Privacy Policy

Summary

A privacy policy is a statement or a legal document (in privacy law) that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. It fulfills a legal requirement to protect a customer or client's privacy.

At Equaleyes Solutions (a subsidy company of Drugi vid d.o.o., Ulica skofa Maksimilijana Drzecnika 6, 2000 Maribor, Slovenia, Company VAT SI 79788220, Company number 6078192000), also referred to as “Equaleyes”, “we”, “our” and “us”, prioritise making your business work better for you, this includes us prioritising the security of your data. We value your privacy and are extremely diligent with ensuring the protection and privacy of all of your data, so you can be confident that your details are secure We will never sell, rent or disclose your personally identifiable information to outside parties for their own marketing purposes without your consent.

This Privacy Policy describes our practices in connection with information that we collect through activities that link to this Privacy Policy including websites (our “Websites”) and any mobile sites, applications, widgets, and other mobile interactive features we may provide (collectively, our “Apps”), through other services that we may offer in connections with our Websites and Apps, such as rewards programs, through our official social media pages that we control (our “Social Media Pages”), as well as through HTML-formatted email messages that we send to you (collectively, including the Social Media Pages, Apps and Websites, the “Sites”). By providing Personal Information to us, you agree to the terms and conditions of this Privacy Policy.

The following are the details and explanations of the our privacy policy to protect your right and interests. We encourage you to read this policy to ensure you understand our privacy practices.

Personal information

Personal Information We May Collect

Personal data is any information that relates to an identified or identifiable living individual. Different pieces of information, which collected together can lead to the identification of a particular person, also constitute personal data.
Personal data that has been de-identified, encrypted or pseudonymised but can be used to re-identify a person remains personal data and falls within the scope of the law.
Personal data that has been rendered anonymous in such a way that the individual is not or no longer identifiable is no longer considered personal data. For data to be truly anonymised, the anonymisation must be irreversible.
The law protects personal data regardless of the technology used for processing that data – it’s technology neutral and applies to both automated and manual processing, provided the data is organised in accordance with pre-defined criteria (for example alphabetical order). It also doesn’t matter how the data is stored – in an IT system, through video surveillance, or on paper; in all cases, personal data is subject to the protection requirements set out in the GDPR.

Examples of “Personal Information”:

  • a name and surname;
  • a home address;
  • an email address such as name.surname@company.com;
  • an identification card number;
  • location data (for example the location data function on a mobile phone)*;
  • an Internet Protocol (IP) address;
  • a cookie ID;
  • the advertising identifier of your phone;
  • data held by a hospital or doctor, which could be a symbol that uniquely identifies a person.

You can read more about at The General Data Protection Regulation (GDPR) (EU) 2016/679 is a regulation in EU law on data protection and privacy for all individuals within the European Union (https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32016R0679).

How We May Collect Other Information

We and our service providers may collect Personal Information with you consent in a variety of ways, including:

  • Through your browser or device

    Certain information is collected by most browsers or automatically through your device, such as your Media Access Control (MAC) address, computer type (Windows or Macintosh), screen resolution, operating system name and version, device manufacturer and model, language, Internet browser type and version, service provider, and the name and version of the Sites (such as the App) you are using. We use this information for statistical purposes as well as to ensure that the Sites function properly. In case you want to opt-out you can always contact us by email letsgo@equaleyes.com

  • Through server log files

    Your “IP Address” is a number that is automatically assigned to the computer or device that you are using by your Internet Service Provider (ISP). An IP Address is identified and logged automatically in our server log files whenever a user visits the Sites, along with the time of the visit and the page(s) that were visited. We use IP Addresses for purposes such as calculating Sites usage levels, helping diagnose server problems, and administering the Sites. Please note that we treat IP Addresses, server log files and related information as Other Information, except where we are required to do otherwise under applicable law. In case you want to opt-out you can always contact us by email letsgo@equaleyes.com

  • Using cookies

    Cookies allow a web server to transfer data to a computer or device for recordkeeping and other purposes. We use cookies and other technologies to, among other things, better serve you with more tailored information and facilitate your ongoing access to and use of the Sites. If you do not want information collected through the use of cookies, there is a simple procedure in most browsers that allows you to decline the use of cookies. To learn more about cookies, please visit http://www.allaboutcookies.org. To learn more about our use of cookies, please see our cookies policy.

  • Using pixel tags, web beacons, clear GIFs, analysis service or other similar technologies

    These may be used in connection with some Sites pages and HTML-formatted email messages to, among other things, track the actions of Sites users and email recipients, measure the success of our marketing campaigns and compile statistics about Sites usage and response rates. To learn more about the use, please see our cookies policy.

  • From you

    Information, such as date of birth, gender, personal characteristics, hobbies and interests, consumption habits, zip code and your preferred means of communication, may be collected when you voluntarily provide it. The other information we collect through Equaleyes Solutions Ltd. is contact information you choose to provide as a client or partner, when you complete a form to request more information about our company, products or services.
    In case you want to opt-out you can always contact us by email letsgo@equaleyes.com

How we secure data?

Business Owners will assess institutional risks and threats to the data for which they are responsible, and accordingly classify its relative sensitivity as Level I (low sensitivity), Level II (moderate sensitivity), or Level III (high sensitivity).

Unless otherwise classified, company data is Level II. Company personnel may not broaden access to internal data without authorization from the Business Owner. This limitation applies to all means of copying, replicating, or otherwise propagating institutional data.

All data is protected with password and username. Data with Moderate sensitivity or high sensitivity are protected with 2-Factor Google Authentication and expires every 30 days (you can read more about that here) and one-time login with text message, called SMS spoofing.

SMS spoofing is a technology which uses the short message service (SMS), available on most mobile phones and personal digital assistants, to set who the message appears to come from by replacing the originating mobile number (Sender ID) with alphanumeric text. Spoofing has both legitimate uses (setting the company name from which the message is being sent, setting your own mobile number, or a product name) and illegitimate uses (such as impersonating another person, company, product). This can also send "mysterious" messages that look like they are from legitimate numbers or contacts.