Privacy policy

mlytics privacy & security policy

mlytics privacy & security policy

This Mlytics Privacy & Security Policy (“Policy”) outlines the general policy and practices for the types of information that Mlytics, Inc. (“Mlytics”, “we”, “us” or “our”) gathers, how we use that information, and the options that our users (“you” or “your”) have regarding our use of, and your ability to correct, such information.

It’s our overriding privacy principle that any personal information provided to us by you is just that: personal and private. As such, we will never sell, rent, share, or otherwise disclose your personal information to anyone except to provide our services or as otherwise described in this Policy, without providing explicit notice of such and the ability to opt-out.

Mlytics’s website and services are not intended for, nor designed to attract, individuals under the age of eighteen. Mlytics does not knowingly collect personally identifiable information from any person under the age of eighteen.

APPLICABILITY

This Policy applies to information provided to us by: (i) visitors to our websites, (ii) users of our services (i.e., subscribers to any of our plans), and (iii) information we collect from visitors to the websites of our users. We generally serve merely as a conduit for information controlled by others, and as such this Policy may not apply to our users’ websites. Our users’ websites or those to which we provide links, may have their own privacy policies. Because of this, we strongly encourage awareness and understanding of such websites’ separate privacy policies.

INFORMATION COLLECTION AND SHARING

Mlytics is the owner of the service information collected on this website and through any Mlytics service. Mlytics collects information automatically about visits to our Websites, including portals for customers who use our services (“Portals”). Such information may include, for example, the browser used, referring site, and the time and date of each web request. We collect this information to understand how visitors use our Websites. We also collect traffic data, like IP addresses and cookie data and other tracking information. We also collect information you provide to us, such as your name, title, company, email address and phone number, when you contact us using the contact information or forms included on our Websites.

Other third parties who provide us with services may also collect the information described above about your online activities over time and across different Web sites when you visit our Websites.

As part of our services, we may build statistical reports based upon what malicious visitors have visited certain site(s), in order to further protect your sites. We may also share information about our users or their visitors where we have a reasonable belief that they pose a security threat.

In order for us to provide some of our services we may also provide information that you supply to us to our affiliates, vendors and service providers, which we use for billing systems, contract and account management, customer support, relationship management and other technical operations. In such cases, we will ensure that such entities are bound by appropriate confidentiality restrictions to protect the information covered by this Policy. However, we will never use or share personal information that you provide to us in ways.

BILLING INFORMATION

Mlytics collects and maintains certain information from our users for the purposes of billing. We may share this information with third party processors for the limited purpose of receiving payment. We do not store full credit card numbers or personal account numbers (PANs).

COOKIES

Our site and services use ”cookies” in order to provide a better service to you. Cookies are placed by a browser onto your computer’s hard drive to assign a unique identification to that computer. For example, we may use cookies to help direct you to the appropriate part of our website, by indicating that you are a repeat visitor to our website. We may also use information provided to us to present you with services that are customized to your preferences. Mlytics does not store information we consider personal or private in a cookie, unless that information is obscured.

Some portions of our website are functional without cookies. You may delete Mlytics’s cookies yourself through your browser’s cookie manager. However, disabling cookies will reset your session, disable auto-login, and may adversely affect other functions on the Mlytics website and the services we provide.

As part of our services, we may place cookies on the computers of visitors to Mlytics protected websites. We do this in order to identify malicious visitors, reduce the chance of blocking legitimate users, and to provide customized services.

PROTECTION OF PERSONALLY IDENTIFYING INFORMATION

Mlytics undertake reasonable security measures to protect data to guard against unauthorized access to personal data. If you use our Portal, you are responsible for safeguarding your username and password. For Customer Services, Mlytics’ security practices are governed by its agreements with its customers and partners.

LAW ENFORCEMENT AND OBLIGATIONS

It’s possible that we may be required by law, court order, or other legal process to provide information about our customers to outside parties. It’s our policy to ensure adherence to the due process of law in all such instances, and if we are required to provide information under these circumstances, we will, whenever possible, attempt to inform users whose information we are compelled to produce, unless prohibited by law.

We may also retain copies of personal information to comply with our legal obligations, pursuant to our data retention policies, or for such reasonable period as is required to address potential disputes.

DATA SECURITY, DATA INTEGRITY, AND ACCESS

We take all reasonable steps to protect information we receive from our users from loss, misuse or unauthorized access, disclosure, alteration and/or destruction. We’ve put in place appropriate physical, electronic and managerial procedures to safeguard and secure such information. Mlytics only processes personal information in a way that is compatible with and relevant for the purpose for which it was collected or authorized. We allow our users and their website visitors access to their own personal information, and allow them to correct, amend, or delete inaccurate personal information, except where the burden or expense of providing such access is disproportionate to the individual privacy risk, or where the rights of persons other than the requesting individual risk being violated.

REGISTRAR

If you purchase Mlytics’s registrar service, ICANN and the registry operators overseeing a domain’s TLD require us to publish registrant data via the “WHOIS” protocol. We may also be required to share this public data with ICANN, registry operators, and other such bodies. Registrant data includes domain name, registrant name and contact information, and domain nameserver information.

INTERNATIONAL DATA TRANSFERS

Mlytics is certified under both the EU-U.S. Privacy Shield Framework, and the Swiss-U.S. Privacy Shield Framework, each as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal data transferred from the European Economic Area and Switzerland to the United States, respectively. A detailed description of how we comply with the Privacy Shield Principles can be found here. For more information on the EU-U.S. Privacy Shield or Swiss-U.S. Privacy Shield, please visit the U.S. Department of Commerce’s Privacy Shield website at: https://www.privacyshield.gov/welcome.

ACCESSING OR USING OUR SITES OR SERVICES, OR OTHERWISE PROVIDING INFORMATION TO US OR OUR CUSTOMERS, CONSTITUTES CONSENTING TO OUR POTENTIAL TRANSFER, PROCESSING, AND STORAGE OF SUCH INFORMATION IN THE UNITED STATES.

IINFORMATION SECURITY POLICY

This security policy shall serve as a basis to be followed in abiding by related regulations and in safeguarding the information assets of Mlytics (information assets include but not restricted to information, software, and hardware facility) against risk from being tampered, exposed, destroyed, or lost due to external threat or mismanagement and misuse of internal staff.

This Information Security Policy (hereinafter referred to as the Policy) drawn up based on the mission and objective of Mlytics and in accordance with related laws and regulations.

  1. 1.The Essence of Information Security

    The essence of information security is roughly classified as follows:

    1. 1.Availability – to ensure that various information assets are provided instantly and accurately in order to meet users’ needs.
    2. 2.Integrity – information assets are classified according to their importance and safeguarded appropriately to ensure the integrity of information assets.
    3. 3.Confidentiality – proper grading of data confidentiality and be given a proper standard and protection according to the grade of confidentiality. The information security of Mlytics is to ensure the integrity, availability, and confidentiality of all the information assets of Mlytics.
  2. 2.Purpose of Policy and Description

    In order to achieve the mission and objective of Mlytics, to meet the expectation and requirement of the highest management level on information security, and to ensure that all the information assets of Mlytics is secured, the purpose of drawing up the information security policy of Mlytics is as follows:

    1. 1.To ensure the confidentiality of the relevant business information of Mlytics, prevent the sensitive data of the Agency and personal data of the people from leaking and get lost.
    2. 2.To ensure the integrity and availability of relevant business information of Mlytics, in order to carryout the work of Mlytics and its various businesses.
    3. 3.An integrated, feasible, and effective Information Security Management System (hereinafter referred to as ISMS) was created by the Policy based on the necessity of organizational development and by taking information asset risk into account, in which asset risk underwent systemized risk evaluation, handled, and managed in accordance with the evaluation result, and a written procedure was also created for various plans, operation, and control process of information security, in order to provide optimum assurance to the information security of the Mlytics. The information policy is evaluated at least once a year in order to keep up with the changes of the law and the development of technology and related business. Thus, the effectiveness of information security is guaranteed.