Effective on 11/14/2022
I. WHAT IS COOKIE?
Cookies are small text files that are stored on your device. They are used in order to make websites and software applications work, or work in a better way, as websites and software applications can read and write these files, enabling them to recognize a particular device and remember relevant information which makes your use of a website or software application more convenient.
II. WHAT COOKIES ARE USED?
Below listed different types of cookies (technologies), which may be used on the Breach services and (or) products. Please note that the names of cookies and similar technologies may change over time:
|Type of Technology||Explanation|
Any browser may receive cookies from us or cookies from our customers, partners or service providers. Cookies may also be placed in your browser when you visit non-Breach sites that display ads or that host our plugins or tags.
We use persistent cookies and session cookies. A persistent cookie lasts beyond the current session and is used for many purposes, such as recognizing you as an existing user. It will be read by Breach when you return to one of our sites or visit a third party site that uses our Services. Session cookies last only as long as the session (usually the current visit to a website or a browser session).
First party and third-party cookies are used. First-party cookies are created and accessed by the host domain – the domain the user is visiting. Third-party cookies are those created and accessed by domains other than the one the user is visiting at the time.
Marketing and Advertising Cookies: cookies used to personalize, measure and deliver advertising and marketing messages, i.e.:
Operational Cookies and data usage: these cookies are used, for example, to maintain your login state and remember your preferences and cannot be disabled, e.g.:
As an example, the Operational cookies are used to: (1) recognize you when you sign in to use our services; (2) present relevant content, providing other customized features and services; (3) prevent fraudulent activity and improve security; (4) keep track of your preferences such as privacy choices, language, theme settings and player settings; (5) gather data (restricted to Breach) through Breach-owned cookies in order to improve Breach’s content, products, and services and to measure and understand the performance of our services.
Breach also uses third-party payment processors to collect and process payments in connection with the commerce offerings available on the Breach services. These payment processors share details of their data collection practices with you separately as part of their respective payment check-out process.
|Local storage||Enables a website or application to store information locally on your device(s). Local storage may be used to improve the Breach experience, for example, by enabling features, remembering your preferences and speeding up site functionality.|
|Pixels||A pixel is a tiny image that may be embedded within web pages and emails, requiring a call (which provides device and visit information) to our servers in order for the pixel to be rendered in those web pages and emails. We use pixels to learn more about your interactions with email content or web content, such as whether you interacted with ads or posts. Pixels can also enable us and third parties to place cookies on your browser.|
III. WHAT ARE THESE COOKIES / TECHNOLOGIES USED FOR?
The purposes for which these cookies / technologies are used for are described below:
|Authentication||Used to recognize you when you visit our services, use our products. Cookies enable Breach to identify you and verify your account.|
|Security||Used to make your interactions with our Services faster and more secure, e.g. to enable and support our security features, keep your account safe and to help us detect malicious activity and violations of the user agreement.|
|Customized content||Used to customize your experience on our Services, products, e.g. to remember previous searches so that when you return to our services, we can offer additional information that relates to your previous search.|
|Advertising||Used to show relevant advertising to you more effectively. We use these technologies to learn whether content has been shown to you or whether someone who was presented with an ad later came back and took an action. We may also work with our customers and partners to show you an ad on or off Breach, such as after you’ve visited a customer’s or partner’s site or application. These technologies help us provide aggregated information to our customers and partners.|
|Analytics and research|
Helps us learn more about how well our Services and plugins perform in different locations.
Used to understand, improve, and research products, features and services, including as you navigate through our sites or when you access Breach from other sites, applications or devices. Used to determine and measure the performance of ads or posts on and off Breach and to learn whether you have interacted with our websites, content or emails and provide analytics based on those interactions.
Used to provide aggregated information to our customers and partners as part of our Services, products.
If you are a Breach member but logged out of your account on a browser, Breach may still continue to log your interaction with our Services, products on that browser until the expiration of the cookie in order to generate usage analytics for our Services, products. We may share these analytics in aggregate form with our customers, partners.
|Preferences, features and services|
Used to enable the functionality of our Services, products such as helping you to fill out forms on our Services more easily and providing you with features, insights and customized content in conjunction with our plugins. We also use these technologies to remember information about your browser and your preferences.
For example, cookies can tell us which language you prefer and what your communications preferences are. We may also use local storage to speed up site functionality.
IV. HOW DOES BREACH USE THIRD PARTY COOKIES?
V. YOUR CHOICES
Your browser or device may offer settings that allow you to choose whether browser cookies are set and to delete them. These controls vary by browser, and manufacturers may change both the settings they make available and how they work at any time. As of 23 June 2021, you may find additional information about the controls offered by popular browsers at the links: Google Chrome, Firefox, Safari, Safari Mobile, Opera. Please be aware that these controls are distinct from the controls that we offer you.
Users can revisit their cookie choices through their Settings > Security and Privacy > Cookie Preferences. There are also tools such as Digital Advertising Alliance’s Browser Check and European Digital Advertising Alliance’s Your Online Choices site that explain digital advertising and allow you to choose how cookies are used throughout the web based on your location and the device and browser you are using. All users can also enable Google’s browser extension to disable Google Analytics across any website that you visit.
If you are a visitor from the European Union, we facilitate mechanisms for exercising your rights based on the General Data Protection Regulation (GDPR).
You can check more details about your rights as a data subject and the corresponding legal basis in the table below:
|Data Subject Right||Description||Legal Basis|
|Right to Access||You have the right to request access to what kind of personal information we hold about you as well as why we need this information.||GDPR Article 15|
|Right to Rectify||You have the right to request correction or inclusion of your personal information when you find inaccuracies or need to inform updates regarding your data.||GDPR Article 16|
|Right to Erasure||You have the right to request the deletion of your personal information from our system. Sometimes, this right cannot be fulfilled due to certain legal obligations or contractual commitments that justify the retention during a specific mandatory period.||GDPR Article 17|
|Right to Restriction of Processing||You have the right to request the restriction of processing your personal data in certain circumstances (e.g., during a challenge of accuracy or legitimate ground of processing). Sometimes, when we cannot delete your personal information due to legal obligations or contractual commitments, we can fulfil this request instead of the right to erasure.||GDPR Article 18|
|Right of Data Portability||You have the right to request data portability in situations where it’s technically feasible and when there’s logical reasonability to do it (e.g., reuse your personal information by another data controller in the same processing activities or co-related processing activities).||GDPR Article 20|
|Right to Withdraw Consent||You have the right to request the withdrawal of your consent in case you have given to us to authorize processing your personal information,||GDPR Article 7(3)|