For purposes of this Agreement, “Service” refers to the Company’s service which can be accessed via at www.getpikiz.com or through our various extensions and bookmarklets in which users can customize images or texts directly where they find them on theweb.
I. INFORMATION WE COLLECT
We collect “Non-Personal Information” and “Personal Information.” Non-Personal Information includes information that cannot be used to personally identify you, such as anonymous usage data, general demographic information we may collect, referring/exit pages and URLs, platform types, preferences you submit and preferences that are generated based on the data you submit and number of clicks. Personal Information includes only your email, which you submit to us through the registration process at the Site.
1- Information collected via Technology
- browser type
- language preference
- referring site
- date and time of website visit
- IP address
The Company may use both persistent and session cookies; persistent cookies remain on your computer after you close your session and until you delete them, while session cookies expire when you close your browser. You can configure your browser to stop accepting cookies or to prompt you before accepting a cookie from any website you visit. If you do this, it’s possible that Pikiz might not work as well.
2- Information you provide us by registering for an account
II. HOW WE USE AND SHARE INFORMATION
In general, the Personal Information you provide to us is used to help us communicate with you. For example, we use Personal Information to contact users in response to questions, solicit feedback from users, provide technical support, and inform users about promotional offers.
III. HOW WE PROTECT INFORMATION
We implement security measures designed to protect your information from unauthorized access. Your account is protected by your account password and we urge you to take steps to keep your personal information safe by not disclosing your password and by logging out of your account after each use. We further protect your information from potential security breaches by implementing certain technological security measures including encryption, firewalls and secure socket layer technology. However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software. By using our Service, you acknowledge that you understand and agree to assume these risks.
IV. YOUR RIGHTS REGARDING THE USE OF YOUR PERSONAL INFORMATION
V. LINKS TO OTHER WEBSITES
VII. CONTACT US