Your privacy is of critical importance to us. We collect and use data strictly in accordance with best practices and relevant laws. We collect the minimum information necessary and retain your data only for as long as is necessary to provide our services, or until you tell us to delete it. Your data is never sold or given to Third Parties.
If you do not agree with our policy, please do not access, or use our products.
In the course of our business we may collect information from and about you, your end-users and the use of our products. In general:
Data that relates to or identifies you or your End-users is owned by you;
User Content such as content submitted by you into forms or surveys is owned by you;
Data associated with your use of our products is owned by us; and
Data which cannot reasonably be attributed to you or an End-user (through anonymisation) is owned by us.
You have the right to know what we collect and have collected about you. You have the right to opt-out of providing us information and you have the right to request its removal. We may however not be able to provide you with our products in these circumstances.
As a provider of cyber safety products to schools we act as a school official, operating under your direction and control. In this capacity, we have a legitimate educational interest in the collection, use, disclosure, and retention of information with respect to your students and staff.
In providing our products to schools we will collect personally identifiable information with respect to students, their parents and guardians and school staff (“School PII”).
You own the School PII provided to us.
Our privacy policies extend to any School PII collected by us, including that associated with school staff.
We are committed to complying with the Family Education Rights and Privacy Act (“FERPA”) and the Children’s Online Privacy Protection Act (“COPPA”) in all applicable respects with regards to the collection, use, disclosure, and retention of School PII.
We have also taken the Student Privacy Pledge introduced by the Future of Privacy Forum (FPF) and The Software & Information Industry Association (SIIA).
Specifically, we will never sell, rent, or disclose School PII relating to students to third parties.
We acknowledge that as a school, you have various specific obligations with respect to privacy and in particular in relation to student PII. We need you to meet your obligations so we can meet ours. We require you to obtain and maintain all necessary consents with respect to your access, use and disclosure of School PII to us.
When you register students or a staff for use of our products we will also ask for information about their role in your school or class and for identifiers such as student IDs or student email addresses.
If you require us to use third party services such as Google Education then we will also capture identifiers to permit us to interact with those third party services strictly only for the purposes of supporting your requirements such as user authentication.
If you wish for us to communicate with the school community then we will capture names and contact details associated with your student’s families.
We may capture other PII in relation to students where you specifically authorize us to do so.
We use PII to provide products to you. Other than with consent, we only disclose School PII to comply with the law or a court order, or a legal process, with a third party in the event we transfer our business, to protect the safety of users or others or the security of our site, and with our third party service providers solely to enable the provision of our products and services to you. If we share School PII pursuant to a court order or legal process, we will provide you with notice unless notice is expressly prohibited by law or court order. Our third-party providers will also not share or use your School PII for any other purpose except providing our products and will maintain reasonable security procedures and practices.
We will use School PII that has been de-identified to improve our products.
By default, we store school Cyber Safety Data for 12 months. You may request us to extend the period. Where you do so, and where we can do so, then:
You acknowledge that you are responsible and agree to indemnify us and hold us harmless whatsoever, for any implications under relevant privacy laws in relation to the duration of storage of personally identifiable information; and
We may offer you advanced cyber safety and security technology, not available to personal account holders. Such technology provides greater interception and inspection capability.
You are responsible for the efficacy and disclosure of your use of such services to affected parties.
We only accept requests to review, change or remove PII from our main contacts with your and your identified administrators. Parents or legal guardians who request changes to or removal of your PII should go through you.
We will not directly market our products or offers to parents/guardians associated with your users without your permission unless we have permission from them or another valid source. We will not knowingly market to students or engage in targeted advertising. We will also not engage in targeted advertising on any site based on information we receive through our agreement. We will not use information gathered through our agreement to amass a profile about a student except in furtherance of the purposes of our agreement with you.
Our products permit you to refer parents / guardians to us to create personal accounts with us. When doing so, you are obliged to have or obtain consent from them before taking this action. To enable verification of these parent personal accounts and association of students we may seek permission from you to interface to school systems (or third party systems). Such access may be revoked by you at any time.
For the purpose of clarity, Cyber Safety Data collected during the application of school policies is owned by the school (not the associated parent) and is subject to our agreement with you.
Sharing of safety data is subject to an opt-in by each party, which can be revoked at any time.
Contacts: When you sign-up we will ask for information to establish an account including your name and contact details. If you are a company or business, we will ask you for your business and tax registration details.
Addresses: We do not typically seek your address however we may if you order a physical product; if you request on-site support; if we need to communicate to you in writing or if our payment provider requires your address, post code or zip for verification purposes.
Payment Method: If you are paying us via electronic funds transfer, we will require a payment method (such as a credit card). We do not store this information. We will pass you to a compliant payment gateway.
Timezone: When you sign up we will capture your time zone. If we can, we will estimate this through geo-IP (through your internet session). We need timezone to enable us to pre-configure our Products for you and for your account to function.
Support: When you use our support channels we will capture the information you share with us through emails, support tickets, over the telephone or in online chat services.
Admin Users: When you sign up we will create an administrative user for your account. You may create additional administrative users. We will require their name and security information such as a password and PIN.
End-users: End-users are those persons that are affected by our products (e.g. authentication, filtering, device management). End-users may be students (at a school) guests on your network, your staff or you. When you register End-users we will ask for their name and we may ask for a PIN or password so we can provide custom access or features.
Credit Information: If you are a company or an unincorporated organization we may complete a credit review on you and source information available publicly or properly available for such purposes from credit reporting, law enforcement or government agencies.
Resellers: We provide our products through resellers such as telecommunications companies and technology vendors. If you have purchased our products through a reseller then they may pass to us your account set up information and in some circumstances End-user and device registration information. We require our resellers to have authorization from you before doing so.
Submissions: We may provide opportunities for you or your users to post submissions in a forum, comments in a blog, or to complete surveys and forms. These services are inherently public, and we are not responsible for what is submitted or any third-party use of what has been submitted.
Sensitive Information: Unless permitted by law and requested by you or required by law, we will not deliberately record or use sensitive information. For the purpose of this policy sensitive information means information or an opinion about an individual’s racial or ethnic origin; political opinion; membership of a political association; religious beliefs or affiliations; philosophical beliefs; membership of a professional or trade association; membership of a trade union; sexual preferences or practices; or criminal record.
Our products enable you to monitor and control the use of the internet and devices by end-users. This includes use of networks and devices not owned by you. Our products necessarily capture usage and device information. We call this Cyber Safety Data and it may include:
Internet Usage: Use of the internet including online search terms, sites visited and blocked and related meta-data such as device, protocol, website, location, time and date.
Mobile Apps: Use of applications, including what applications are installed or attempted to be installed, are used and for how long, are blocked or permitted to be used and related information such as device details, time and date.
Device Location: Geo-location information derived from GPS services available on smart devices.
Activities: Actions taken or patterns of actions which are indicative of behaviour. For example, if an End-user installs or deletes an App. Such actions can be logged by us and made available to you.
Diagnostic Information: Our products log system level activities. We capture this information for quality assurance purposes only. It is stored for a short period of time.
Transactional records: Our products log certain transactions for the purpose of notifying and reporting system events. For example, where a device connects to your network or an end-user seeks to borrow a device. Transactional data is required for the function of our products.
Web Analytics: Like most organizations, we use automatic data collection technology (such as Google Analytics) when you visit our websites. We may collect information such as your IP address, Internet service provider, browser type, operating system and language, referring and exit pages and URLs, date and time, amount of time spent on particular pages, what sections of the website you visit, number of links you click while on the website, search terms, and other data. This information is collected automatically and anonymized. By accessing and using our website, you consent to the processing of this data by our analytics partners in the manner and for the purposes set out in this policy. Analytics are collected through services we obtain from 3rd party providers, such as Google. Where possible we will provide at familyzone.com/tracking details of our providers and guidance on how to opt-out from data collection.
School information systems: For your convenience we may offer you the ability to interface our systems into school information systems (or integrators) for the purpose of enabling features such as enabling our systems to be aware of students and their schedules. Where you choose to enable our access, we will retrieve only the information necessary to perform services you’ve requested. Our access may be revoked by you at any time.
We use Apple Mobile Device Management (‘MDM’) in some of our products. MDM is a powerful tool which allows remote access to devices to monitor and control the functions available on them.
We use MDM for specific and limited purposes in the delivery of products to parents and schools (collectively ‘you’, ‘your’). We only ever use MDM for the purposes of providing the products requested by you which may be:
Scanning Apple devices for new Apps so we can notify you;
Enabling or disabling access to device features such as the camera; screenshots; access to erotic content and so on; and
Delivering a VPN profile to enable our web filtering services.
Account holders may disable any or all of these functions individually within their account.
Unless required by law or with your express consent, we will never sell or disclose any data collected by MDM to any 3rd party.
We collect and process information about you only where we have legal basis for doing so. We collect, use and process your information only where:
We need it to provide, operate, support, personalize and protect the products you have requested from us;
We have a Legitimate Business Reasons for doing;
You have given us consent to do so for any other specific purpose; or
We need to do so to comply with a legal obligation.
How we use the information we collect depends on the information and products you use. Below are the specific purposes for which we use the information we collect.
To provide you with the features available in our products;
To deliver you physical products;
To direct third parties to you where you have requested us to do so;
To personalize your experience;
To bill and take payments from you;
To let you know about events which we reasonably believe you need to know about or you have asked us to tell you about;
To provide you with advice and details on features and offers we reasonably believe may be of interest to you;
To let you know about third party services (subject to your opt-in) we believe you may be interested in;
To monitor and analyse the quality and performance of our products and customer satisfaction with them;
To support our ongoing research and development efforts;
To support our products including resolving queries and technical issues, troubleshooting and repair;
To support our security measures (such as verifying accounts and activity); and
To comply with relevant laws and regulations and to protect our legitimate legal rights.
With your consent we may use information about you for specific purposes not listed above. For example, we may publish testimonials or featured customer stories with your permission.
We will not sell your information to third parties so they can market their products to you or gain insights into you or your and your end user’s preferences.
In order to deliver to you the services requested and for us to meet our obligations we may from time to time share your information with others as described below.
Related companies: As a global company we have a number of corporate entities. We may need to share your information among these related companies. We will do so only to support your use of our products.
Service partners: You may request products that require us to direct you to third party providers such as cyber safety experts and providers of technology and equipment. If so, we will need to share relevant information with them. We try to only work with reputable organisations and when we partner with them, we require them to have privacy policies reasonably in line with ours. We cannot however be responsible for their information handling practices.
Operational service providers: We work with third-party service providers to provide website and application development, hosting, maintenance, backup, storage, virtual infrastructure, payment processing, analysis customer, technical and sales support services. If a service provider needs to access information about you to perform services on our behalf, they do so under instruction from us, including abiding by policies and procedures designed to protect your information.
Resellers: We provide our products through third party resellers such as telecommunications companies and technology vendors. If you have purchased our products through a reseller then we will exchange information with them for the purpose of setting up your account, billing you and other operational purposes.
App stores: Where you acquire or download our products from app stores (e.g. Google Play, Google Web Store or Apple App Store) we will exchange limited information with them to support the app, extension or application’s installation, update, support and operation. You will be required to agree terms including privacy terms with the relevant store or marketplace owner. The information you share with them is governed by their privacy policies, not ours.
Third party sites: Our products may contain links to websites owned or operated by third parties. Your use of sites and services and any information you submit to them is governed by their privacy policies, not ours.
Parents: Where both a parent (account holder) and a school (account holder) opt-in then we will share limited information between them with respect to relevant students. What information and how we share it is set out in this policy.
Hot-spots: When end-users connect to our networking products (e.g., access points, network gateways) an authentication process will be triggered. Device and/or authorization tokens/certificates or a sign-in will allow our products to identify an end-user (where possible). This is fundamental for the operation of our products. Once registered, devices can be recognized by participating network gateways. We may share your end-users masked names (first name and first initial of last name) and device identification information where they connect to participating networks.
Shared end-users: Should you request to share cyber safety control of an end-user with another account holder then we will disclose your name to that other party. This is required to assist them to judge whether your request should be granted.
Specific consent: We share information about you with third parties when you give us specific consent to do so. For example, testimonials.
Forums: If you choose to participate in a forum or comment in a blog or wiki provided by us, then the membership of the relevant resource will have access to your submissions. If the resource is public then your submissions will be public.
Legal reasons: We may disclose your information without your consent if we reasonably believe that doing so is necessary to:
Business transfer: We may share or transfer information we collect under this policy in connection with any merger, sale of company assets, financing, or acquisition of all or a portion of our businesses to another company. You will be notified via email and/or a prominent notice if such an event takes place, as well as any choices you may have regarding your information.
We use reputable data hosting service providers to host the information we collect, and we use technical measures to secure your data.
While we implement safeguards designed to protect your information, no security system is impenetrable and due to the inherent nature of the Internet, we cannot guarantee that data, during transmission through the Internet or while stored on our systems or otherwise in our care, is absolutely safe from intrusion by others. We will respond to requests about this within a reasonable timeframe.
Accordingly, we may transfer, process and store some of your information outside of your country of residence. We will only do so for the purpose of providing you products. Whenever we transfer your information, we will take steps to protect it and we will capture, store and deal with it in accordance with this policy.
Some of the third parties described in this policy, which provide services to us under contract, are based in countries other than yours. These other countries may not have equivalent privacy and data protection laws to the country in which you reside. Where international third parties are in possession of your information, we will take reasonable steps to ensure they use and manage it in a manner consistent with this policy.
We take information security seriously and have implemented a security program including administrative, technical, physical and managerial measures that is reasonably designed to protect the information we collect from loss, misuse and unauthorized access or disclosure. For example:
We utilize Secure Sockets Layering to encrypt communication between us.
We do not store your payment information. Instead we use a third PCI-DSS compliant party payment provider.
We require you to provide a unique username and set a password and other security measures from time to time such as PINs.
We hold passwords encrypted and cannot re-issue these (instead you must enter a new one).
Where reasonable we pseudonymize your information, and in particular End-user records.
We urge you to be diligent in securing your computing networks, devices, usernames and passwords. Should other parties obtain access to these or guess them (because they are too simple) then your information may be compromised.
For convenience we make certain technologies available to you to make it easier to log in to your account or be authenticated to access the network or internet. For example, cookies, remember-me and single-sign-on type technologies. If you use these technologies, then we urge you to use device PINs and to log off your device when you’re not using it.
If you intend to sell or return a device which you have used with us you should remove our application/s, log-out and clear the cache, all browsing information and cookies before doing so.
You are responsible for maintaining the confidentiality of your account access information and for restricting access to your computer or device through which an account is accessed.
We retain information to provide you with the services and features you have requested and to support the ongoing improvement of our products. We take steps to secure and obfuscate your identity and once it is no longer needed, to de-identify your information or delete it.
How long we keep information depends on the type of information collected.
We will keep information relating to you and your end-users for as long as it remains necessary for its identified purpose or as required by law, which may extend beyond the termination of our relationship with you. We retain de-identified information for as long as we consider necessary for our business purposes.
On cancellation of your account we will not automatically (unless required by law) delete or de-identify the information we hold relating to you or your end-users. We need to retain some of your account information to comply with our legal obligations such as ensuring we’re capable of resolving disputes, enforcing our agreements and collecting outstanding payments.
There is some information we hold on you which for legal and legitimate business reasons, we will not be able to delete, even if you request us to do so. For example, under taxation laws we need to maintain a record of your account and the financial transactions we’ve completed. We have obligations to retain information to ensure we’re capable of resolving disputes, enforcing our agreements and collecting outstanding payments.
When we delete information, it may continue to be stored in backup archives. We will securely store such information and isolate it from any further use until deletion or de-identification is possible.
If an End-user associated with your account is also an End-user in another account (e.g. a shared parenting arrangement or school student account) then deletion in your account will not automatically delete them in the other account.
Our standard policy is to store Cyber Safety Data for 30 days on personal accounts and 12 months for school & business accounts. After that time related records are aggregated and anonymized. We may offer you the option to extend this storage period.
For the purpose of quality assurance, or due to technical limitations we may capture temporal Cyber Safety Data even when end-users have set by you to be “not tracked”. We will however purge such data as soon as practical.
If you acquired our services through a reseller, cancellation of your account with us and requests for us to remove records of you will not automatically remove records of you in the reseller’s platforms. This is because you were a customer of theirs.
If you have elected to receive marketing emails from us, we retain information about your marketing preferences unless you specifically ask us to delete such information. We retain information derived from cookies and other tracking technologies for a reasonable period of time, from the date such information was created.
Notwithstanding the foregoing, Personally Identifiable Information stored by us, relating to End-users under the age of 18 will be deleted in all cases (to the extent that it is reasonably and commercially possible to do so) when it is no longer needed for the purpose for which it was collected.
You have a range of options available to you when it comes to your information. Below is a summary of those choices. Where you request action from us, we will respond within a reasonable timeframe.
Account information: You can access and modify the information in your account.
Delete End-users: You can delete End-users from your account. Please note if the End-user is also in another account (e.g. a shared parenting arrangement or school student account) then deletion will automatically delete them in both accounts.
Delete Avatars: You can delete end-user avatars from the product you loaded it into.
Request that we stop using your information: In some cases, you may ask us to stop accessing, storing, using and otherwise processing your information where you believe we don't have the appropriate rights to do so. For example, if you believe an account was created for you without your permission or you are no longer an active user, you can request that we delete your account as provided in this policy. Where you gave us consent to use your information for a limited purpose, you can contact us to withdraw that consent, but this will not affect any processing that has already taken place at the time. When you make such requests, we may need time to investigate and facilitate your request. If there is a delay or dispute as to whether we have the right to continue using your information, we will restrict any further use of your information until the request is honored or the dispute is resolved.
Opt out of communications: You may opt out of receiving third party promotional communications from us in your account. You may opt out of our promotions by using the unsubscribe link within each email. Even after you opt out from receiving promotional messages from us, you will continue to receive transactional messages from us. You can opt out of some notification messages in your account.
Turn off Cookie Controls: Relevant browser-based cookie controls are described in our Cookies & Tracking Notice.
Send "Do Not Track" Signals: Some browsers have incorporated "Do Not Track" (DNT) features that can send a signal to the websites you visit indicating you do not wish to be tracked. Because there is not yet a common understanding of how to interpret the DNT signal, our Services do not currently respond to browser DNT signals. You can use the range of other tools we provide to control data collection and use, including the ability to opt out of receiving marketing from us as described above.
Set End-users to “Do Not Track”: We offer you the ability to disable tracking of some Cyber Safety Data in your account.
Data portability: Data portability is the ability to obtain some of your information in a format you can move from one service provider to another (for instance, when you transfer your mobile phone number to another carrier). Should you request it, we will provide you with an electronic file of your basic account and end-user information.
Requesting a copy of your information: You may request a copy of information we hold on you. We will provide you with basic account level information without charge, Additional information may incur a reasonable charge. It may not be practical or proper to provide you some information (for example if fulfilling a request would reveal information about or owned by another party).
Requesting deletion of your information: You may request a deletion of information we hold on you. We will delete information where it is proper and practical to do so.
We are committed to transparency with respect to serious data breaches.
When a data breach occurs which is likely to result in serious harm to any individuals whose personal information has been breached, then we will notify the relevant affected individuals (and other parties as required by law) and advise:
Our identity and contact details;
A description of the data breach;
The kinds of information concerned; and
Recommendations about the steps the individual should take in response to the data breach.
We will not knowingly market to minors.
We will communicate with you through the contact details you provide to us. You agree that we can communicate with you electronically. Our standard communication mechanisms include email, smart device notifications, SMS, web chat and telephony.
If you are a personal account holder then you can change your contact settings in your account.
You may opt out of receiving third party promotional communications from us in your account.
You may opt out of our promotions by using the unsubscribe link within each email.
Even if you opt-out of marketing or promotional communications you will continue to receive transactional messages from us.
We may contact you about our products and offers or third-party products or services which we reasonably consider to be complimentary or may be of interest to you. You can opt out these communications. While we try to work with reputable partners, we do not control their privacy practices and cannot be held responsible for their actions or omissions.
We will not sell or provide your information to third parties so they can market their products or services to you.
We may from time to time use display advertising on the web and in platforms like Google and Facebook. Our advertising will only be aimed at supporting your engagement with cyber safety and education (such as topical information and insights) and maximizing what you get out of our Products (such as promoting features and events).
You may have options in your browser or through the websites you access to limit or avoid advertising. You may also be able to opt out of personalized advertisements through the Network Advertising Initiative or Digital Advertising Alliance's Self-Regulatory Principles for Online Behavioral Advertising. For more information about this practice and to understand your options, please visit: http://www.aboutads.info, http://optout.networkadvertising.org/ and http://www.youronlinechoices.eu.
SPAM is a common term for unwanted commercial electronic messages including emails, short messages, etc. In various countries around the world there are laws designed to inhibit the use of SPAM by commercial organizations.
We do not engage in SPAM;
We will not use false, or misleading subjects or email addresses;
We will identify marketing messages as such in a reasonable way;
We will include our registered address;
We will monitor Partner Marketing for compliance;
We will honor opt-out/unsubscribe requests in reasonable timeframes; and
We will provide opt-out unsubscribe options in relation to Partner Marketing.
We and our third party partners, such as our advertising and analytics partners, use various technologies to collect information, such as cookies and web beacons. In this notice we collectively describe these technologies as cookies.
Where strictly necessary. These cookies are essential. They enable our Products to function, for example remembering you are signed in.
For functionality. These cookies remember choices you make such as language or search parameters. We use these cookies to provide you with an experience more appropriate with your selections.
For performance and analytics. These cookies collect information on how users interact with our Products and enable us to improve how they operate. For example, we use Google Analytics cookies to help us understand how visitors arrive at and browse our products and website to identify areas for improvement such as navigation, user experience, and marketing campaigns.
For promotion. These cookies permit us or a social media site to record that you have visited or used our products. We may use these to promote products we offer. We will not sell access to our cookies or use them for the purpose of promoting third party services to you.
Many browsers include their own management tools for removing HTML5 local storage objects.
Please visit familyzone.com/tracking for more information.
The following information is provided for law enforcement entities seeking information about our account holders and End-users.
All law enforcement requests for information should:
Be directed to us at legal@family zone.com;
Be written in English;
Include all relevant identifiers to permit us to search our records;
State specifically what information is being requested, why it’s being requested and how it pertains to the investigation; and
State the applicable act, law or ruling under which the law enforcement agency is requesting the data.
In the event of an emergency involving the danger of death or serious physical injury to a person please ensure the subject is: Emergency Disclosure Request.
We will respond to valid, properly served legal processes to the extent required by law.
It is our policy to use commercially reasonable efforts to notify affected account holders when we receive legal process requests for user data. Generally, except where a court order (and not just the request for information itself) requires delayed notification or no notification, or except where notification is otherwise prohibited by law or where we, in our sole discretion, believe that providing notice would be futile, ineffective or would create a risk of injury or bodily harm to an individual or group, or to our property, we will endeavour to provide reasonable prior notice to the relevant user of the request for user data in the event the user wishes to seek appropriate protective relief.
Submissions via an End-user
The following relates to situations where an End-user discloses to us information through a contact or feedback form and which indicates an incident or an intention to cause harm to themselves or others (a “Disclosure of Harm”).
For the purpose of clarity:
We do not provide mental health, crisis, counselling, or support services. Where we receive a Disclosure of Harm, we will take reasonable steps as lay persons only; and
Where a Disclosure of Harm is indicative of serious threat to life, health or safety of an individual then we reserve our rights to disclose such information to relevant authorities, schools and parents/guardians, subject to our obligations under relevant privacy legislation.
Disclosures of imminent and serious threat to life, health or safety
Where an End-user discloses to us an Imminent and serious threat to life, health or safety then we will:
Seek to provide the End-user with details of relevant support services;
Make reasonable steps to identify the End-user, their School and their Parents (or guardians);
Make reasonable steps to contact the End-user’s School and Parents (or guardians); and
Contact the local police and request a welfare check.
In this context Imminent means a Disclosure of Harm indicative of a Foreseeable risk which requires immediate action, as inaction is likely to result in harmful activities and Foreseeable means a future risk which can be reasonably predicted based upon a result of inferred actions, occurring as a result from a disclosure which indicates a method of harm, or a specified time, date, time-frame or location of harmful act.
Other disclosures of threats to life, health or safety
Where an End-user otherwise discloses to us a serious threat to life, health or safety then we will:
Indications based on End-user activity
We may offer you features of our products which monitor End-user activity for the purpose of identifying risky behaviour (“Behavioural Insights”). Such features may identify behaviour indicative of self-harm.
We do not promise that these Behavioural Insights are complete or accurate. We do not promise to monitor them or escalate issues to you or relevant authorities.
This notice is directed at End-users of our Products.
End-users are registered to account holders. You may have a primary account holder e.g. your parent or employer. You may also be associated with other accounts such as where you are a party to a shared parenting arrangement or you’re a student at a school using our Services or you’re a guest on a network using our Services.
Account holders have the access to the information we hold on you and in particular the Cyber Safety Data related to you. This access is limited by and provided in accordance with this policy.
If you have queries with respect to the Products or your information, please direct your questions to the account holder/s administering you.
We may, from time to time and in our sole discretion, make changes to this policy. We will provide notice to you by email (if you have provided us with one) or when you sign in to your account for the first time after the change.
We will ask you to review and agree to the changes. If you agree to the changes, simply continue using the Products (which will be deemed acceptance of the updated policy). If you object to any of the changes, immediately notify us at the contact information below.
If you have any questions about this Privacy Statement, the information that we collect from you or your End-users, or the Products, please contact us at email@example.com.
You may also mail us at Privacy Officer
Linewize USA, 11545 West Bernardo Ct, San Diego CA, United States.
Linewize Australia, Level 3, 45 St George’s Terrace Perth WA Australia.