Transparency is a key to success.
The Kernel is IT SECURITY COMPANY; we are always doing our best to keep information secure and private.
When you share any information with us when you create an account, contact support and/or sending us your contact or any other information, we use this data exclusively to serve you better. We want to be very clear and transparent: We ask only for basic and only necessary information to serve our users, customers, partners and we make sure that your privacy is always highly protected.
1. Collected Information
We collect only the information we need to serve and support all of our users better. The information can include but is not limited to full name, language, address, age, email address, phone number, and other information that we need for processing your inquiries and support. This information is important to serve you by contacting you, creating an account and for any other operation related exclusively to our business.
There are two ways of collecting information:
Information you send to us or you enter when you sign up for an account. For example, the information required for creating an account and preparing your personal dashboard like your name, email address, telephone number or bank and credit card/PayPal details.
Information we get automatically when you are using our services. Some information we need to get automatically to serve you like IP address, your carrier information, your device operating system type and version, etc. This information includes:
Your Device(s) information: We will collect device-specific information such as your hardware model, operating system version, browser you are using, screen resolution, etc.
Location information: We need your location for two reasons: to determine the best route to the network that will serve you, and to switch to your language or currency in your country. This information determined basing on your IP address.
Cookies: Our website is using Cookies to determine user’s identification. When you visit our website or your personal dashboard. This may include sending one or more cookies to your device.
You can delete Cookies any time by clicking here: [delete_cookies]
2. How we use information we collect
We use the collected information from any of our services to serve, maintain, protect and improve them, and to protect our users and communicate with them.
We use the information you provide us for all services we offer including technical support, billing and/or any other related to our service issues.
When you contact us, you will need to use this information and we will keep a record of your communication with us in order to solve any issues you might be facing in the future. We may use your email address to inform you about our services, such as letting you know about upcoming changes or improvements.
We use information collected from cookies and other technologies to improve your user experience and the overall quality of our services. For example, by collecting statistics, we can decide in which area we need to expand our Network. We will never collect any information basing on race, religion, sexual orientation or health.
We might process personal information on our servers located in different countries around the world. And servers can be located outside your country or the country you are using our applications or services.
Accessing and updating your personal information
By visiting The Kernel’s website or using our services, we provide you with access to your personal information (Dashboard), and if you decide to stop using any of our services, you can deactivate your account and delete it – unless we have to keep that information for legitimate business or legal purposes. In case of updating your information, we may ask you to verify your identity before we can act on your request.
We may reject some requests that are unreasonably repetitive, require disproportionate technical effort (for example, developing a new system or fundamentally changing an existing practice), risk the privacy of others, or would be extremely impractical (for instance, requests concerning information residing on backup systems).
Where we can provide information access and correction, we will do so for free, except where it would require a disproportionate effort. We aim to maintain our services in a manner that protects information from accidental or malicious destruction. Because of this, after you delete information from our services, we may not immediately delete residual copies from our active servers and may not remove information from our backup systems.
3. Information we share
We do not share personal information with any other companies, organizations, individuals or third parties outside The Kernel FZCO unless one of the following circumstances applies:
With your consent
We will share personal information with companies, organizations or individuals outside The Kernel FZCO when we have your consent to do so. We require opt-in consent for the sharing of any personal information.
With The Kernel FZCO Administrators
Administrators (support, billing etc.) team is granted to access to your account, and they can view your name, email address, location, device information and statistics. This access is important to provide support to you or your organization and it’s limited depending on the Administrator designation. Administrator may be able to:
Name, address, email address, location, device information, statistics and billing information.
Applications version you install.
To change your password.
Access or retain information stored as part of your account.
Receive your account information in order to satisfy applicable law, regulation, legal process or enforceable governmental request.
Restrict your ability to delete or edit information or privacy settings.
Suspend or terminate your account.
For legal reasons
We will share personal information and disclosure it is reasonably necessary to:
Meet any applicable law, regulation, legal process or enforceable governmental request.
Enforce applicable Terms of Service, including investigation of potential violations.
Detect, prevent, or otherwise address fraud, security or technical issues.
Protect against harm to the rights, property or safety of our users or the public as required or permitted by law.
With our partners
In case of buying any application, product and/or solution belong to one of our partners, we should share your information in order to serve you, register license under your or your customer’s name. The shared information is exactly the same you should share if you buy directly from any of our partners.
This information will be shared exclusively with the corresponding partner and never be shared with any other parties.
4. Information security
We work hard to protect our website, services and our users from unauthorized access to or unauthorized alteration, disclosure or destruction of information we hold. In particular:
We encrypt connection to our website and services using SSL certificate with highest encryption level (Please, click here to check it).
We always review our information collection mechanism, storage and processing, including physical security measures, to guard against unauthorized access to systems.
We restrict access to sensitive personal information to our employees. Depending on employee designation, employee will have a partial access to the necessary information needed for his functions.
Anonymous identifier: An anonymous identifier is a random string of characters that is used for the same purposes as a cookie on platforms, including certain mobile devices, where cookie technology is not available.
Application data cache: An application data cache is a data repository on a device. It can, for example, enable a web application to run without an Internet connection and improve the performance of the application by enabling faster loading of content.
Browser web storage: Browser web storage enables websites to store data in a browser on a device. When used in “local storage” mode, it enables data to be stored across sessions (for example, so that the data are retrievable even after the browser has been closed and reopened). One technology that facilitates web storage is HTML 5.
Cookie: A cookie is a small file containing a string of characters that is sent to your computer when you visit a website. When you visit the website again, the cookie allows that site to recognize your browser. Cookies may store user preferences and other information. You can reset your browser to refuse all cookies or to indicate when a cookie is being sent. However, some website features or services may not function properly without cookies.
Device: The electronic device(s) used to access our services. For example, a device could be a desktop, laptop, tablet or smartphone.
Account: You can access to our services by signing up for an account and providing us with some personal information (typically your name, email address and a password) that is necessary to create it. This information used to authenticate you when you access any of our services and to protect your account from unauthorized access by others. You can edit or terminate your account at any time through your Dashboard settings.
IP address: Every computer connected to the Internet is assigned a unique number known as an Internet protocol (IP) address. Since these numbers are usually assigned in country-based blocks, an IP address can often be used to identify the country from which a computer is connecting to the Internet.
Non-personally identifiable information: This is information that is recorded about users so that it no longer reflects or references an individually identifiable user.
Personal information: This is information, which you provide to us that personally identifies you, such as your name, email address or billing information, or other data, which can be reasonably linked to such information by us.
Sensitive personal information: This is a particular category of personal information relating to confidential medical facts, racial or ethnic origins, political or religious beliefs or sexuality.
Server logs: We record some necessary data to create statistics and usage graphs. This information you can see on your dashboard. Here is an example of typical log entries:
IP address: Internet Protocol address assigned to the user by the user’s ISP; depending on the user’s service, a different address may be assigned to the user by their service provider each time they connect to the Internet;
30/April/2015 16:00:32 is the date and time of the query;
Safari 9.0.3, Mac OS 10.11.3
Firefox 43.4; Windows 10 is the browser and operating system being used;
A unique cookie ID assigned to this particular computer the first time it visited The Kernel FZCO website. Users can delete cookies any time. If the user has deleted the cookie a new unique cookie ID will be assigned on the next time of visiting The Kernel FZCO website from that particular device.
Copyright (C) The Kernel