process. However, despite our safeguards and efforts to secure your information, no electronic transmission over the Internet or information storage technology can be guaranteed to be 100% secure, so we cannot promise or guarantee that hackers, cybercriminals, or other unauthorised third parties will not be able to defeat our security and improperly collect, access, steal, or modify your information. Although we will do our best to protect your personal information, transmission of personal information to and from our Services is at your own risk. You should only access the Services within a secure environment.

Previous5. HOW LONG DO WE KEEP YOUR INFORMATION?Next7. WHAT ARE YOUR PRIVACY RIGHTS?

Last updated 2 years ago

Page cover image