- What personally identifiable information is collected from you through Perfect Zero, how it is used, and with whom it may be shared.
- What choices are available to you regarding the use of your data.
- The security procedures in place to protect the misuse of your information.
- How you can correct any inaccuracies in the information.
Your Access to and Control Over Information
You may opt out of any future communication from us at any time. You can do the following at any time by contacting us via email email@example.com:
- See what data we have about you, if any.
- Change/correct any data we have about you.
- Have us delete any data we have about you.
- Express any concern you have about our use of your data.
Perfect Zero contains content generated by the Perfect Zero users. Theory 168 does not endorse any Perfect Zero users or content of any sort, nor is it responsible for Perfect Zero content. As such, Perfect Zero content may include occasional graphic, offensive, or inappropriate language, links, and images. We rely on our users to manage their Perfect Zero organization and maintain the safety and appropriateness of Perfect Zero content. Please immediately report any content you deem graphic, offensive, or inappropriate by emailing firstname.lastname@example.org.
Also, please be aware that we are not responsible for the content or privacy practices of sites that are linked to in Perfect Zero content. We encourage Perfect Zero users to be cautious when they leave our site and to read the privacy statements of any other site that collects personally identifiable information.
We take precautions to protect your information and data. Your Perfect Zero access credentials and data are digitally stored and protected from from unauthorized access. However, please note that your data may be visible to other Perfect Zero user in your organization. It is your responsibility as an admin of such organization to manage your users and data. Also please keep in mind that no Perfect Zero data can ever be completely safe from unauthorized access, unintentional sharing, targeted attack, or general theft. Therefore, we recommmend not storing information in Perfect Zero which you consider critically sensitive or secret.
Wherever we collect payment information, such as credit card data, that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in the address bar and looking for "https" at the beginning of the address of the web page. We do not store payment information in our databases. We rely on accredited payment services to handle the processing and ongoing storage (if any) of your payment information.
While we use encryption to protect sensitive information transmitted online, we also protect your information offline. Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.