Our Commitment to Privacy
What Information Do We Collect?
When you visit our Web Site or subscribe to one of our Publications or Services, you may provide us with two types of information: personal information you knowingly choose to disclose that is collected on an individual basis and Web Site use information that is aggregated as you and others browse our Web site. Our Web Site is not intentionally designed for or directed at children 13 years of age or younger. It is Real Endpoints’s policy never to knowingly collect or maintain information about anyone under the age of 13.
Personal Information You Choose to Provide
Account Information. When you subscribe to a Real Endpoints Publication or Service, or purchase any other products or services from us or our partners, you may need to give personal information necessary to establish your account and provide the Publication or Service and to authorize us to obtain information from various credit services in order to collect your payment. For example, you may need to provide the following information:
- Mailing address
- Email address
- Business phone number(s)
- Account password
- Service Profile Information.
Some of Real Endpoint’s Publications or Services may provide you the option of customizing your use of the Publication or Services. If you choose to take advantage of these features, it may be necessary to provide additional information necessary for the Publication or Service to provide the content according to your preferences. These preferences will not be shared with third parties Email Information. If you choose to correspond further with us through email, we may retain the content of your email messages together with your email address and our responses. We provide the same protections for these electronic communications that we employ in the maintenance of information received by mail and telephone.
Web Site Use Information
We automatically collect Web Site usage information from you when you visit our Web Site. Similar to other commercial Web sites, our Web Site uses “cookies” and Web server logs to collect information about how our Web Site is used. The information gathered may include the date and time of visits, and the time spent at our Web Site. We collect specific data about Subscriber use of our Publications and Data Solutions, including the pages accessed by UserID and when they are accessed. This information is collected to ensure individual and corporate compliance with the Real Endpoints User Agreement and to allow you to customize your use of the Web Site. However, we do not collect information about specific searches and do not calculate time spent on each page. In addition, we do not track the Web sites visited just before and just after our Web Site. The usage information we collect may be compiled into aggregated usage information to manage and improve the site. None of the aggregated usage information is associated with you as an individual.
How Do We Use the Information That You Provide to Us?
Broadly speaking, we use personal information for purposes of administering our business activities, providing customer service and making available other products and services to our customers and prospective customers. Our uses of personal information may include the following:
- To enable us to process, validate, verify and deliver subscriptions that you have ordered.
- To allow us or you to personalize the content that you obtain based on personal characteristics or preferences.
- To provide Service Notices to you about important changes to our Web Site or about our new or existing products and services, special offers, or otherwise to contact you.
- To monitor your compliance with the terms of the Real Endpoints User Agreement. For example, we automatically collect IP address information from you when you visit our Web Site, and we may use this information to monitor your compliance with the restrictions in our User Agreement regarding sharing access to Publications and Services
- To comply with the law.
Do We Disclose Information to Outside Parties?
Real Endpoints only shares personal information with other companies or individuals outside of Real Endpoints in the following limited circumstances:
- We have your consent for a specific purpose, such as to establish an account using a credit card.
- You have registered to participate in an event where we are an organizer in conjunction with a partner or a third party event manager.
- We have a good faith belief that access, use, preservation or disclosure of such information is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or enforceable governmental request, (b) enforce the terms or conditions of the Real Endpoints User Agreement, including investigation of potential violations thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues, or (d) protect against imminent harm to the rights, property or safety of Real Endpoints, its customers or the public as required or permitted by applicable law.
Your personal information is not otherwise sold or traded or distributed outside of Real Endpoints.
Sharing Information with Strategic Partners
We may enter into strategic alliances or partnerships with third parties for the purposes of jointly providing additional publications or services. To do so, it may be necessary to share with such third parties limited personal information such as your name, address, telephone number and email addresses for the purpose of providing you information regarding such products and services. If you choose to provide personal information or consent to the use of existing personal information for the purposes of subscribing to such additional products or services, both we and our partner may share ownership of this personal information. In any case, we will require that the privacy policies of such partners provide substantially similar protections to those provided by Real Endpoints.
Third Party and Corporate Subscriptions
If your access to Real Endpoints’s Publications or Services is provided by your employer or a third party, your employer or that third party may provide us with limited amounts of personal information about you to enable your access to the Publications and Services. In addition, your employer or the third party may require us to provide information about your access to the Publications or Services, for example to verify that you are using the Publications and Services they have purchased on your behalf. In addition, we may be required to provide your employer or third party with personally identifiable information in order to enforce compliance with the Real Endpoints User Agreement.
Transfer to U.S. or Other Countries
Your Disclosures to Third Parties
How Do We Secure Information Transmissions?
From time to time, we may offer you the ability to pay for Publications and Services with a credit card using e-commerce software that meets payment card industry data security standards. Other email that you may send to us may not be secure unless we advise you that security measures will be in place prior to your transmitting the information. For that reason, we ask that you do not send confidential information such as Social Security or credit card account numbers to us through an unsecured email.
How Do We Protect Your Information?
Information Security. Personal information and user-specific settings and preferences are stored using commercially standard database and web site security software. User passwords are saved in encrypted form to prevent unauthorized access or disclosure and accidental loss, alteration or destruction. Evaluation of Information Protection Practices. Periodically, our operations and business practices are reviewed for compliance with corporate policies and procedures governing the security, confidentiality and quality of our information. Employee Access, Training and Expectations. Our employees are required to protect confidential third party information in general as a condition of employment at Real Endpoints, and our business practices limit the use and disclosure of such information, including personal information, to authorized persons, processes and transactions.
Providing, Correcting and Updating Your Information
Modifications to this Policy