How We Collect and Use Information
We collect the following types of information about you:
Information you provide us directly:
We ask for certain information such as your name, address, phone number and e-mail address when you register for Zenec Warranty Registration.
We may also retain any messages you send through the Support Service and may collect information you provide in User Content you post to the Support Service. We use this information to operate, maintain, and provide to you the features and functionality of the Support Service. Your username and if you choose to disclose it, your real name, will not be published publicly.
Information we may receive from third parties:
We may receive information about you from third parties. For example, if you access our websites or Service through a third-party connection or log-in, for example, through Facebook Connect, by “following,” “liking,” adding Zenec, linking your account to the Zenec Service, etc., that third party may pass certain information about your use of its service to Zenec. This information could include, but is not limited to, the user ID associated with your account (for example, your Facebook UID), an access token necessary to access that service, any information that you have permitted the third party to share with us, and any information you have made public in connection with that service.
You should always review, and if necessary, adjust your privacy settings on third-party websites and services before linking or connecting them to the Zenec Service. You may also un-link your third party account from the Service by adjusting your settings on the third party service.
We may directly collect analytic data, or use third-party analytic tools and services, to help us measure traffic and usage trends for the Service. These tools collect information sent by your browser or mobile device, including the pages you visit and other information that assists us in improving the Service. We collect and use this analytic information in aggregate form such that it cannot reasonably be manipulated to identify any particular individual user.
Log file information:
Log file information is automatically reported by your browser or mobile device each time you access the Service. When you use our Service, our servers automatically record certain log file information. These server logs may include anonymous information such as your web request, Internet Protocol (“IP”) address, browser type, referring / exit pages and URLs, number of clicks and how you interact with links on the Service, domain names, landing pages, pages viewed, and other such information.
Commercial and marketing communications:
We also use your information to send you Support Service-related emails (e.g. software or navigation changes/updates to features of the Service, technical and security notices). You may opt out of Service-related email by utilizing the ‘Unsubscribe’ option in our emails to you.
Sharing of Your Information
We will not rent or sell your information into third parties outside Zenec and its group companies (including any parent, subsidiaries and affiliates) without your consent, except as noted below:
- Who can see User Content: Any User Content that you voluntarily disclose for posting to the Support Service becomes available to our database and cannot be removed, except by Zenec.
- Who can see your email address: If you enter an email address, you will enable communication from Zenec.
- What happens in the event of a change of control:
We may buy or sell/divest/transfer the company (including any shares in the company), or any combination of its products, services, assets and/or businesses. Your information such as customer names and email addresses, User Content and other user information related to the Service may be among the items sold or otherwise transferred in these types of transactions. We may also sell, assign or otherwise transfer such information in the course of corporate divestitures, mergers, acquisitions, bankruptcies, dissolution’s, reorganizations, liquidations, similar transactions or proceedings involving all or a portion of the company.
Instances where we are required to share your information:
Sharing certain service type information we collect about you:
We may share certain service type information, including information obtained through tools such as cookies, log files, device identifiers, location data and clear gifs (such as anonymous usage data, referring/exit pages and URLs, platform types, number of clicks, etc.): (i) with our third-party business partners for the purposes described in the section above on “How We Collect and Use Information.” We may also aggregate or otherwise strip data of all personally identifying characteristics and may share that aggregated, anonymized data with third parties.
How We Store and Protect Your Information
Storage and Processing:
Your information collected through the Service may be stored and processed in the United States or any other country in which Zenec or its subsidiaries, affiliates, or service providers maintain facilities
Keeping your information safe:
Zenec cares about the security of your information, and uses commercially reasonable safeguards to preserve the integrity and security of all information collected through the Service. To protect your privacy and security, we take reasonable steps (such as requesting a unique password) to verify your identity before granting you access to your account. You are responsible for maintaining the secrecy of your unique password and account information, and for controlling access to your email communications from Zenec, at all times. However, Zenec cannot ensure or warrant the security of any information you transmit to Zenec or guarantee that information on the Service may not be accessed, disclosed, altered, or destroyed.
Compromise of information:
In the event that any information under our control is compromised as a result of a breach of security, Zenec will take reasonable steps to investigate the situation and where appropriate, notify those individuals whose information may have been compromised and take other steps, in accordance with any applicable laws and regulations.