Safe Harbor OverviewWe have chosen to comply with the principles of the Safe Harbor Framework developed by the U.S. Department of Commerce in consultation with the European Commission and the Federal Data Protection and Information Commissioner of Switzerland, except where limited by any legal, regulatory, ethical or public interest considerations. More information about the principles that make up the Framework, as well as other frequently asked questions relating to Safe Harbor can be found at: http://www.export.gov/safeharbor.
Types of Information“Personal information” is any information that we could use to identify an individual. It does not include personal information that is encoded or anonymized, or publicly available information that has not been combined with non-public information. “Sensitive personal information,” is information that meets the “personal information” criteria and also a) reveals race, ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, or b) concerns health or sex life, information about social security benefits, or information on criminal or administrative proceedings other than in the context of pending legal proceedings.
How We Collect InformationWe collect information two ways: Information we get from your use of the network, and information you provide to us directly. Information we get from your use of the network is primarily non-personally- identifying information of the sort that web browsers, servers, and services like Google Analytics* typically make available, such as the browser type, language preference, referring site, and the time of each visit. Other non-identifying information that we might have access to includes how you use the service (e.g., search queries), your approximate location, cookies, etc.
We collect this non-personally identifying information in order to better understand how visitors use the service and where possible, to improve their experience. For instance, we may monitor the most common content on the network to help identify spam. In some cases, we may publicly display information that is not personally identifying in the aggregate, (e.g., by publishing a report on trends in the usage of the network,) or may provide it to third parties.
When you use the network, we also collect potentially personally identifying information in the form of Internet Protocol (IP) addresses. But we don’t use that information to identify you, and we handle and disclose these addresses in the same way we handle other potentially personally identifying information as described below.
Certain visitors to the network choose to interact with it in ways that may require them to provide us with personally identifying information. The amount and type of information that is provided depends on the nature of the interaction. For example, we ask visitors who sign up for Trust-money.bid to provide a username and email address. We use a payment gateway to protect financial information we collect online, and we only collect as much information as is necessary or appropriate given the type of interaction. We do not disclose personally identifying information other than as described below. And you can always refuse to supply personally identifying information, with the caveat that it may prevent you from engaging in certain activities. If you send us a request, such as emailing us for support, we reserve the right to publish it (absent any personally identifying information) in order to help us clarify or respond to your request or help other users.
Our servers live in the United States. So, if you send us your info, that’s where it’s going. If you are outside the United States, you should know that any personally identifiable information you enter into the network will be transferred out of your country and into the United States, and possibly to other countries. By using the network, you consent to such transfer, and are representing that you have the right to transfer such information outside your country.
We do not knowingly collect any personally identifiable information from children under the age of 13. If we become aware that a child under age 13 has provided us with personally identifiable information, we’ll delete it.
Information You Choose to Display Publicly on the NetworkSome users may elect to publicly post personally identifying or sensitive information about themselves in their normal use of the network. Information like that, which is voluntarily posted in publicly visible parts of the network, is considered to be public, even if it would otherwise be considered to be personally identifying or sensitive. As such, it is not subject to the protocols listed below, because we don’t control it; you do. Additionally, voluntarily publicizing such information means that you lose any privacy rights you might normally have with regards to that information. It also increases your chances of receiving unwanted communications, like spam.
Information You Give to Other PeopleThis Policy only applies to information collected by Trust-money.bid. It does not apply to the practices of companies that we don’t own or control, or employees that we don’t manage. The network contains links to third party websites, and any information you provide to those sites will be covered by any privacy policies they may have. Please be sure to read the privacy policies of any third-party sites you visit. It is those sites’ responsibility to protect any information you give them, so we can’t be held liable for their wrongful use of your personally identifying information.
We mostly use your information to customize and improve your (and others’) experience. Here are some of the ways we may use personal information you provide us:
• To allow you to register for our web sites, online communities and other services, and to administer and process those registrations
• To communicate with you about our products, services and related issues
• To evaluate the quality of our products and services, and to enhance your experience on our web sites
• To maintain and administer our web sites and comply with our legal or internal obligations and policies
• To transfer information to others as described in this policy or to satisfy our legal, regulatory, compliance, or auditing requirements