40 Lloyd Avenue Suite 306
Malvern, PA 19355
Information we collect and how we use it
As part of our Circonus service, we collect the following types of information:
- Information you provide — When you sign up for a Circonus account, we ask you for personal information (such as your name, email address, company and industry). We also request information that will be used to provide you with a better experience, to improve the quality of the Circonus Services.
- Log information — When you access Circonus Services, our servers automatically record information that your browser sends whenever you visit a website. These server logs may include information such as your web request, internet protocol address, browser type, browser language and the date and time of your request.
- User communications — When you send us email or use other electronic services to communicate with us, which may include chat, telephone/VoIP, video, audio portions of screen share sessions, social media, text/SMS or other communications ("Electronic Communications"), we may retain those communications in order to process your inquiries, respond to your requests, for proper internal business protection and to improve the Circonus Services.
- Links — The Circonus Services and Electronic Communications may contain links in a format that enables us to keep track of whether these links have been followed. We use this information to improve the quality of the Circonus Services.
- Third party API integration — We may offer the ability to integrate the Circonus Services with third party provided services (e.g. GitHub, Facebook, Heroku etc). These integrations may provide Circonus Services the right to access and use information you have provided on the third party site through their application programming interface (API). We may also establish APIs that allow those third party sites to access and use your personal data in the Circonus Services. Use of these integrations only takes place with your consent and opt in. While we are responsible to tell you what information our API may supply to those third parties, we are not responsible for, nor have we reviewed, the privacy, data security or data use policies of any of the third parties with whom the Circonus Services may be integrated.
- Single Sign On — We may permit you to log into your account with us using single sign on ("SSO"), e.g. by logging into your Google, GitHub or Slack account, you will be automatically logged into your account. This is optional; however, when you authorize us to access your information via SSO we copy your data out of the originating service and store it locally on our servers for marketing and account management purposes.
- Providing the Circonus Services, including the display of customized content;
- Auditing, research and analysis in order to maintain, protect and improve the Circonus Services;
- Ensuring the technical functioning of the Circonus Services;
- Protecting the rights or property of Circonus;
- Interacting with third parties through applicable APIs that you have opted into;
- For tracking the performance of any of our social media campaigns;
- Disclosing your personally identifiable information when we are required to do so to comply with applicable law, such as when a government agency or officer makes a demand for it and we determine such demand is legally enforceable, or if we believe that disclosure is necessary to protect our rights and/or to comply with a discovery request in a judicial proceeding, a court order, or other legal process we are served with (each a "Compliance with Law Request"); and
- Developing new Circonus Services.
More information about how we process personal information may be provided in supplementary privacy notices for particular Circonus Services.
Circonus currently processes personal information on our servers that are located in the United States of America. Unless you have a separate contract with other obligations we have agreed to, however, we can move these Circonus Services to any server in the world, or move these Circonus Services to a cloud based service, in which case the information we retain may exist in any other geographic location.
Information we generate
Choices for personal information
You can access, update or change personal information you have provided by logging into your Circonus account or by emailing us at email@example.com.
If you want us to delete your personal information and/or deactivate your Circonus account, please contact us at firstname.lastname@example.org with your request. We’ll take steps to delete your information as soon as is practicable, but note that we may retain certain personal information in archived/backup copies for our records or as otherwise required by law.
You can decline to submit personal information to any of the Circonus Services, in which case Circonus may not be able to provide those Circonus Services to you.
When you sign up for a particular service that requires registration, we ask you to provide personal information. We will not use your personal information in a manner different than the purpose for which it was collected, without your prior consent. Your prior consent may be obtained by giving you notice of how we will use such information and asking you to check a box (or uncheck a box) or manually press a button, or any other means that reasonably indicates you consented to such use.
You can configure your browser to refuse to accept some or all cookies. However, many Circonus Services may not function properly if your cookies are disabled and no guaranty or warranty is provided by Circonus as to the operability of the Circonus Services if you configure your browser or computer/device in this manner.
Circonus does not share personal information with other companies or individuals except: (a) when you have consented by opting in as provided above; (b) in the circumstance of a Compliance with Law Request; and (c) in the circumstance where Circonus engages in a merger, acquisition, sale of business/assets or any form of sale, directly or indirectly, of some or all of its assets (a "Change of Control Event").
We use basic technical processes to configure our systems so that only persons authorized to access and use personal information are permitted to do so; however, we advise you that no process or method can insure that personal information will not be compromised, and we will not be liable for any unauthorized access to, or use of, your personal information unless it is proven that we violated specific applicable law in securing such personal information.
We restrict access to your personal information to Circonus employees, contractors and agents who need to know that information in order to operate, develop or improve the Circonus Services. These individuals are bound by confidentiality obligations.
Service suspension; data retention and destruction
Upon a termination of Circonus Services, we may delete your personal information or we may retain it, if we determine that such retention is required by applicable law or for our internal business protection. Unless we have specifically agreed in a signed writing with you to maintain backups for you we shall not be liable to you for any data we delete or destroy and it is your obligation to maintain a backup of all data stored in the Circonus Services.
Notwithstanding that we may delete your personal information, it may still be retained in backup storage until such data is overwritten. Circonus does not manually purge backup storage.
Children's Online Privacy Protection
This web site is not directed at children under 13 nor do we intend to collect any personally identifiable information from children under 13.
Communications Decency Act Notice
We hereby notify you that parental control protections (such as computer hardware, software, or filtering services) are commercially available that may assist you in limiting access to material that is not suitable to minors. You can discover some of the providers of such parental control technology by searching for "parental control software" using a major search engine, or by visiting https://www.consumer.ftc.gov/articles/0031-protecting-your-childs-privacy-online
Rights Under Other Laws
You may have additional rights under state law to access certain information; for example, California residents may have rights under California Code Section 1798.83. To the extent these laws are applicable to us and your personal information, we will comply with such laws.
ACCEPTABLE USE POLICY
ACCEPTABLE USE OF CIRCONUS SERVICES. You agree as follows in respect of the acceptable and unacceptable uses of the Circonus Services. You will not and agree not to:
a. Use or attempt to use the Circonus Services for any illegal, abusive or unethical activities as determined by us in our sole discretion, which include by example and not limitation, bullying or harassing third parties, illegal stalking, transmission of illegal pornographic material, invasion of privacy, defamation, infringement of another person's copyright, trade secret, patent, trademark or other intellectual property rights, hacking or cracking (gaining unauthorized use of a computer), distributing computer viruses or other malware, gambling, harassment of another or distribution of other harmful materials, code, programs or scripts, disclosing "insider trading" information, national secrets, or other information prohibited or restricted from disclosure.
b. Send unsolicited bulk mail messages ("junk mail" or "spam"). This includes bulk-mailing of commercial advertising, information announcements, charitable solicitations and political solicitations. Such material may only be sent to those who have specifically requested it or as authorized by applicable law, provided that if you assert that your activities are authorized by applicable law, you shall provide an opinion of reputable counsel establishing a basis upon which your actions are taken. Malicious or threatening e-mail is also prohibited. Normally we will assume that you are in compliance with this provision; however, if an upstream provider blacklists our IP range or mail server as a result of activities we trace to you, we will presume that you are in violation of this provision.
c. Breach any applicable data protection statute by, for example, sending or storing personal information (as defined in applicable data protection statutes) in an unencrypted form.
d. Impersonate another person, falsify the source of TCP/IP packets, spoof any portion of an email or TCP/IP header, or misrepresent authorization to act on behalf of others or us. All messages and packets transmitted via the Internet Service should correctly identify the sender and source; you may not alter the attribution of origin in electronic mail messages or posting.
e. Undermine the security or integrity of computing systems or networks or gain unauthorized access or control over our computers or any other person's computers.
f. Permit another person to use your resources or the Circonus Services to conduct any of the matters you are prohibited from doing.
g. Distribute any files in any peer-to-peer or file sharing arrangement, where it is possible that in such file sharing process any of the Circonus Services may be used to distribute copyrighted materials to or from persons who are not authorized to receive, copy, distribute or use them.
h. Take any action that would cause us to violate any terms of an upstream service provider's acceptable use policy.
i. Engage in any activity disruptive or abusive towards our members or to Circonus Services operations, including and not limited to:
- Distribute or post any virus, worm, Trojan horse, or computer code intended to disrupt Circonus Services, destroy data, destroy or damage equipment or disrupt Circonus Services operations;
- Degrade or impair the operation of Circonus Services servers and facilities or the servers and facilities of other network hosts or Internet users;
- Post messages or software programs that consume excessive CPU time or storage space;
- Subvert, or assist others in subverting, the security or integrity of any of Circonus Services, facilities or equipment; and/or
- Place false, fraudulent, materially incomplete or misleading information on the Circonus Services.
The above list of acceptable and unacceptable uses of the Circonus Services is not intended to be exhaustive, but rather illustrative of the range of unacceptable uses. We have the right in our sole discretion to determine whether any particular conduct is an acceptable use of the Circonus Services. In cases where we determine you engaged in conduct that you reasonably believed did not violate this policy in good faith, we will endeavor to provide you electronic notice of our determination that such conduct is not an acceptable use, and provided you cease such conduct not later than 24 hours after such notice, you will not be considered to be in breach of this Acceptable Use Policy.