Effective July 1st, 2009
1. Information we collect and how we use it
In order to provide our services, we may collect the following types of information:
Information you provide – When you register for a Smesh account, we ask you for personal information (such as your name, email address and an account password). For certain services, which are provided to our Paid User Account, we also request credit card or other payment account information which we maintain in encrypted form on secure servers. We may combine the information you submit under your account with information from third parties in order to provide you with a better experience and to improve the quality of our services. For certain services, we may give you the opportunity to opt out of combining such information.
Non-personal Information – Smesh also gathers non-personal information through aggregated tracking information through our website or widgets. This non-personal information collected includes user actions, IP addresses, browser information, and usage data. This non-personal information allows us to better tailor our content to site users’ needs.
User communications – When you send email or other communications to us, we may retain those communications in order to process your inquiries, respond to your requests and improve our services.
Being used for identification and authentication, billing;
Providing our services, including the display of customized content and advertising;
Auditing, research and analysis in order to maintain, protect and improve our services;
Ensuring the technical functioning of our network;
Protecting the rights or property of Smesh or our users; and
Developing new services.
2. Choices for personal information
Most browsers are initially set up to accept cookies, but you can reset your browser to refuse all cookies or to indicate when a cookie is being sent.
You can decline to submit personal information to any of our services, in which case Smesh will not be able to provide those services to you.
3. Information sharing
We will not shares your personal information with other companies or individuals outside of Smesh except in the following limited circumstances:
We have your consent. We require opt-in consent for the sharing of any sensitive personal information.
We have a good faith belief that access, use, preservation or disclosure of such information is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or enforceable governmental request, (b) enforce applicable Terms of Service, including investigation of potential violations thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues, or (d) protect against harm to the rights, property or safety of Smesh, its users or the public as required or permitted by law.
We are involved in a merger, acquisition, or any form of sale of some or all of its assets. In such a case we will ensure the confidentiality of any personal information involved in such transactions.
4. Information security
No data transmissions over the Internet can be guaranteed to be 100% secure. Therefore, we cannot ensure or warrant the security of any information you transmit to us and you do so at your own risk. Once we receive your transmission, we make reasonable business efforts to ensure security on our systems. We use secure server software (SSL) and firewalls to protect your information from unauthorized access, disclosure, alteration, or destruction. However, we cannot guarantee that such information may not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software.
In the event that Smesh learns of a security systems breach we may attempt to notify you electronically so that you can take appropriate protective steps. If this happens, you will need a web browser enabling you to view the smesh.net or deepwidget.com websites.
5. Accessing and updating personal information
When you use Smesh services, we make good faith efforts to provide you with access to your personal information and either to correct this data if it is inaccurate or to delete such data at your request if it is not otherwise required to be retained by law or for legitimate business purposes. You will be required to identify yourselves and the information requested to be accessed, corrected or removed before processing such requests, and we may decline to process requests that are unreasonably repetitive or systematic, require disproportionate technical effort, jeopardize the privacy of others, or would be extremely impractical (for instance, requests concerning information residing on backup tapes), or for which access is not otherwise required.