Privacy Policy

Effective on 11/14/2022

This Cookie Policy explains the different types of cookies used on Breach services, products and how you can control them.

This Cookie Policy applies to your use of https://breach.gg and any other websites, social platforms, native games, marketplace, applications, or services and (or) products, provided by Breach (with its affiliates, “Breach”, “we” or “us”). This Cookie Policy applies to any Breach product or service that links to this Privacy Policy or incorporates it by reference.

If you have any questions or issues please contact [email protected]

Breach uses personal data collected on our services, such as page visits through cookies and other device identifiers, to generate personalized content, remember your preferences, analyse usage to improve our products and services. Breach also uses cookies and similar technologies, which include HTTP cookies, local storage, pixel tags and web beacons, mobile ad IDs (collectively referred to in this Cookie Policy as “cookies”) to collect and use data as part of our services

If you agree to the use of cookies, we will also permit trusted third parties to obtain data from our services or store and access cookies on your device to deliver personalised ads, content, measure effectiveness, and create audience insights.

By continuing to visit or use our services, products, setting up your Breach account, you are you are agreeing to the use of cookies and similar technologies for the purposes described in this Cookie Policy. We may change this Cookie Policy at any time.

I. WHAT IS COOKIE?

Cookies are small text files that are stored on your device. They are used in order to make websites and software applications work, or work in a better way, as websites and software applications can read and write these files, enabling them to recognize a particular device and remember relevant information which makes your use of a website or software application more convenient.

II. WHAT COOKIES ARE USED?

Below listed different types of cookies (technologies), which may be used on the Breach services and (or) products. Please note that the names of cookies and similar technologies may change over time:

Type of TechnologyExplanation
Cookies

Any browser may receive cookies from us or cookies from our customers, partners or service providers. Cookies may also be placed in your browser when you visit non-Breach sites that display ads or that host our plugins or tags.

We use persistent cookies and session cookies. A persistent cookie lasts beyond the current session and is used for many purposes, such as recognizing you as an existing user. It will be read by Breach when you return to one of our sites or visit a third party site that uses our Services. Session cookies last only as long as the session (usually the current visit to a website or a browser session).

First party and third-party cookies are used. First-party cookies are created and accessed by the host domain – the domain the user is visiting. Third-party cookies are those created and accessed by domains other than the one the user is visiting at the time.

Analytics Cookies: Third parties may use cookies to analyse user activity. For example, Google Analytics may be used to understand how users use their extensions, e.g.:

Google Analytics e.g. _ga, _gid, _gatHelps developers analyse usage to improve extensions.
Hotjar e.g. _hjSession, _hjSessionUserHelps developers analyse usage to improve extensions.

Marketing and Advertising Cookies: cookies used to personalize, measure and deliver advertising and marketing messages, i.e.:

uid, uidrAds measurement partner.
kxsegs, kxuserEnables (1) to acquire new users by delivering targeted ads to users (2) measure marketing campaign to determine the sources of new Breach users
ad-id, ad-privacyInforms advertising activity, the delivery of ads on Breach (including interestbased ads), through partners advertising systems.

Operational Cookies and data usage: these cookies are used, for example, to maintain your login state and remember your preferences and cannot be disabled, e.g.:

Cookie Description Purpose
viewed_cookie_policyUser preferences
cookielawinfo-checkbox-necessaryUser preferences
cookielawinfo-checkbox-analyticsUser preferences
CookieLawInfoConsentUser preferences

As an example, the Operational cookies are used to: (1) recognize you when you sign in to use our services; (2) present relevant content, providing other customized features and services; (3) prevent fraudulent activity and improve security; (4) keep track of your preferences such as privacy choices, language, theme settings and player settings; (5) gather data (restricted to Breach) through Breach-owned cookies in order to improve Breach’s content, products, and services and to measure and understand the performance of our services.

Breach also uses third-party payment processors to collect and process payments in connection with the commerce offerings available on the Breach services. These payment processors share details of their data collection practices with you separately as part of their respective payment check-out process.

Local storageEnables a website or application to store information locally on your device(s). Local storage may be used to improve the Breach experience, for example, by enabling features, remembering your preferences and speeding up site functionality.
PixelsA pixel is a tiny image that may be embedded within web pages and emails, requiring a call (which provides device and visit information) to our servers in order for the pixel to be rendered in those web pages and emails. We use pixels to learn more about your interactions with email content or web content, such as whether you interacted with ads or posts. Pixels can also enable us and third parties to place cookies on your browser.
OtherWe also use other tracking technologies, such as mobile advertising IDs and tags for similar purposes as described in this Cookie Policy. 

 

III. WHAT ARE THESE COOKIES / TECHNOLOGIES USED FOR?

The purposes for which these cookies / technologies are used for are described below:

PurposeExplanation
AuthenticationUsed to recognize you when you visit our services, use our products. Cookies enable Breach to identify you and verify your account.
SecurityUsed to make your interactions with our Services faster and more secure, e.g. to enable and support our security features, keep your account safe and to help us detect malicious activity and violations of the user agreement.
Customized contentUsed to customize your experience on our Services, products, e.g. to remember previous searches so that when you return to our services, we can offer additional information that relates to your previous search.
AdvertisingUsed to show relevant advertising to you more effectively. We use these technologies to learn whether content has been shown to you or whether someone who was presented with an ad later came back and took an action. We may also work with our customers and partners to show you an ad on or off Breach, such as after you’ve visited a customer’s or partner’s site or application. These technologies help us provide aggregated information to our customers and partners.
Analytics and research

Helps us learn more about how well our Services and plugins perform in different locations.

Used to understand, improve, and research products, features and services, including as you navigate through our sites or when you access Breach from other sites, applications or devices. Used to determine and measure the performance of ads or posts on and off Breach and to learn whether you have interacted with our websites, content or emails and provide analytics based on those interactions.

Used to provide aggregated information to our customers and partners as part of our Services, products.

If you are a Breach member but logged out of your account on a browser, Breach may still continue to log your interaction with our Services, products on that browser until the expiration of the cookie in order to generate usage analytics for our Services, products. We may share these analytics in aggregate form with our customers, partners.

Preferences, features and services

Used to enable the functionality of our Services, products such as helping you to fill out forms on our Services more easily and providing you with features, insights and customized content in conjunction with our plugins. We also use these technologies to remember information about your browser and your preferences.

For example, cookies can tell us which language you prefer and what your communications preferences are. We may also use local storage to speed up site functionality.

Plugins on and off BreachUsed to enable Breach plugins both on and off the Breach sites. Our plugins use cookies and other technologies to provide analytics and recognize you on Breach and third-party sites. If you interact with a plugin, the plugin will use cookies to identify you and initiate your request to apply.

 

IV. HOW DOES BREACH USE THIRD PARTY COOKIES?

Third parties may use cookies in the process of delivering and measuring content, including ads, relevant to your interests on Breach and third-party sites.

Third parties may also use cookies to assist us in acquiring new users and measuring the effectiveness of our marketing campaigns. Third parties such as our customers, partners and service providers may use cookies in connection with our Services, products. Third parties may also use cookies in connection with our off-site Services. Third parties may use cookies to help us to provide our Services. We may also work with third parties for our own marketing purposes and to enable us to analyse and research our Services, products.

V. YOUR CHOICES

You have choices on how Breach uses cookies and similar technologies. Please note that if you limit the ability of Breach to set cookies and similar technologies, you may worsen your overall user experience, since it may no longer be personalized to you. It may also stop you from saving customized settings like login information.

Your browser or device may offer settings that allow you to choose whether browser cookies are set and to delete them. These controls vary by browser, and manufacturers may change both the settings they make available and how they work at any time. As of 23 June 2021, you may find additional information about the controls offered by popular browsers at the links: Google Chrome, Firefox, Safari, Safari Mobile, Opera. Please be aware that these controls are distinct from the controls that we offer you.

Users can revisit their cookie choices through their Settings > Security and Privacy > Cookie Preferences. There are also tools such as Digital Advertising Alliance’s Browser Check and European Digital Advertising Alliance’s Your Online Choices site that explain digital advertising and allow you to choose how cookies are used throughout the web based on your location and the device and browser you are using. All users can also enable Google’s browser extension to disable Google Analytics across any website that you visit.

If you are a visitor from the European Union, we facilitate mechanisms for exercising your rights based on the General Data Protection Regulation (GDPR).

You can check more details about your rights as a data subject and the corresponding legal basis in the table below:

Data Subject RightDescriptionLegal Basis
Right to AccessYou have the right to request access to what kind of personal information we hold about you as well as why we need this information.GDPR Article 15
Right to RectifyYou have the right to request correction or inclusion of your personal information when you find inaccuracies or need to inform updates regarding your data.GDPR Article 16
Right to ErasureYou have the right to request the deletion of your personal information from our system. Sometimes, this right cannot be fulfilled due to certain legal obligations or contractual commitments that justify the retention during a specific mandatory period.GDPR Article 17
Right to Restriction of ProcessingYou have the right to request the restriction of processing your personal data in certain circumstances (e.g., during a challenge of accuracy or legitimate ground of processing). Sometimes, when we cannot delete your personal information due to legal obligations or contractual commitments, we can fulfil this request instead of the right to erasure.GDPR Article 18
Right of Data PortabilityYou have the right to request data portability in situations where it’s technically feasible and when there’s logical reasonability to do it (e.g., reuse your personal information by another data controller in the same processing activities or co-related processing activities).GDPR Article 20
Right to Withdraw ConsentYou have the right to request the withdrawal of your consent in case you have given to us to authorize processing your personal information,GDPR Article 7(3)