Information We Collect and How We Use ItThe type of information we collect depends upon the product or service we are providing to you.
Information you provide – Personal information that you provide on applications and other forms in connection with your relationship with us for our products or services. This information may include indentifying information (such as your name, email address and other information) as well as transactional information or other personally identifiable information which can include sensitive data.
Cookies – When you visit our websites or online services, we may send one or more cookies – a small file containing a string of characters – to your computer or other device that uniquely identifies your browser and session. We use cookies to provide the service and improve the quality or user experience of our service.
Log information – When you access our websites or online services, our servers automatically record information that your browser sends whenever you visit a website. These server logs may include information such as your web request, Internet Protocol address, browser type, browser language, the date and time of your request and other header information.
User communications – When you send email or other communications to us, we may retain those communications in order to process your inquiries, respond to your requests and improve our products or services.
Other sites – This Privacy Policy applies to our products or services only. We do not exercise control over the sites of third parties that link from within our various websites or online services. These other sites may place their own cookies or other files on your computer, collect data or solicit personal information from you. These other sites may have different privacy practices and we encourage you to read their privacy policies.
We only process personal information for the purposes described in this Privacy Policy. In addition to the above, such purposes include:
Providing our products or services;
Auditing, research and analysis in order to maintain, protect and improve our products or services;
Ensuring the technical functioning of our network;
Protecting the rights or property of ourselves or our users; and
Developing new products or services.