This is definitely not the most exciting page on our website, but it is really important to us. We want to be very clear about the information we collect, how we use that data and how we protect it. If you have any questions regarding this policy at any time, contact our team at: email@example.com.
Last modified: February 23, 2016
Information We Collect & How We Use It
We may collect the following types of information:
Information you provide: When you sign up for a CoreBridge account, we ask you for personal information and company information. We may combine the information you submit under your account with third parties in order to provide you with a better experience and to improve the quality of our services. For certain services, we may give you the opportunity to opt out of combining such information. You can use the CoreBridge Management Module to learn more about the information associated with your account or to make any changes.
Log information: When you access CoreBridge services via a browser, application or other client, our servers automatically record certain information. These server logs may include information such as your web request, your interaction with a service, Internet Protocol address, browser type, the date and time of your request and one or more cookies that may uniquely identify your browser or your account.
User communications: When you send email or other communications to Atomology, we may retain those communications in order to process your inquiries, respond to your requests and improve our services. We may use your email address to communicate with you about our services.
Location data: Atomology offers location-enabled services, such as Google Maps, through optional mobile apps. If you use those services, Google may receive information about your actual location (such as GPS signals sent by a mobile device) or information that can be used to approximate a location (such as a cell ID).
In addition to the above, we may use the information we collect to:
Provide, maintain, protect, and improve our services and develop new services; and
Protect the rights or property of Atomology or our users.
If we use this information in a manner different than the purpose for which it was collected, then we will ask for your consent prior to such use.
Atomology processes personal information on our servers in the United States of America.
Atomology only shares personal information with other companies or individuals outside of Atomology in the following limited circumstances:
We have your consent. We require opt-in consent for the sharing of any sensitive personal information.
We have a good-faith belief that access, use, preservation or disclosure of such information is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or enforceable governmental request, (b) enforce applicable Terms of Service, including investigation of potential violations thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues, or (d) protect against harm to the rights, property or safety of Google, its users or the public as required or permitted by law.
We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, including appropriate encryption and physical security measures to guard against unauthorized access to systems where we store personal data.
We restrict access to personal information to Atomology employees, contractors and agents who need to know that information in order to process it on our behalf. These individuals are bound by confidentiality obligations and may be subject to discipline, including termination and criminal prosecution, if they fail to meet these obligations.
Accessing and Updating Personal Information
When you use CoreBridge services or any other service provided by Atomology, we make good-faith efforts to provide you with access to your personal information and either to correct this data if it is inaccurate or to delete such data at your request if it is not otherwise required to be retained by law or for legitimate business purposes. We ask individual users to identify themselves and the information requested to be accessed, corrected or removed before processing such requests, and we may decline to process requests that are unreasonably repetitive or systematic, require disproportionate technical effort, jeopardize the privacy of others, or would be extremely impractical (for instance, requests concerning information residing on backup tapes), or for which access is not otherwise required. In any case where we provide information access and correction, we perform this service free of charge, except if doing so would require a disproportionate effort. Because of the way we maintain certain services, after you delete your information, residual copies may take a period of time before they are deleted from our active servers and may remain in our backup systems. Please review the service Help Centers for more information.