1. How we collect information
We collect information in the following basic way:
When you browse or use our service, technological tools including "Log Data" and "Cookies" collect certain information, as explained in the following section.
2. What information we collect and how we use it
Log Data: When you visit the service, whether as a registered user or a non-registered user just browsing, our servers automatically record information that your browser sends whenever you visit a website ("Log Data"). This Log Data may include information such as the browser type or the webpage you were visiting before you came to our service, pages of our service that you visit, the time spent on
those pages, information you search for on our service, access times and dates, and other statistics. We use this information to monitor and analyze use of the service and the service's technical administration, to increase our service's functionality and user-friendliness, and to better tailor our service to our visitors' needs. For example, some of this information is collected so that when you visit the service again, it will recognize you and the information could then be used to serve advertisements and other information appropriate to your interests. We also use this information to verify that visitors to the service meet the criteria required to process their requests.
3. Sharing of your information
Aggregate Information and Non-Identifying Information: We may share aggregated information that does not include personal information and we may otherwise disclose Non-Identifying Information and Log Data with third parties for industry analysis, demographic profiling and other purposes. Any aggregated information shared in these contexts will not contain your personal information.
Service Providers: We may employ third party companies and individuals to facilitate our service, to provide the service on our behalf, to perform service-related services (e.g., maintenance services, database management, web analytics and improvement of the Service's features) or to assist us in analyzing how our service are used. These third parties have access to your personal information only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.
Compliance with Laws and Law Enforcement. CybChain cooperates with government and law enforcement officials and private parties to enforce and comply with the law. We can disclose any information about you to government or law enforcement officials or private parties as we, in our sole discretion, believe necessary or appropriate to respond to claims and legal process including, but not limited to, subpoenas, to protect the property and rights of CybChain or a third party, to protect the safety of the public or any person, or to prevent or stop activity we may consider to be, or to pose a risk of being, illegal, unethical or legally actionable activity.
Business Transfers. CybChain may sell, divest, transfer, assign, share or otherwise engage in a transaction that involves, some or all of our assets, including any or all of the information described in this Policy, in the course of a corporate divestiture, merger, acquisition, joint venture, bankruptcy, dissolution, reorganization, or any other similar transaction or proceeding.
4. Your choices regarding information
You have several choices regarding the use of information on our service:
Cookies: If you decide at any time that you no longer wish to accept cookies from our service for any of the purposes described above, then you can instruct your browser, by changing its settings, to stop accepting cookies or to prompt you before accepting a cookie from the websites you visit. Consult your browser's technical information. If you do not accept cookies, however, you may not be able to use all portions of the Service or all functionality of the service.
5. Links to other sites and services
Our service contains links to other third-party websites and online services. If you choose to visit another website or online service by clicking on a link, you will be directed to that third party's website or online service. The fact that we may link to a website or online service is not an endorsement, authorization or representation of our affiliation with that third party, nor is it an endorsement of their privacy or information security policies or practices. We do not exercise control over third party websites and online services, and these third parties may place their own cookies or other files on your computer and collect data or solicit Personal Information and Non-Identifying Information from you. Other sites and online services follow different rules regarding the collection, use and/or disclosure of Personal Information and Non-Identifying Information. We encourage you to read the privacy policies or statements of the other websites or online services you visit before providing any information or using such websites or services.
6. How we store and protect information
Information Security: We care about the security of your information. We use commercially reasonable safeguards to preserve the integrity and security of information collected and maintained through the service. However, we cannot ensure or warrant the security of any information you provide to us or guarantee that information on the service may not be accessed, disclosed, altered, or destroyed by unauthorized persons.
Phishing: Identity theft and the practice currently known as "phishing" are of great concern to CybChain. Safeguarding information to help protect you from identity theft is a top priority. We do not request your credit card information, login information, or national identification numbers in a non-secure or unsolicited e-mail or telephone communication. For more information about phishing, visit the Federal Trade Commission's website.
Breach Notification: We will make any legally required disclosures of any breach of the security, confidentiality, or integrity of stored "personal data" (as defined in applicable state statutes on security breach notification) to you via email or conspicuous posting on this Service in the most expedient time possible and without unreasonable delay, insofar as consistent with (i) the legitimate needs of law enforcement or (ii) any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.