Types and Uses of Collected Information. Company collects two types of information about you:
Security of Information.
9.1 You can access your Personally Identifiable Information via the Company Service with your password and username. This password is encrypted. We advise against sharing your password with anyone. If you access your account via a third-party site or service, you may have additional or different sign-in protections via that third-party site or service. You need to prevent unauthorized access to your account and Personal Information by selecting and protecting your password and/or other sign-in mechanism appropriately and limiting access to your computer, browser, or mobile device by signing off after you have finished accessing your account. Unauthorized entry or use, hardware or software failure, and other factors, may compromise the security of user information at any time. If we believe that the security of your information may have been compromised, we may seek to notify you of that development.
9.2 Company stores data in a physically secure facility with fire suppression, cooling and monitoring. The Service does not transfer data in the form of filesso there are no files to encrypt. In the event some data is served in human readable form, i.e. CSV data that can be downloaded, we utilize TLS/HTTPS. In the event of a physical server being compromised, only the physical binary database files would be accessible, i.e., there is no access to the content. In the event of a database export to backup, the backups are encrypted.
9.3 In addition, your Personally Identifiable Information resides on a secure server that only selected personnel and contractors have access to. We may encrypt certain sensitive information using Secure Socket Layer (SSL) technology to ensure that your Personally Identifiable Information is safe as it is transmitted to us. However, no data transmission can be guaranteed to be 100% secure. As a result, while we employ commercially reasonable security measures to protect data and seek to partner with companies that do the same, we cannot guarantee the security of any information transmitted to or from or via the Company Service, and we are not responsible for the actions of any third parties that may receive any such information.
10.2 Other Tracking Devices. We may use other industry standard technologies like pixel tags and web beacons to track your use of the Company Service, or we may allow our Third-Party Service Providers to use these devices on our behalf. When you access the Company Service or open or click an email, pixel tags and web beacons generate a Non-Personally Identifiable notice of that action. Pixel tags allow us to measure and improve our understanding of visitor traffic and behavior on the Company Service, as well as give us a way to measure our promotions and performance. We may also utilize pixel tags and web beacons provided by our marketing partners for the same purposes.