Privacy Policy
Overview
This Privacy Policy applies to all products, services, and websites offered by Binaricart. In cases where more detailed information is needed to explain our privacy practices, we post supplementary privacy notices to describe how specific services process personal information.
Information We Collect and How We Use It
We understand that during the course of delivering our numerous products and services to you via the internet, we will come across certain personal information. This information is handled with care and used as follows:
Information You Provide
When you sign up for any Binaricart service or promotion that requires registration, we ask for personal information such as your name, email address, and account password. Typically, we do not store this information, but when we do, we maintain it in encrypted form on secure servers. We may combine the information you submit under your account with information from other third parties to provide a better experience and improve our services. For certain services, we may give you the opportunity to opt out of combining such information.
Log Information
When you access Binaricart, our servers automatically record information that your browser sends whenever you visit a website.
User Communications
When you send email or other communications to Binaricart, we may retain those communications to process your inquiries, respond to your requests, and improve our services.
Other Sites
This Privacy Policy applies only to Binaricart. We do not control the sites displayed or linked from within our various services. These other sites may place their own cookies or other files on your computer, collect data, or solicit personal information from you.
Data Policy
Binaricart' Data Protection Policy demonstrates our commitment to treating information of employees, customers, stakeholders, and other interested parties with the utmost care and confidentiality. With this policy, we ensure that we gather, store, and handle data fairly, transparently, and with respect for individual rights.
Scope
This policy applies to all parties (employees, customers, suppliers, merchants, etc.) who provide any amount of information to us. Employees of our company and its subsidiaries, as well as contractors, consultants, partners, and any other external entities, must follow this policy. Generally, our policy applies to anyone we collaborate with or who acts on our behalf and may need occasional access to data.
Policy Elements
As part of our operations, we need to obtain and process information. This information includes any offline or online data that makes a person identifiable, such as names, addresses, usernames and passwords, digital footprints, photographs, social security numbers, financial data, etc. Our company collects this information transparently and only with the full cooperation and knowledge of interested parties. Once this information is available to us, the following rules apply:
- Our data will be accurate and kept up-to-date.
- Collected fairly and for lawful purposes only.
- Processed by the company within its legal and moral boundaries.
Our data will not be:
- Communicated informally.
- Stored for more than a specified amount of time.
- Transferred to organizations, states, or countries that do not have adequate data protection policies.
- Distributed to any party other than the ones agreed upon by the data's owner (excepting legitimate requests from law enforcement authorities).
In addition to the ways of handling data, the company has direct obligations towards the people to whom the data belongs. Specifically, we must:
- Let people know which of their data is collected.
- Inform people about how we'll process their data.
- Inform people about who has access to their information.
- Have provisions in cases of lost, corrupted, or compromised data.
- Allow people to request that we modify, erase, reduce, or correct data contained in our databases.
To exercise data protection, we're committed to:
- Restricting and monitoring access to sensitive data.
- Establishing data protection practices (document shredding, secure locks, data encryption, frequent backups, access authorization, etc.).