We may use Account Information, alone or together with other information, to enhance and improve the Services, such as by personalization.</p>Email Communications with Us<p>As part of the Services, you may occasionally receive email and other communications from us.
Administrative communications relating to your Account (e.g., for purposes of Account recovery or password reset) are considered part of the Services and your Account, which you may not be able to opt-out from receiving.
We also may send you other kinds of emails, which you can opt-out of either from your by using the “Opt-Out” link in the emails themselves.</p>User Content<p>By default, all sharing through the Services is public, and when you provide us with content it is published so that anyone can view it.
Content published and shared publicly is accessible to everyone, including search engines, and you may lose any privacy rights you might have regarding that content.
In addition, information shared publicly may be copied and shared throughout the Internet, including through actions or features native to the Services.</p>Financial Information<p>We will sometimes collect financial information, such as information related to your payment method (valid credit card number, type, expiration date or other financial information).
This happens when you decide to purchase a Paid Service.
We do not, however, store that financial information.
We do receive certain information from our Payment Processor: (1) a unique token that we connect with your Account to enable you to make further purchases using the information stored by our Payment Processor and (2) in certain cases, the last four digits of the credit card number associated with that token, so that we can prevent fraudulent transactions and identity theft.</p>Information Related to Use of the Services<p>We collect information about how people use the Services, including those with an Account.
This type of information may be collected in our log files each time you interact with (i.e., make a request to) the Services.
We use internal tools and third party applications and services (like Google Analytics) to collect and analyze this information.
Some of this information may also be associated with the Internet Protocol Address (“IP Address”) used to access the Services.
some may be connected with your Account.
and some may only be collected and used in aggregate form (as a statistical measure that wouldn’t identify you or your Account).
We may also collect your IP Address when you make a project or upload a sticker as a means of fighting spam, malware, identity theft and generally keeping our users safe.</p>Information Related to Your Web Browser or Mobile Device<p>We automatically receive and record information from your web browser or Mobile device when you interact with the Services, such as your browser or device type and version, what sort of device you are using, your operating system and version, your language preference, the website or service that referred you to the Services, the date and time of each request you make to the Services, your screen display information, and information from any cookies we have placed on your web browser (as described below).</p>Information Collected Using Cookies and Web Tags<p>Cookies are text files that may be sent to and saved by your web browser when you access a website.
your web browser stores these cookies in a way associated with each website you visit, and you can generally see your cookies through your browser settings, depending on what browser you’re using.
A web tag is code or a pixel embedded in a web page, or email, that allows Podyssey or a third party to see that you have looked at that page.
We may also store unique or near-unique identifiers that we associate with your Account in our cookies.
This information, in turn, is sometimes used as described above in “Information Related to Use of the Services.” Most web browsers have an option for turning off the cookie feature, which will prevent your browser from accepting new cookies, as well as (depending on the sophistication of your web browser) allowing you to decide on acceptance of each new cookie in a variety of ways.</p>
<p>Some services that we use (including Third Party Services), such as Google Analytics, use web tags and may also place their own cookies on your browser, and individual blogs on our network may contain code that places their own cookies.
We also run limited-time studies using web tags, sometimes with third parties, to, for example, measure the effectiveness of our advertising or email.
or © that information is aggregate information or other information that does not identify you.</p>Information Shared with the Public Through the Services<p>As noted in “User Content” above, by default, content published through the Services and many actions you take on the Services are shared with the public.
Because this kind of information can be seen by anyone and may be indexed by search engines (like Google Search), you should be careful about what you choose to disclose publicly and make sure it’s information you want to share with everyone.</p>
<p>####Information You Share with Third Party Services You may access Third Party Services through the Services, for example by clicking on externally-pointing links.
You may also choose to share information that you provide to us, like blog posts, with those Third Party Services (for example, by sharing posts to Twitter or Facebook).
For example, we may share information with service providers in order to fight spam, and third-party consultants may have access to information in the process of improving our processes and technology.
Agents with whom we share such information for these reasons are generally bound by confidentiality obligations and, unless we tell you differently, our Agents do not have any right to use information we share with them beyond the scope and duration of what is necessary to assist us.</p>Information Disclosed Pursuant to Business Transfers<p>In some cases, we may choose to buy or sell business assets.
In these transactions, user information is typically one of the transferred business assets.
Moreover, if we, or substantially all of our assets, were acquired, or if we go out of business or enter bankruptcy, user information would be one of the assets that is transferred or acquired by a third party.
You acknowledge that such transfers may occur, and that any acquirer of us or our assets may continue to use your Personal Information as set forth in this policy.</p>Information Disclosed for Our Protection and the Protection of Others<p>We believe in freedom of expression, and, to the extent reasonable, we try to protect our community from baseless legal demands.
We may enable additional security features in the future, like multi-factor authentication.
You need to prevent unauthorized access to your Account and information by creating a unique, secure, and protected password and limiting access to your computer and browser by signing off after you have finished accessing your Account on the Services.
We seek to protect your information (including your Account Information) to ensure that it is kept private.
however, we can’t guarantee the security of any information.
Unauthorized entry or use, hardware or software failure, and other factors may compromise the security of user information at any time.</p>What Information You Can Access<p>If you are a registered user, you can access most information associated with your Account by logging into the Services and checking your Account Settings page.
Registered and unregistered users can access and delete cookies through their web browser settings.</p>How to Delete Your Account and What Happens When You Delete Your Account<p>If you want to delete your Account, you can do so by emailing us at email@example.com and providing proof of authority over the Account.
What constitutes “proof of authority” will vary depending on the circumstances, but generally will require sufficient identifying information so that we can be confident you are the Account owner.