POINEER SOCIAL MEDIA APPLICATIONS
POINEER SOCIAL MEDIA APPLICATIONS
Welcome
Security and privacy are at the core of our mission. Therefore, we believe it's crucial to be transparent about how we handle your information. This Privacy Policy outlines how we process and manage data provided to us in connection with your use of our products, services, apps, and websites that link to this policy (collectively referred to as our "services").
This policy uses the term "personal data" to refer to information related to an identified or identifiable natural person, which is protected as personal data under applicable data protection law.
Who are we?
This policy covers the data processing practices of GOAT VPN
In this policy, "we," "us," and "our" refer to the specific company from the list above that provides you with the services and is responsible for handling your data in accordance with this policy. For mobile apps, you can identify which company this is by checking which company is listed as offering the app on its download page or by reviewing its terms of service.
1. What information do we collect about you?
This section describes the various types of information we collect from and about you. This information is collected only in specific situations, and the context in which collection occurs can be understood by referring to Section 2 (How do we use your information?). More details about some of the mechanisms we use to collect this information, such as cookies, are available in Section 4 (Tracking Technologies & Cookies).
1.1. Information you provide to us
Billing and payment information: To purchase a service, you may need to provide us with details such as billing name, billing contact details (street addresses, email addresses), and payment instrument details.
Communications and submissions: You may choose to provide us with information when you communicate with us (e.g., via email for support or inquiries about our services), including when you fill out an online form, respond to surveys, provide feedback, participate in promotions, or submit information through our services.
1.2. Information collected when you use our services
Usage information: We collect information about how you interact with our services, such as how much bandwidth you use and when and for how long you use our services.
Device information: We collect information from and about the device you use to access our services. For example, we may collect device identifiers, browser types, device types and settings, operating system versions, mobile, wireless, and other network information (such as the internet service provider name, carrier name, and signal strength), and application version numbers.
Diagnostic information: We may collect information about the nature of the requests you make to our servers (such as what is being requested, information about the device and app used to make the request, timestamps, and referring URLs). However, we do not log any information that associates your identity with your VPN browsing activity. We do not maintain any records that show what you were browsing or accessing through a VPN connection.
Location information: We may collect your location information based on various sources, such as your device's GPS or by calculating an approximate latitude and longitude based on your IP address.
1.3. Information provided to us by third parties
Referrals: If you are invited to use our service, the person who invited you may submit your personal data, such as your email address or other contact information.
Third Party Accounts: Some services may allow you to register an account using a third-party account (such as a Google or Microsoft account). If you do so, that third party may send us some information about you that they have. You may be able to control what information they send us via your privacy settings for that third-party account.
Threat Information: We may receive information from reputable members of the security industry who provide information to help us provide, develop, test, and improve our services (for example, lists of malicious URLs, spam blacklists, phone number blacklists, and sample malware). Some of this information may contain personal data on an incidental basis.
You generally do not have a duty to disclose personal data to us unless you have a contractual obligation to do so. However, we need to collect and process certain information that is necessary or legally required to provide the services to you or otherwise fulfill our contractual relationships with you.
2. How do we use your information?
We use the information we collect for various purposes described below.
To provide, maintain, troubleshoot, and support our services: We use your information for this purpose based on the need to fulfill our contractual obligations to you. Examples include using information about how much bandwidth you use and how long you use our services to provide the services in accordance with the plan to which you have subscribed; using threat and device information to determine whether certain items pose a potential security threat; using location information to connect you to the nearest and fastest VPN server; and using usage information to troubleshoot a problem you report with our services and ensure the proper functioning of our services.
For billing and payment purposes: We use your information to perform billing administration activities and process payments, which are required to fulfill our contractual obligations.
To improve our services: We want to offer you the best services and user experiences possible, so we have a legitimate interest in continually improving and optimizing our services. To do so, we use your information to understand how users interact with our services. Examples include analyzing certain usage, device, and diagnostic information to understand aggregated usage trends and user engagement with our services (and, for example, investing in technical infrastructure to better serve regions with increasing user demand); using device and threat information to conduct spam, threat, and other scientific research to improve our threat detection capabilities; and reviewing customer feedback to understand what we could be doing better.
To develop new services: We have a legitimate interest in using your information to plan for and develop new services. For example, we may use customer feedback to understand what new services users may want.
To market and advertise our services: We may use your information to provide, measure, personalize, and enhance our advertising and marketing based on our legitimate interest in offering you services that may be of interest. Examples include using information such as who or what referred you to our services to understand how effective our advertising is; using information to administer promotional activities such as sweepstakes and referral programs. Our VPN products do not use your VPN browsing activity for these purposes, and we do not maintain any records that show what you were browsing or accessing through a VPN connection.
To prevent harm or liability: We may use information for security purposes (such as to investigate security issues or to monitor and prevent fraud) and to prevent abuse. We may do this to comply with our legal obligations, to protect an individual’s vital interests, or because we have a legitimate interest in preventing harm or liability to us and our users. For example, we may use account, usage, and device information to determine if an entity is engaging in abusive or unauthorized activity in connection with our services.
For legal compliance: We internally use your information as required by applicable law, legal process, or regulation. To learn about our practices regarding sharing your information with third parties for legal compliance purposes, see Section 3.1 below. We also use your information to enforce our legal rights and resolve disputes.
3. Who do we share your information with and why?
3.1. In General
We may disclose your information in the following circumstances:
In accordance with your instructions or consent: For example, some services may allow you to register an account using a third-party account (such as a Google or Microsoft account). If you choose to do so, we will share information with the third-party account provider.
Affiliates and third-party service providers: To help us provide some aspects of our services, we work with our affiliates and trusted third parties. To protect your data, we enter into appropriate confidentiality and data processing terms with these third parties, review their security practices, and limit information sharing to the scope of what they are helping us with. Examples of activities that third parties help us with include:
processing customer payments
providing analytics about our services
providing sales and customer support
maintaining the infrastructure required to provide our services
delivering our marketing and advertising content
serving advertising content
To a new owner: If ownership or control of all or part of our services, assets, or business changes, we may transfer your information to the new owner.
Aggregated or de-identified data: We may use and share aggregated data and data that is de-identified such that it no longer reveals the identity of an individual user for regulatory compliance, research and analysis, our own marketing and advertising activities, and other legitimate business purposes.
To comply with legal process and the law: We are fiercely protective of the privacy of our users. For our VPN products, we protect your privacy by ensuring that we do not log or record online activities that you conduct over a VPN connection in any way that can be tied back to you, meaning that we do not have any data to share with law enforcement and government agencies requesting it. However, we may disclose information to third parties if we determine that such disclosure is reasonably necessary to (a) comply with applicable law, legal process, or regulation; (b) protect any person from death or serious bodily injury; (c) prevent fraud or abuse of our services or our users; (d) protect our rights, property, safety, or interest; or (e) perform a task carried out in the public interest.
4. Tracking Technologies & Cookies
We use cookies, beacons, tags, scripts, and similar technologies to collect information as you navigate our services. You can learn more about these technologies by reading this section.
4.1. What are tracking technologies?
Cookies: Cookies are small text files that websites store on your device in order to uniquely identify your browser or store information or settings in your browser. Cookies are commonly used to make websites work, or to work more efficiently, as well as to provide reporting information and assist with service or advertising personalization.
Beacons: A beacon is a very small image or object embedded in a webpage or email that is used to track whether you have accessed the content on the webpage or email. They are often used in conjunction with cookies.
Tags and scripts: Tags and scripts are small applications embedded within a webpage or app that execute various functions, such as delivering an advertisement to a webpage, counting the number of visitors to a webpage, or delivering a file or email. They are often used in conjunction with cookies.
4.2. Why do we use cookies?
We use cookies for several reasons, including:
Essential cookies: These cookies are essential for the operation of our services (e.g., to allow you to authenticate and access your account).
Functionality cookies: These cookies enable the functionality of our services (e.g., to save your preferences, such as your language preference).
Performance and analytics cookies: These cookies collect information about how you interact with our services (e.g., pages you have visited or functionality you have used). This information is used to improve and optimize our services.
Advertising cookies: These cookies are used to display relevant advertisements to you. For example, we or our advertisers may use them to display advertisements that are more likely to be of interest to you, and we may use them to collect information about your browsing history to help deliver relevant ads.
4.3. How can you control tracking technologies?
Most web browsers let you control and manage cookies through their settings preferences. If you choose to disable cookies, some features of our services may not operate as intended. To learn more about how to control cookie settings, you can visit the help pages of your browser.
4.4. Do we honor Do Not Track signals?
We adhere to the standards set out in this privacy policy and do not monitor or respond to Do Not Track browser requests.
5. How do we store your information?
This section provides information about how long we retain your information and where we store your information.
5.1. Data retention
We store your information for as long as it is necessary to provide you with our services, to fulfill the purposes outlined in this policy, and as may be required by law. When we have no ongoing legitimate business need to process your personal data, we will either delete or anonymize it or, if this is not possible (e.g., because your personal data has been stored in backup archives), we will securely store your personal data and isolate it from any further processing until deletion is possible.
5.2. International data transfers
We operate internationally, and therefore your information may be stored and processed in any country where we have operations or where we engage service providers. Some of these countries may not have the same level of data protection as your own. However, we have taken appropriate safeguards to ensure that your personal data remains protected in accordance with this policy. These include implementing the European Commission’s Standard Contractual Clauses for transfers of personal data from the European Economic Area, which require all recipients to protect personal data they process from the EEA in accordance with European Union data protection law.
6. How do we protect your information?
We are committed to protecting the security of your information. However, no security system is perfect, and no organization, including ours, can guarantee the absolute security of your information.
6.1. Our security measures
We use reasonable and appropriate security measures to protect your personal data from unauthorized access, use, or disclosure. Our measures include data encryption, firewalls, physical access controls, information access authorization controls, and other industry-standard measures.
6.2. Your responsibilities
You have an important role in ensuring the security of your information. For example, you are responsible for protecting your password(s) and for the security of information you transmit to us over the internet.
7. What are your rights with respect to your information?
In accordance with applicable law, you may have the right to:
Access your personal data: You may have the right to obtain confirmation of whether or not we process your personal data and to request a copy of the personal data we hold about you.
Rectify or delete your personal data: You may have the right to request that we correct or delete any personal data that you believe is inaccurate, incomplete, or out-of-date.
Restrict or object to the processing of your personal data: You may have the right to restrict or object to our processing of your personal data under certain circumstances.
Port your personal data: You may have the right to receive a copy of your personal data in a structured, commonly used, and machine-readable format and to transmit that data to another controller.
Withdraw your consent: If we have collected and processed your personal data based on your consent, you may withdraw your consent at any time. Withdrawing your consent will not affect the lawfulness of any processing we conducted prior to your withdrawal.
You can exercise your rights by contacting us using the contact details in Section 8. We will respond to your request in accordance with applicable law.
8. Contact us
If you have any questions or concerns about this policy or our practices, or if you wish to exercise your rights with respect to your information, you can contact us at:
Email: developer@pioneertechhub.com