Updated July 25, 2012
To better protect your privacy, we provide this notice explaining our privacy practices and the choices you can make about the way your information is collected and used by Bonnier.
Bonnier adheres to the U.S. Department of Commerce Safe Harbor framework and the privacy principles of Notice, Choice, Onward Transfer, Security, Data Integrity, Access, and Enforcement. For more information on the framework, please visit th. Safe Harbor website
We collect but do not link personal and activity data.
We use technologies like cookies (small files stored by your browser), web beacons, or unique device identifiers to anonymously identify your computer or device so we can deliver a better experience. Our systems also log information like your browser, operating system and IP address.
Our systems are not designed to associate personal information with your activities outside of our websites and applications (such as pages you view or things you click on or search for).
We do not knowingly contact or collect personal information from children under 13. If you believe we have inadvertently collected such information, please contact us so we can promptly obtain parental consent or remove the information.
We do not use or collect your precise geographic location. We may keep data indefinitely. We do not allow advertising companies to collect data through our service for ad targeting but may choose to do so in the future.
How we use the information we collect.
We may transfer your sensitive personally-identifying information to other Bonnier offices for internal management and administrative purposes. In addition, your personal data will be transferred to other Bonnier offices where necessary for the performance or conclusion of our contractual obligations to you or for your benefit. Transfers of personally-identifying information may also be made where necessary for the establishment, exercise, or defense of legal claims.
Bonnier will only share your sensitive personal information with outside companies or individuals in any of the following limited circumstances.
- When we have a good faith belief that access, use, preservation, or disclosure is necessary to (a) comply with applicable law, regulation, or legal process; (b) enforce the applicable Terms of Service or other agreements and policies on the Company's Websites; (c) detect, prevent, or otherwise address fraud, security, or technical issues; or (d) protect against imminent harm to the rights, property, or safety or Bonnier, its users, or the public as required or permitted by law.
- When you consent. Before we share your sensitive personal information outside of the previously listed circumstances, we will ask you for permission first. Please note that this only applies to sensitive information, as defined above.
We may also use, transfer, sell, and share aggregated, anonymous data about our users for any legal purpose, such as analyzing usage trends and seeking compatible advertisers and partners. In no event will this aggregated data contain any information that could be used to identify individual users of our products or services.
How we protect the safety and integrity of the information we collec.
We take appropriate physical, electronic, and procedural measures to safeguard and protect your personal information. We use a variety of security measures, including Secure Sockets Layer (SSL) encryption to protect of your personal information.
Regardless of these measures, no system connected to the Internet or data transmission sent over the Internet can be guaranteed to be 100% secure. We will provide notice if we become aware of any security breach that may affect any sensitive personal information pertaining to you that we have stored on our systems.
Bonnier only collects personal information that is relevant to the purposes for which it will be used. Though we do take appropriate steps to review and update the information that we store to ensure that it is accurate, complete, and current, we also depend on you to update or correct your personal information when necessary.
In some limited circumstances, such as to resolve disputes, troubleshoot problems, and enforce our policies, we may retain some of information that you have requested us to remove. Therefore, you should not expect that all of your personal information will be completely removed from our databases in response to your requests..
We only use the information we collect for purposes consistent with this policy. If we propose to use your personal information for purposes beyond that explained in this policy, we will provide appropriate notice before doing so and we will provide you with the means to opt out of those uses. We will not use your sensitive personal information for any purposes other than those described in this Policy unless we have obtained your consent.
Information we collect may be stored or processed on computers located in any country where we do business.
Analytics providers access data on our behalf.
Analytics companies may access anonymous data (such as your IP address or device ID) to help us understand how our services are used. They use this data solely on our behalf. They do not share it except in aggregate form; no data is shared as to any individual user. Click to see company privacy policies that govern their use of data.
Flurry Analytics provides accurate, real time data to developers about how consumers use their mobile applications, as well as how applications are performing across different handsets. Application developers receive anonymous, aggregated usage and performance data, as well as robust reporting and analysis tools. With this data, developers can identify issues and opportunities, create a more informed product roadmap, increase retention and grow their user base.
You can review more privacy-related information.
Enforcement and Compliance with this Privacy Polic.
415 Jackson St.
San Francisco, CA 94117
If we receive a complaint from you, we will contact you in an attempt to address your concerns. If we are not able to resolve a complaint, we will participate in appropriate independent recourse mechanisms as necessary.