Cryptoscoop (“us”, “we”, or “our”) operates https://www.cryptoscoop.net
This page informs you of our policies regarding the collection, use and disclosure of Personal Information we receive from users of the Site. We use your Personal Information only for providing and improving the Site.
- Before or at the time of collecting personal information, we will identify the purposes for which information is being collected.
- We will collect and use of personal information solely with the objective of fulfilling those purposes specified by us and for other compatible purposes, unless we obtain the consent of the individual concerned or as required by law.
- We will only retain personal information as long as necessary for the fulfillment of those purposes.
- We will collect personal information by lawful and fair means and, where appropriate, with the knowledge or consent of the individual concerned.
- Personal data should be relevant to the purposes for which it is to be used, and, to the extent necessary for those purposes, should be accurate, complete, and up-to-date.
- We will protect personal information by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
- We will make readily available to customers information about our policies and practices relating to the management of personal information.
How We May Collect Other Information
We and our third-party service providers may collect Other Information in a variety of ways, including:
- Through your browser or device: Certain information is collected by most browsers or automatically through your device, such as your Media Access Control (MAC) address, computer type (Windows or Macintosh), screen resolution, operating system name and version, device manufacturer and model, language and Internet browser type and version. We use this information to ensure that the Services function properly.
- Through your use of the App: When you download and use the App, we may track and collect App usage data, such as the date and time the App on your device accesses our servers, the pages you use and what information and files have been downloaded to the App based on your device number.
- Using pixel tags and similar technologies: Pixel tags (also known as web beacons and clear GIFs) may be used in connection with some Services to, among other things, track the actions of users (including email recipients), measure the success of our marketing campaigns and compile statistics about use of the Services and response rates.
- IP Address: Your IP address is a number that is automatically assigned to the computer that you are using by your Internet Service Provider. An IP address may be logged automatically in our server log files whenever you access the Services, along with the time of the visit and the pages visited. Collecting IP addresses is done automatically by many websites, applications and other services. We use IP addresses for purposes such as calculating usage levels, diagnosing server problems and administering the Services. We may also derive your approximate location from your IP address.
- Physical Location: We and our service providers may collect the physical location of your device by, for example, using satellite, cell phone tower, or WiFi signals. We and our service providers may use your device’s physical location to provide you with personalized location-based services, content, notice of events, and advertisements. In some instances, you may be permitted to allow or deny such collection or use of your device’s location, but, if you do, we may not be able to provide you with the applicable personalized services and content.
- From you: We collect your preferred means of communication, your gender, your investment and other preferences, and other information when you voluntarily provide it.
- By aggregating information: Aggregated Personal Information does not personally identify you (for example, we may aggregate Personal Information to calculate the percentage of our users who have a particular telephone area code).
How We May Use and Disclose Other Information
We may use and disclose Other Information for any purpose, except where we are required to do otherwise under applicable law. If we combine Other Information with Personal Information, we will treat the combined information as Personal Information as long as it is combined.
We may use third-party advertising companies to serve advertisements regarding goods and services that may be of interest to you when you access and use the Services and other websites or online services, based on information relating to your access to and use of the Services and other websites or online services on any of your devices, as well as on information received from third parties. To do so, these companies may place or recognize a unique cookie on your browser (including through the use of pixel tags). They may also use these technologies, along with information they collect about your online use, to recognize you across the devices you use, such as a mobile phone and a laptop.
THIRD PARTY SERVICES
In addition, we are not responsible for the information collection, use, disclosure or security policies or practices of other organizations, such as Facebook, Apple, Google, Microsoft, RIM or any other app developer; app, social media platform, operating system or wireless service provider; or device manufacturer, including with respect to any Personal Information you disclose to other organizations through or in connection with the Apps.
We use reasonable organizational, technical and administrative measures designed to protect Personal Information within our organization. Unfortunately, no data transmission or storage system can be guaranteed to be 100% secure. Please also be aware that we may use third-party cloud service providers that provide hosting, data storage and other services pursuant to standard terms and conditions that may be non-negotiable; these service providers have informed us or the general public that they apply security measures they consider adequate for the protection of information within their systems, or they have a general reputation for applying such measures.