We understand your concerns about privacy. We want you to understand what types of information we collect and what may happen to that information if you install the Deepstash application, visit the Deepstash Website or use any of the Deepstash Technologies.
USER ACCOUNTS AND COLLECTION OF INFORMATION
You are not required to create a user account or provide any personal information in order to visit the Deepstash website. You are required to create a user account, however, to use our application. During registration, you are required to provide a name, password and valid email address.
If you choose to share any articles, videos, or other content with another person, we will ask you to provide a valid email address for that person. We may also ask you to provide your username and password for third party websites in order to access the articles and information published on such sites. We also collect information if you contact us for support or help, submit an application or otherwise communicate with us. The information which you supply to us enables us to customize and enhance the services we provide to you. In addition, it helps us communicate with you about our news, events, promotions and new products.
COLLECTION OF INFORMATION AS PART OF USING DEEPSTASH SERVICE
In addition to the information that you provide to us when you register for a user account, we collect information about the URLs, titles and content of the web pages and other information you save to Deepstash. The types of information we collect includes your browser type, device type, time zone, language, and other information related to the manner in which you access the Deepstash Technologies. We also collect information about your use of the Deepstash Technologies so that we can provide our services.
In addition to the methods described above, we may also collect information using cookies or other technologies when you access our website or use Deepstash Technologies. You may decline our cookies if your browser permits, although in that case you may not be able to use certain features, you may be required to enter your password more frequently during a session, and you may be unable to install or use certain Deepstash Technologies. Cookies and other technologies make our Deepstash Technologies easier to use and help us customize and personalize the services we provide based on your interests and activities.
USE OF INFORMATION
We use your personal information to respond to your requests and perform our contract with you. We may do this, for example, by using your contact information to respond to your inquiries, to provide customer support and to supply any products or services you have requested. In addition, if you choose to use the Deepstash Technologies to share content with another person, we will use the recipient's email address or user account information to provide that service, but we will not use that email address for any other purpose.
SHARING OF INFORMATION
If you choose to make the content you save publicly available, we may share that information with others in accordance with the options you select. In addition, if you choose to use the Deepstash Technologies to share articles, videos, or other content with another person, we will send an email on your behalf to that person with a link to the content that you have chosen to share.
Working with third parties
We may work with trusted third parties to facilitate one or more aspects of the products and services that we provide to you and to conduct research related to Internet usage, and we may provide some of your personal information directly to these third parties. For example, as discussed above, we may use a third party payment processor to process payments for our paid subscription service. We may also share your device ID in working with third parties who assist us in delivering advertisements to you. These parties are subject to confidentiality agreements with us and other legal restrictions that prohibit their use of the information we provide to them for any other purpose other than those discussed above, unless you have explicitly agreed or given your prior permission to them for additional uses.
Sharing as required by law or asset sale
In the event that we or certain of our assets are acquired, user information may be included among the transferred assets.
Although we strive to protect the personal information of our users, we will release personal information if required by law or in the good-faith belief that such action is necessary. We follow the law whenever we receive requests about you from a government or related to a lawsuit. We will notify you when we are asked to hand over your personally identifiable information in this way unless we are legally prohibited from doing so. When we receive requests like this, we will only release your personally identifiable information if we have a good faith belief that disclosure is necessary or appropriate under applicable law. Nothing in this policy is intended to limit any legal defenses or objections that you may have to a third party's request to disclose your information.
We will keep your information only for as long as we need it to provide you services, manage our business or as required by law or contract.
TRANSFER OF INFORMATION
We have agreements with third parties and have adopted other security measures in place to protect against the loss, misuse and/or unauthorized alteration of the information under our control or under the control of our service providers. Your personally identifiable information is protected by utilizing both online and offline security methods, including firewalls, passwords and restricted physical access to the places where your information is stored. Although we use industry standard practices to protect your privacy, we do not promise, and you should not expect, that your personal information or private communications will always remain free from security issues. In the event of a security breach involving your personal information, we will make any legally required disclosures to you in the most expedient time possible and without unreasonable delay, consistent with the legitimate interests of law enforcement, or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system.
RIGHT TO ERASURE
You have the right to delete your account and erase your information and upon deleting your account, all your information will be removed from our production systems. Usually, only an encrypted copy of your Information will remain on our backup archives for 120 days, although we reserve the right to retain some of your information where there are valid grounds for us to do so under data protection laws. For example, for the defense of legal claims, respect freedom of expression, or where we have an overriding legitimate interest to do so.
You can delete your account by using the Delete account function in both our web and mobile app, as follows:
We do not offer services to, or target, persons under the age of 13. We do not knowingly collect personally identifiable information from children under 13. In compliance with the Children's Online Privacy Protection Act (COPPA), we will purge any information we receive from our database and cancel the corresponding accounts, if we discover that a child under 13 has provided us with personal information. If you are a parent or guardian and you are aware that your child has provided us with personal information by email or otherwise, please contact us so that we will be able to do the necessary actions.
Our product is intended for general use and has no restrictions on utilization by children. Deepstash DOES NOT contain any hazardous, violent or any other content (e.g. augment reality) that may require parental supervision.
Identity theft and the practice currently known as "phishing" are of great concern to Deepstash. Safeguarding information to help protect you from identity theft is a top priority. We do not and will not, at any time, request your username, password, credit card information or national identification number in an unsolicited e-mail or telephone communication. For more information about phishing, visit the Federal Trade Commission’s website.
AMENDMENTS TO POLICY
2035 Sunset Lake Road, Suite B-2
Newark, Delaware 19702
❤️ Brainstash Inc.