Information Perion Collects and Receives.
When you Use the Software & Services, we collect and store the following types of information:
How Perion Uses Your Information.
Perion processes your information on the basis that it is a data controller of the information. This is how we use this information:
For this purpose, we use a number of service providers to assist us in providing the Software & Services which have access to this information. Such service providers include hosting and backup providers, cloud services, analytics and feedback services and ISPs. We use Google API which gives us access to your Gmail account, AWS for our website and e-store (Ireland), as well as Bezeq International (Israel) for our application servers & Database.
Direct Marketing. –We do not process your personal data for direct marketing purposes.
When you make Use of, or interact with, the Site, we collect and store the following types of information:
We use your information and Support Related Information to take action in case of a dispute involving you in connection with the Software & Services and to enforce the terms and conditions applicable to the Software & Services. We also use your information to comply with legal and regulatory requirements (e.g., the disclosure of information to law enforcement or tax authorities), and for our legitimate interests and to protect against fraud, suspicious or other illegal activities.
For this purpose, we may share your information with law enforcement or other competent authorities and any third party, as may be required (e.g., to respond to claims or satisfy any legal process, subpoena, or governmental request; or to protect the rights, properly, or personal safety of Perion’s users, its partners, or the general public). We will also share this information with our professional advisors in the scope of this purpose.
We will retain this information for the amount of time as required by law to fulfill the above purposes. This may include ensuring that we have an accurate record of your dealings in the event of any complaints or challenges, or if we reasonably believe there is a prospect of litigation relating to your information or dealings.
Use of Non-personal information:
Perion uses non-personal information it collects for the following purposes:
We retain this information for as long as necessary to fulfill our business and/or operational purposes or comply with a legal request. We may also choose to anonymize parts of your information so that it can no longer be identifiable or attributable to any person if we want to keep it for longer periods of time than the retention periods set forth above.
Additional Sharing of information with Third Parties.
If you want to receive the list of recipients of your information, please make your request by contacting us to firstname.lastname@example.org
In a nutshell:
We’re using AWS for our website and e-store (Ireland), as well as Bezeq International (Israel) for our application servers & Database. Therefore, we share personal data with them.
We do not share your personal data with other entities of the Perion group.
We may also share your information in the following events:
Transferring Personal Information From and Outside of the European Union.
We will take appropriate steps to ensure that transfers of your information are in accordance with applicable laws and carefully managed to protect your privacy rights and interests.
Storage: We’re using AWS for our website and e-store (Ireland), as well as Bezeq International (Israel) for our application servers & Database. AWS is privacy shield registered and Bezeq is Israel which was declared as “adequate” by the European Commission.
Access from Israel: where your personal data is accessed from Israel, please note that such access from Israel is covered by the European Commission’s Adequacy Decision regarding Israel. You can read more here: https://ec.europa.eu/info/law/law-topic/data-protection/data-transfers-outside-eu/adequacy-protection-personal-data-non-eu-countries_en
The Software & Services include content which may be in the form of apps, buttons, gadgets, advertisements, websites, products and services (including search services and advertisements) provided to you by third parties (collectively, "Third Party Content and Services"). The use of such Third Party Content and Services is subject to their privacy policies. In order to clarify, we do not review, approve, monitor, endorse, warrant, or make any representations with respect to such Third Party Content and Services and your access to any Third Party Content and Services is at your own risk. We are not responsible for the information contained and/or made available through, the practices of, or your use or inability to use such Third Party Content and Services. You expressly relieve us from any and all liability arising from your use of such Third Party Content and Services. We recommended that you read the terms, conditions and privacy policies of such Third Party Content and Services before using or accessing any of them.
Cookies and Other Technologies.
As indicated above, the Software & Services uses services and other technology vendors to operate, monitor and analyze the Site and provide you with certain features and functionalities. In doing so, we collect or allow such third parties to collect, through blocks of code called “pixels” or “web beacons”, certain information about you and send it to our servers and to our partners (either directly or indirectly). We or our partners, package all or part of this information into small text files called Cookies and send the Cookie to your computer. As an example, Cookies stores the web pages you accessed, your interaction with advertisements presented to you via the Software & Services, features you used, your session duration and your configurations and preferences of the Software & Services. You can learn more about cookies on the Internet Advertising Bureau’s website: http://www.allaboutcookies.org.
Most browsers are initially set up to accept Cookies but you can reset your browser to refuse all Cookies or to indicate when a Cookie is sent.
We make use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, clicked pages and any other information your browser send to us. We use such information to analyze trends, administer the Website, track users’ movement around the Website, and gather demographic information. Log files are also used for security purposes in order to protect our clients.
We make use of analytic tools:
We reserve the right to use other analytic tools.
The Software & Services are not intended for minors in any jurisdiction and you hereby represent that you are not a minor according to you relevant jurisdiction. We do not knowingly collect, use, share or disclose any information from minors. We reserve the right to request proof of age at any stage, so that we can verify that minors are not using the Software & Services.
We advise parents and guardians to regularly monitor their children's use of email and other online communications and activities. Control tools that create a safer online environment for children are available from third party online services and software providers.
In the event that it comes to our knowledge that a minor is using the Software & Services, we reserve the right to prohibit and block such a user from accessing the Software & Services and to make all efforts to promptly delete any information with regard to such user, as applicable.
The following rights (which may be subject to certain exemptions or derogations), shall apply to EU users of the Software & Services (some of which only apply to individuals protected by the GDPR):
We can ask you for additional information to confirm your identity and for security purposes, before disclosing the information requested to you. We reserve the right to charge a fee where permitted by law, for instance if your request is manifestly unfounded or excessive.
By logging on to your account on the Software & Services, you can (i) retrieve your email address, profile image and your creations, and (ii) change and delete this information. To exercise your other rights, you contact us directly – please see the “How to Contact Perion” section for how to contact us: http://www.incredimail.com/en/home/privacypolicy.
You can exercise your rights by contacting us at email@example.com. Subject to legal and other permissible considerations, we will make every reasonable effort to honor your request promptly or inform you if we require further information in order to fulfil your request.
In the event that your request, for example, would impact the duty of confidentiality we owe to others, or if we are legally entitled to deal with your request in a different way than initially requested, we will address your request to the maximum extent possible, all in accordance with applicable law.
How we Protect your Information.
Security. We have implemented and will maintain appropriate technical and organizational security measures, policies and procedures designed to reduce the risk of accidental destruction or loss, or the unauthorized disclosure or access to such information appropriate to the nature of the information concerned. However, please note that we cannot guarantee that the information will not be exposed as a result of unauthorized penetration to our servers. As the security of information depends in part on the security of the computer, device or network you use to communicate with us and the security you use to protect your user IDs and passwords, please make sure to take appropriate measures to protect this information.
Retention of your information. In addition to the retention periods mentioned in How Perion Uses Your Information (http://www.incredimail.com/en/home/privacypolicy) above, in some circumstances we may store your information for longer periods of time, for example (i) where we are required to do so in accordance with legal, regulatory, tax or accounting requirements, or (ii) for us to have an accurate record of your dealings with us in the event of any complaints or challenges, or (iii) if we reasonably believe there is a prospect of litigation relating to your information or dealings.
Do Not Track.
Do Not Track is a privacy preference that can be configured in certain web browsers (the "DNT Feature"); the DNT Feature, when enabled on a web browser, signals the websites you visit that you do not want certain information about your visit collected. Perion does not currently respond or recognize DNT Feature signals.
If you have any complaints on our processing of your information or if you believe that we have breached our own privacy policies or applicable law, we encourage you to contact us. However, please note that applicable EU data protection laws provide you with a right to lodge a complaint with the competent supervisory authority as well.
Notice to Californian Residents – Your California Privacy Rights.
California residents who provide us with certain types of personal information (as defined under California Civil Code Section 1798.83 (also known as California’s “Shine the Light” law)) are entitled to request and obtain from us once a calendar year information about the personal information we shared, if any, with other businesses for their own direct marketing use. To make such a request, please contact us through the email or physical address under the “How to Contact Perion” section below.
When making such a request, please ensure that you write in the subject line and the body of your message “Request for California Privacy Information”.
Please be aware that not all information sharing is covered by California’s “Shine the Light” law.
How to Contact Perion.
Perion Network Ltd.
Attention: General Counsel
26 HaRokmim Street, Azrieli Center 1
Building A, 4th Floor
Last updated: June, 18 2019.