LAST UPDATED 24TH, MAY 2021
Information you provide
When you sign up for any Jeroid Service or promotion that requires registration, we ask you for personal information (such as your name, email address and an account password). For certain services, such as our payment services, we require your debit or credit card information. We typically do not store this information and when we do, we maintain the data in encrypted form on secure servers. We may combine the information you submit under your account with information from other third parties in order to provide you with a better experience and to improve the quality of our services. For certain services, we may give you the opportunity to opt out of combining such information.
When you access Jeroid, our servers automatically record information that your browser sends whenever you visit a website.
When you send email or other communications to Jeroid, we may retain those communications in order to process your inquiries, respond to your requests and improve our services.
- Providing our services to users, including the display of customized content.
- Auditing, research and analysis in order to maintain, protect and improve our services.
- Ensuring the technical functioning of our network.
- Developing new services.
Jeroid Data Protection Policy refers to our commitment to treat information of employees, customers, stakeholders and other interested parties with the utmost care and confidentiality. With this policy, we ensure that we gather, store and handle data fairly, transparently and with respect towards individual rights.
This policy refers to all parties (employees, customers, suppliers, Merchants etc.) who provide any amount of information to us. Who is covered under the Data Protection Policy? Employees of our company and its subsidiaries must follow this policy. Contractors, consultants, partners and any other external entity are also covered. Generally, our policy refers to anyone we collaborate with or acts on our behalf and may need occasional access to data.
As part of our operations, we need to obtain and process information. This information includes any offline or online data that makes a person identifiable such as names, addresses, usernames and passwords, digital footprints, photographs, social security numbers, financial data etc. Our company collects this information in a transparent way and only with the full cooperation and knowledge of interested parties. Once this information is available to us, the following rules apply. Our data will be:
- Accurate and kept up to date.
- Collected fairly and for lawful purposes only.
- Processed by the company within its legal and moral boundaries.
- Protected against any unauthorized or illegal access by internal or external parties.
Our data will not be:
- Communicated informally.
- Stored for more than a specified amount of time.
- Transferred to organizations, states or countries that do not have adequate data protection policies.
- Distributed to any party other than the ones agreed upon by the data’s owner (exempting legitimate requests from law enforcement authorities).
In addition to ways of handling the data the company has direct obligations towards people to whom the data belongs. Specifically, we must:
- Let people know which of their data is collected.
- Inform people about how we’ll process their data.
- Inform people about who has access to their information.
- Have provisions in cases of lost, corrupted or compromised data.
- Allow people to request that we modify, erase, reduce or correct data contained in our databases.
To exercise data protection, we’re committed to:
- Restrict and monitor access to sensitive data.
- Develop transparent data collection procedures.
- Train employees in online privacy and security measures.
- Build secure networks to protect online data from cyberattacks.
- Establish clear procedures for reporting privacy breaches or data misuse.
- Include contract clauses or communicate statements on how we handle data.
- Establish data protection practices (document shredding, secure locks, data encryption, frequent backups, access authorization etc.).