At Equaleyes Solutions (a subsidy company of Drugi vid d.o.o., Ulica skofa Maksimilijana Drzecnika 6, 2000 Maribor, Slovenia, Company VAT SI 79788220, Company number 6078192000), also referred to as “Equaleyes”, “we”, “our” and “us”, prioritise making your business work better for you, this includes us prioritising the security of your data. We value your privacy and are extremely diligent with ensuring the protection and privacy of all of your data, so you can be confident that your details are secure We will never sell, rent or disclose your personally identifiable information to outside parties for their own marketing purposes without your consent.
Personal Information We May Collect
Personal data is any information that relates to an identified or identifiable living individual. Different pieces of information, which collected together can lead to the identification of a particular person, also constitute personal data.
Personal data that has been de-identified, encrypted or pseudonymised but can be used to re-identify a person remains personal data and falls within the scope of the law.
Personal data that has been rendered anonymous in such a way that the individual is not or no longer identifiable is no longer considered personal data. For data to be truly anonymised, the anonymisation must be irreversible.
The law protects personal data regardless of the technology used for processing that data – it’s technology neutral and applies to both automated and manual processing, provided the data is organised in accordance with pre-defined criteria (for example alphabetical order). It also doesn’t matter how the data is stored – in an IT system, through video surveillance, or on paper; in all cases, personal data is subject to the protection requirements set out in the GDPR.
Examples of “Personal Information”:
- a name and surname;
- a home address;
- an email address such as email@example.com;
- an identification card number;
- location data (for example the location data function on a mobile phone)*;
- an Internet Protocol (IP) address;
- a cookie ID;
- the advertising identifier of your phone;
- data held by a hospital or doctor, which could be a symbol that uniquely identifies a person.
You can read more about at The General Data Protection Regulation (GDPR) (EU) 2016/679 is a regulation in EU law on data protection and privacy for all individuals within the European Union (https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32016R0679).
How We May Collect Other Information
We and our service providers may collect Personal Information with you consent in a variety of ways, including:
Through your browser or device
Certain information is collected by most browsers or automatically through your device, such as your Media Access Control (MAC) address, computer type (Windows or Macintosh), screen resolution, operating system name and version, device manufacturer and model, language, Internet browser type and version, service provider, and the name and version of the Sites (such as the App) you are using. We use this information for statistical purposes as well as to ensure that the Sites function properly. In case you want to opt-out you can always contact us by email firstname.lastname@example.org
Through server log files
Your “IP Address” is a number that is automatically assigned to the computer or device that you are using by your Internet Service Provider (ISP). An IP Address is identified and logged automatically in our server log files whenever a user visits the Sites, along with the time of the visit and the page(s) that were visited. We use IP Addresses for purposes such as calculating Sites usage levels, helping diagnose server problems, and administering the Sites. Please note that we treat IP Addresses, server log files and related information as Other Information, except where we are required to do otherwise under applicable law. In case you want to opt-out you can always contact us by email email@example.com
Using pixel tags, web beacons, clear GIFs, analysis service or other similar technologies
These may be used in connection with some Sites pages and HTML-formatted email messages to, among other things, track the actions of Sites users and email recipients, measure the success of our marketing campaigns and compile statistics about Sites usage and response rates. To learn more about the use, please see our cookies policy.
Information, such as date of birth, gender, personal characteristics, hobbies and interests, consumption habits, zip code and your preferred means of communication, may be collected when you voluntarily provide it. The other information we collect through Equaleyes Solutions Ltd. is contact information you choose to provide as a client or partner, when you complete a form to request more information about our company, products or services.
In case you want to opt-out you can always contact us by email firstname.lastname@example.org
How we secure data?
Business Owners will assess institutional risks and threats to the data for which they are responsible, and accordingly classify its relative sensitivity as Level I (low sensitivity), Level II (moderate sensitivity), or Level III (high sensitivity).
Unless otherwise classified, company data is Level II. Company personnel may not broaden access to internal data without authorization from the Business Owner. This limitation applies to all means of copying, replicating, or otherwise propagating institutional data.
All data is protected with password and username. Data with Moderate sensitivity or high sensitivity are protected with 2-Factor Google Authentication and expires every 30 days (you can read more about that here) and one-time login with text message, called SMS spoofing.
SMS spoofing is a technology which uses the short message service (SMS), available on most mobile phones and personal digital assistants, to set who the message appears to come from by replacing the originating mobile number (Sender ID) with alphanumeric text. Spoofing has both legitimate uses (setting the company name from which the message is being sent, setting your own mobile number, or a product name) and illegitimate uses (such as impersonating another person, company, product). This can also send "mysterious" messages that look like they are from legitimate numbers or contacts.