Welcome to Zigass - Privacy Policy
Last modified: 8 February 2025
# 1. Privacy Policy Scope
Who is Zigass and our Commitment to Your Privacy?
Zigass (“Zigass” or “We”) is a company that places a high value on your privacy. We are dedicated to protecting your personal information and we do so by strictly adhering to this Privacy Policy. Our primary goal is to provide you with quality services while ensuring that your data is treated with respect and security.
What Does this Privacy Policy Cover?
This Privacy Policy is like a rulebook that explains in detail:
- What types of information we may collect from you: It clearly describes what personal and non-personal data we may collect when you interact with us.
- What information you provide to us directly: It specifies the types of information you voluntarily provide when using our services.
- How we use the information collected: It explains the purposes for which we use your data, from improving services to communicating with you.
- How we protect your information: It describes the security measures we implement to protect your data from unauthorized access or misuse.
- How and when we may disclose your information: It specifies the limited situations in which we may share your information with third parties and under what conditions.
This policy applies when you use:
- Our Website
("Website"): When you browse our website, we collect certain information about your interaction with the site.www.zigass.com - The Zigass Mobile Application ("App"): If you use our mobile application, the privacy policy also applies to data collected through the application.
- Our Services ("Service"): The term "Service" refers to all the services we offer in accordance with the Zigass Terms and Conditions. This policy governs the collection and use of your data in the context of providing these services. To fully understand what the "Service" includes, please refer to the Zigass Terms and Conditions (a separate document detailing the rules and conditions of using our services).
Why is it Important to Read this Privacy Policy Carefully?
Please read this Privacy Policy carefully to fully understand our practices regarding your information and how we will treat it. It is essential that you are informed about how we manage the privacy of your data.
What Happens if You Do Not Agree with this Privacy Policy?
If you do not agree with the policies and practices described in this Privacy Policy, your choice is not to use our Website, App, or Service. Use of our services is conditional upon acceptance of this policy.
Acceptance of the Privacy Policy by Using Our Services.
By accessing or using
This Privacy Policy may be amended periodically to reflect changes in our data management practices or legislative changes. Please refer to the section "Changes to Our Privacy Policy" (which will be detailed later in the full document) to stay updated on any updates.
Your Responsibility to Periodically Check the Privacy Policy.
Your continued use of the Website, App, or Service after we make changes is deemed to be acceptance of those changes. Therefore, please periodically check the Privacy Policy for updates. We will do our best to inform you of significant changes, but it is your responsibility to stay up-to-date with the latest version of the policy.
What Types of Information Does this Privacy Policy Apply To?
This Privacy Policy applies to information we collect:
- On this Website: Information collected directly through our website, such as data entered in forms, browsing information, etc.
- In emails, text messages, and other electronic messages with us: All electronic communications we have with you, including those related to the use of the Service.
- While using our Service: Data collected while you are actually using our services, in accordance with the Terms and Conditions.
- Through our App: Information collected through the Zigass mobile application.
- When you interact with our plugins, ads, cookies, or similar technologies on third-party services: Sometimes we use technologies such as cookies or plugins on third-party platforms (e.g., social networks) to provide you with a better experience or for advertising. This policy also applies to data collected through these interactions.
What Types of Information Does this Privacy Policy NOT Apply To?
This Privacy Policy does NOT apply to information collected:
- (1) Offline or by other means that are not our Website, App, or Service: This means that the policy does not cover information collected in a traditional way, outside the online environment (e.g., by mail, telephone, in person) or through other websites that are not
, even if operated by Zigass or third parties.www.zigass.com - (2) By any third party: The policy does not cover the privacy practices of any other party besides Zigass. This includes:
- Third-party applications or content (including advertising) that may be linked to or accessible from our Website, App, or Service. For example, if our Website contains links to other websites, our Privacy Policy does not apply to those third-party sites. Each website has its own privacy policy, which you should consult separately.
- Data collection performed by social media platforms even if you interact with social media buttons integrated on our Website. Each social media platform has its own privacy policy.
In conclusion: This Privacy Policy is an important document that explains your rights and obligations regarding the privacy of your data when you use Zigass services. We encourage you to read it carefully and contact us if you have any questions or concerns. Transparency and the protection of your data are our priorities.
# 2. Children Under the Age of 13
Important Notice Regarding Children's Privacy:
At Zigass, we are deeply committed to protecting the privacy of children. This section of our Privacy Policy is specifically dedicated to explaining our stance on collecting information from children under the age of 13. Please read this information carefully if you are a parent or guardian.
Our Services are Not Designed for Young Children:
Our Website, App, and Service are not intended for use by children under 13 years of age. This means that our platform and offerings are designed for a general audience and are not specifically tailored to attract or be used by young children.
Strict Age Restriction: No Information from Children Under 13 Allowed:
We have a firm policy in place: No one under the age of 13 is permitted to provide any information to our Website, App, or Service. This is a strict rule designed to protect children and comply with international laws regarding children's online privacy. This prohibition applies to all types of information, whether it seems personal or not.
We Do Not Knowingly Collect Personal Information from Children Under 13:
Zigass has implemented measures to prevent the intentional collection of personal information from children under 13. We do not knowingly collect personal information from this age group. Our systems and processes are designed to avoid collecting such data. However, in the event that such collection might inadvertently occur, we have procedures in place to address it (explained further below).
If You Are Under 13, Please Refrain from Using Our Services and Providing Information:
If you are under 13 years old, it is crucial that you do not engage with our Website, App, or Service in any way that involves providing information. Specifically, we instruct children under 13 not to:
- Use or provide any information on this Website, App, or Service: This is a comprehensive instruction. Children under 13 should not browse with the intention of providing data, nor should they actively input any information anywhere on our platforms.
- Use or provide information through any of its features: This clarifies that the prohibition extends to all features of our services, not just specific sections.
- Register on the Website, App, or Service: Creating an account or signing up for any service is strictly prohibited for children under 13.
- Make any purchases through the Website, App, or Service: Engaging in any transactions or purchases is not allowed for users under 13.
- Use any of the interactive or public comment features of this Website, App, or Service: Contributing to forums, comment sections, or any public interactive areas is also prohibited for this age group to prevent public disclosure of personal information.
- Provide any information about yourself to us: This is a broad and encompassing restriction. Children under 13 should not provide any information, including, but not limited to:
- Your name (first name, last name, or full name)
- Address (physical address, postal address, email address)
- Telephone number (home, mobile)
- Email address
- Any user name you may use or create for online services.
This list is not exhaustive, and the general principle is that children under 13 should not provide any personally identifiable information to Zigass through our Website, App, or Service.
What We Will Do If We Discover We Have Collected Information from a Child Under 13:
In the unlikely event that we become aware that we have unintentionally collected or received personal information from a child under 13 without verification of parental consent, we have a clear procedure in place: we will immediately delete that information.
We take this action to ensure compliance with child privacy laws and to protect the privacy of young users. Our priority is to rectify the situation as quickly as possible and remove any data that should not have been collected. "Verification of parental consent" implies that, in very specific and exceptional circumstances where collection might be considered, we would require verifiable consent from a parent or legal guardian before collecting and using a child’s personal information, which we are not currently set up to obtain nor intend to do for children under 13 given our service is not designed for them.
How to Contact Us If You Believe We May Have Information from a Child Under 13:
If you are a parent or guardian and you believe that Zigass might have collected information from or about your child who is under 13 years of age, please contact us immediately at
We take such reports very seriously. Upon receiving your notification, we will investigate the matter promptly and take appropriate action, including deleting any personal information we may have inadvertently collected from a child under 13 without proper consent.
In Summary: Protecting children's privacy is of paramount importance to us. We have implemented this strict policy to ensure that our services are not used by children under 13 in a way that could compromise their personal information. We rely on parents and guardians to help us enforce this policy by monitoring their children's online activities and ensuring they do not use the Zigass Website, App, or Service if they are under 13.
# 3. Information We Collect About You, How We Collect It, and Why We Collect It
Understanding What Data Zigass Collects, How, and Why It Matters:
This section explains in detail what types of information Zigass may collect from you when you use our Website, App, or Service. It also clarifies how we collect this information and, most importantly, why we collect it – the reasons behind our data collection practices. We believe in transparency, and this section aims to provide you with a clear picture of our data handling.
Types of Information We May Collect:
We may collect several different categories of information from and about users of our Website, App, or Service. These can broadly be categorized as follows:
-
Personally Identifiable Information (PII): Information That Can Identify You Directly: This refers to data that can be used to recognize you as an individual, either on its own or when combined with other information. This category is collectively referred to as "Personally Identifiable Information" or "PII". Examples of PII we may collect include:
- Your Name: Your first and last name, or any name you use to identify yourself.
- Street Address: Your physical home or business address.
- Country: The country you reside in or are accessing our services from.
- E-mail Address: Your primary or secondary email address.
- Phone Number: Your mobile or landline phone number.
- Gender: Your gender identity.
- Profile Picture: Any image you choose to use as your profile picture on our platform.
- Age Range: An indication of your age group (e.g., 25-34, 35-44), which may be collected as a range rather than your exact age.
- Financial Information: This is sensitive information related to your finances, which we may collect when necessary for transactions or providing certain services. Examples include:
- Bank Account and Routing Number: Details needed for direct bank transfers or payments.
- Account Name: The name associated with your bank account.
- Credit Card Information: Credit card number, expiration date, and CVV code (collected securely for payment processing).
- Payment Information: General details related to your payments and transactions through our platform.
- Your IP Address (Internet Protocol Address): A numerical label assigned to your computer or device when it connects to the internet. This helps identify your device on a network.
- Unique Device ID: A unique identifier assigned to your specific mobile device or computer.
- Advertising ID: An identifier used by advertising platforms to track user activity for advertising purposes (e.g., Apple's IDFA or Google Advertising ID).
- Log-in Information: Usernames and passwords you create to access your account on our platform.
- Social Network ID: Your user ID or profile information from social networking platforms if you choose to connect or log in using your social media accounts.
- Any other identifier by which you may be contacted online or offline: This is a broad category to encompass any other information that could potentially be used to reach you, whether through the internet or through traditional methods.
-
Device Information: Technical Details About Your Device and How You Use Our Services: This category includes technical data about the device you are using to access our Website, App, or Service. This information is generally anonymous or aggregated and helps us optimize our services for different devices and users. Examples include:
- Hardware Model: The specific model of your phone, tablet, or computer (e.g., iPhone 13, Samsung Galaxy S21, MacBook Pro).
- OS Version (Operating System Version): The version of the operating system your device is running (e.g., iOS 15, Android 12, Windows 11, macOS Monterey).
- Zigass App Version: The specific version number of the Zigass App you have installed (if applicable).
- Screen Size: The resolution and dimensions of your device's screen.
- Browser Type: The type of web browser you are using (e.g., Chrome, Safari, Firefox, Edge).
- Pages You Have Accessed: A record of the pages you have visited within our Website or App.
- Device Type: The general category of device you are using (e.g., mobile phone, tablet, desktop computer).
- Geolocation: Your general geographic location, which may be derived from your IP address or device location services (typically at a city or regional level, not precise location unless you explicitly consent).
- Language Setting: The language you have set as your preferred language on your device or browser.
- Other Technical Information about your device and use of our Website, App or Service: This is a broad category encompassing other technical data points that help us understand how you are interacting with our platform and ensure it functions correctly across different devices and configurations.
-
Social Network Information: Data from Social Media Platforms (If You Connect Your Accounts): If you choose to connect your social media accounts to our Service (e.g., for login or sharing features), we may collect information from those platforms, depending on your privacy settings and the permissions you grant. This may include:
- Posts: Content you have posted publicly on your connected social media profiles.
- Comments: Comments you have made on social media platforms.
- Likes: Items you have "liked" or reacted to on social media.
- Subscriptions: The accounts or pages you follow or subscribe to on social media platforms.
-
Product-Related Information: Details About Your Interactions with Products and Services: If you interact with products or services on our platform (e.g., browsing an online store, using a product-related service), we may collect information about your engagement. This can include:
- Products Viewed: A record of the products you have looked at or browsed on our Website or App.
- Products Opened: Details of product pages or listings you have specifically opened for more information.
- Products Searched: The search terms you have used to look for products or services on our platform.
- Products Purchased: A history of your purchases made through our Service, including order details.
- Shipment Tracking: Information related to the delivery status and tracking of your orders.
- Product Reviews: Any reviews or ratings you submit for products or services on our platform.
How We Collect Information:
We primarily collect information in two main ways:
-
Information You Provide Directly (Voluntarily Given): You actively give us information when you:
- Login with your social network credentials: If you choose to use your social media account to log in to our Service.
- Fill out a form: When you complete forms on our Website, App, or Service, such as registration forms, contact forms, order forms, surveys, etc.
- Enter information on our Website, App or Service: When you type or input data into text fields, upload files, or otherwise provide content on our platforms.
- Make a purchase: When you buy products or services through our platform.
- Use our products or services: As you interact with and use the features of our services.
- Use other website features: When you engage with various functionalities offered on our Website or App.
-
Information We Collect Automatically (Passive Collection via Technology): We use automated data collection technologies to gather certain information automatically when you use our Website, App, or Service without you actively providing it in each instance. These technologies often work in the background. Examples include:
- Data Collection Technologies: This refers to technologies like:
- Cookies: Small text files stored on your device that help websites remember information about you and your preferences.
- Web Beacons (Pixel Tags): Tiny images embedded in web pages or emails that allow us to track if you have viewed a page or opened an email.
- Log Files: Records of events that occur when you use our services, such as your IP address, browser type, access times, and pages visited.
- Mobile Analytics Software: Tools used to collect data about the usage and performance of our mobile app.
- Similar Technologies: Other tracking technologies that may evolve over time or serve similar purposes.
- Data Collection Technologies: This refers to technologies like:
How We May Use the Information We Collect (Our Purposes):
We use the information we collect for a variety of legitimate business purposes, all aimed at improving our services, providing you with a better experience, and operating effectively. These purposes include:
-
To present our Website, App or Service to you with the best user experience possible: We use collected data to:
- Optimize website and app design and functionality.
- Personalize your experience, such as remembering your preferences.
- Ensure our services work smoothly and efficiently on your device.
- Make our advertising (including deep links) more relevant to you: We may use data to:
- Show you ads that are more likely to be interesting to you based on your browsing history or interests.
- Measure the effectiveness of our advertising campaigns.
- "Deep links" are specific types of links that take you directly to content within an app, and we aim to make these links relevant too.
-
To perform payments and order fulfillment: If you make purchases, we need your information to:
- Process your payments securely.
- Fulfill your orders (e.g., shipping products, delivering services).
- Provide you with order confirmations and updates.
-
To provide the services you use, and to respond to your questions: We use your information to:
- Deliver the core services you have requested or subscribed to.
- Provide customer support and answer your inquiries.
- Troubleshoot technical issues and resolve problems.
-
To communicate with you regarding service updates, offers, and promotions: We may use your contact information to:
- Send you notifications about updates to our services.
- Inform you about special offers, discounts, or promotions that may be of interest.
- Share news and announcements related to Zigass.
- Note: We will generally provide you with options to manage your communication preferences, allowing you to opt-out of marketing communications.
-
To deliver customized content that may be of interest to you: We strive to personalize your experience by:
- Recommending content, features, or products that align with your interests based on your past interactions or preferences.
- Tailoring the information you see within our Website, App, or Service to be more relevant to you.
-
To address network integrity and security issues: We use data to:
- Monitor our network and systems for security threats and vulnerabilities.
- Detect and prevent fraud and unauthorized access.
- Ensure the stability and reliability of our infrastructure.
-
To investigate, prevent or take action regarding illegal activities, violations of our Terms of Service or other applicable policies: We may use your information to:
- Investigate suspected illegal activities or fraud.
- Enforce our Terms of Service and other policies.
- Take action against users who violate our terms or engage in harmful conduct.
-
In any other way we may describe when you provide the information: In specific instances, we may inform you of additional purposes for data collection at the point where you provide that information. We will be transparent about these specific uses at the time of collection.
-
For any other purpose with your consent: Beyond the purposes listed above, we may also use your information for other purposes if we obtain your explicit consent. We will always seek your informed consent before using your data for new or unforeseen purposes.
Transparency and Your Control: We are committed to being transparent about our data collection practices and providing you with choices regarding your information where applicable. This detailed explanation is part of that commitment. Further sections of this Privacy Policy will elaborate on your rights and controls regarding your personal data.
# 4. Online Activity Tracking
Understanding How We Track Your Activity Online and Why:
This section explains how Zigass tracks your online activity when you use our Website, App, or Service. We use various technologies for this purpose, and this section will break down each of them, explaining what they are, how they work, and why we use them. Understanding these practices helps you be more informed about your online experience and data privacy.
Technologies We Use for Online Activity Tracking:
Zigass utilizes a range of technologies to collect information about your activity on our Website, App, or Service. These include:
- Cookies: Small files placed on your computer.
- User Behavior Analytics: Tracking how users interact with our platform (e.g., clicks, page views, time spent).
- Server Log Files: Records of server activity, including IP addresses and access times.
- Similar Technologies: This encompasses other tracking tools, such as:
- Pixels (Pixel Tags): Tiny, often invisible images embedded in web pages and emails.
- Ad Tags: Code snippets used for online advertising tracking and measurement.
- Device Identifiers: Unique identifiers associated with your device (like Advertising IDs).
Let's explore these technologies in more detail:
Cookies: Small Files Stored on Your Computer:
-
What are Cookies? A cookie is a small text file that websites place on your computer's hard drive when you visit them. Think of them as little digital "notes" that websites can use to remember things about you and your visit.
-
Purpose of Cookies: Cookies serve various purposes, including:
- Remembering your preferences: Cookies can store your settings, such as language preference or items in your shopping cart, so you don't have to re-enter them each time you visit.
- Website Functionality: Essential cookies are often necessary for websites to function properly, such as managing login sessions or enabling e-commerce features.
- Tracking user activity: Cookies can track pages you visit within a website, links you click, and actions you take. This information helps website owners understand how users interact with their site.
- Personalized Advertising: Advertising cookies are used to show you ads that are more relevant to your interests based on your browsing history.
-
Managing Cookies - Your Choices: You have control over cookies through your web browser settings:
- Refusing Cookies: Most web browsers allow you to refuse to accept cookies. You can typically find this option in your browser's "Settings" or "Privacy" menu. You can choose to block all cookies or selectively block certain types of cookies.
- Consequences of Refusing Cookies: If you choose to block cookies, some parts of our Website, App, or Service may not function correctly, or you may lose some personalized features. For example, you might have to log in every time you visit, or your preferred settings might not be saved.
- Default Cookie Setting: Unless you actively change your browser settings to refuse cookies, our system will issue cookies when you visit our Website, App, or Service. This is the standard behavior for most websites and browsers.
-
Types of Cookies We May Use: When you visit our Website or App, we may set some or all of the following types of cookies on your device:
-
Essential Website Cookies: These cookies are strictly necessary for the basic operation of our Website. We need them to:
- Provide you with access to our Website.
- Enable you to use essential features of the Website, such as navigation, security features, and accessing secure areas.
- Without these cookies, the Website may not function properly or at all.
-
Advertising Cookies: We use these cookies to enhance the advertising you see:
- Making Ads More Relevant: To show you advertising messages that are more likely to be interesting to you, based on your browsing behavior and inferred interests.
- Choosing Ads Based on Preferences: To select ads that are more aligned with your likely preferences.
- Measuring Ad Performance: To track the number of times ads are displayed to you and to measure the efficiency and effectiveness of our advertising campaigns. This helps us understand which ads are working and optimize our advertising spending.
-
Analytics Cookies: These cookies help us understand and improve our Website and App:
- Evaluating Website/App Quality: They help us assess how well our Website and/or App are performing in terms of user experience, functionality, and speed.
- Evaluating Marketing Efforts: They help us analyze the effectiveness of our marketing campaigns and understand which marketing channels are driving traffic and engagement.
- Customization and Improvement: The data from analytics cookies allows us to identify areas for improvement, customize the Website and App to better meet user needs, and enhance the overall user experience.
-
Web Beacons (Also Known as Pixel Tags, Clear GIFs, Single-Pixel GIFs):
-
What are Web Beacons? Web beacons are small, often transparent, electronic files that can be embedded in web pages, advertisements, or emails. They are usually invisible to the user. Different names for the same technology include: clear GIFs, pixel tags, and single-pixel GIFs.
-
Purpose of Web Beacons: Web beacons allow Zigass to perform actions such as:
- Counting Users: To count the number of users who have visited specific pages of our Website, App, or Service, or who have opened a particular email we sent.
- Website Statistics: To gather other related website statistics, such as:
- Recording Content Popularity: Understanding which content on our Website is most popular or frequently viewed.
- Verifying System and Server Integrity: Helping us monitor the health and performance of our systems and servers.
-
How Web Beacons Work: When you load a web page or open an email that contains a web beacon, your browser or email client automatically requests the image file from our server. This request allows us to record the event (page visit or email open) and collect associated data.
UTM Tags (Urchin Tracking Module Tags):
-
What are UTM Tags? UTM tags are custom URL parameters that you add to the end of a website URL. They are used primarily for marketing campaigns.
-
Purpose of UTM Tags: UTM tags help us:
- Track Marketing Campaign Performance: They allow us to understand which marketing campaigns are driving traffic to our Website and App and which are most effective.
- Reporting in Analytics Platforms: Data collected through UTM tags is typically analyzed in platforms like Google Analytics, allowing us to create detailed reports on marketing performance.
- Understanding Link Sources on Third-Party Websites: When we use UTM tags in links we place on third-party websites (e.g., in banner ads or social media posts), we can track which specific link and which third-party website led a visitor to our Website.
- Analyzing Visitor Sources: UTM tags help us understand where our website visitors are coming from in terms of marketing channels and specific sources.
-
How UTM Tags Work:
- Custom URLs: We create custom URLs for our marketing campaigns by appending UTM parameters to the standard website URL.
- Visible in the URL: UTM tags are visible as part of the URL you see in your browser's address bar when you click on a UTM-tagged link.
- Parameter-Based Tracking: The tracking occurs through the UTM parameters appended in the URL. These parameters typically identify the campaign source, medium, campaign name, etc.
- Aggregated Data: When you click a UTM-tagged URL on a third-party website, based on the parameters we set, we can track in aggregate from which source and campaign that visit originated. We collect this data at an aggregated level, meaning we analyze trends and patterns across many users, rather than focusing on individual user behavior.
-
Benefits of Using UTM Tags: Customizing URLs with UTM tags allows us to:
- Better Understand Marketing Activity: Gain valuable insights into the performance of our marketing efforts and which strategies are most effective.
- Better Serve Our Audience: By understanding what marketing channels and messages resonate with our audience, we can optimize our marketing and communication to better serve their needs and interests.
How Zigass Uses Online Activity Tracking Information:
We use the information collected through cookies, web beacons, UTM tags, and other tracking technologies for several key purposes:
- Tailoring Website/App Content: To personalize the content you see on our Website, App, or Service, making your experience more relevant and engaging.
- Optimizing Website/App Performance: To analyze how users interact with our platforms and identify areas for improvement in terms of design, functionality, and speed.
- Making Advertising More Relevant: To show you ads that are more likely to be of interest to you, improving the effectiveness of our advertising and your overall online experience.
Data Transfer to Authorized Processors:
To achieve these purposes, we transfer this tracking data to our authorized processors. These are trusted third-party companies that provide us with:
- Analytics Solutions: Tools and services to analyze website and app traffic, user behavior, and marketing performance.
- Recommendation Solutions: Technologies that help us personalize content and product recommendations based on user data.
These processors act on our behalf and are contractually obligated to protect your data and use it only for the purposes we specify.
Do Not Track (DNT) Browser Signals - Our Policy:
-
What is Do Not Track (DNT)? Do Not Track (DNT) is an optional setting available in some web browsers. It allows you to express your preference not to be tracked online by advertisers and other third parties.
-
Purpose of DNT: When you enable DNT in your browser, it sends a signal to websites you visit, indicating your preference regarding online tracking.
-
Zigass's Response to DNT Signals: *Please note that our Website does not currently respond to Do Not Track (DNT) signals. This means that even if you have DNT enabled in your browser, our website's tracking mechanisms, as described above, may still operate.
-
Personalized Advertising Based on Past Activity: We do use information regarding your prior visits, searches, purchases, and other activities on our Website, App, or Service to make our advertising you see on some websites other than ours more relevant to you. This means that your activity on Zigass platforms may influence the ads you see on other websites across the internet. This is a common practice called "retargeting" or "remarketing," where ads are shown to users based on their previous interactions with a particular brand or website.
In Summary: Online activity tracking is a common practice used to improve websites and apps, personalize user experiences, and deliver relevant advertising. Zigass uses various technologies for this purpose, including cookies, web beacons, and UTM tags, as explained in detail above. While we strive to be transparent about these practices, please be aware that our Website does not currently respond to Do Not Track (DNT) signals. You have some control over cookies through your browser settings, but please understand that disabling cookies may affect certain functionalities of our services.
# 5. Information Sharing
Understanding How and Why Zigass May Share Your Information:
This section clarifies how and why Zigass might share your Personally Identifiable Information (PII) with other companies or entities. We understand that you want to know who might have access to your information and under what circumstances. This section aims to provide transparency about our information sharing practices and assure you that we handle your PII responsibly.
With Whom We May Share Your Personally Identifiable Information (PII):
Zigass may need to disclose your PII to different categories of recipients in specific situations. These recipients can be broadly grouped as:
-
Companies Affiliated with Zigass: This refers to companies that are part of the same corporate group as Zigass, meaning they are under common ownership or control. Sharing with affiliates may happen for operational reasons, such as centralized business functions or to provide integrated services.
-
Non-Zigass Companies: This is a broader category encompassing companies that are not directly affiliated with Zigass. These can be various types of external entities, including business partners and service providers.
-
Other Third Parties: This is a general term that can include entities beyond traditional companies, such as legal authorities or other organizations, depending on the specific context.
Purposes for Sharing Your PII - Why We May Need to Disclose Your Information:
We only share your PII when it is necessary and for specific, legitimate purposes. These purposes are outlined below:
-
Complying with Court Orders and Other Legal Process: In certain situations, we may be legally obligated to disclose your PII. This could happen when:
- We receive a valid court order: A court of law may legally compel us to provide information.
- We are subject to a subpoena: A subpoena is a legal document requiring us to produce documents or testify in legal proceedings, which may involve disclosing PII.
- We are required to comply with other legal processes: This includes complying with other types of legally binding requests from government or law enforcement agencies.
- Example: If a law enforcement agency is investigating a potential crime and obtains a court order requiring Zigass to provide information about a user suspected of involvement, we would be legally obligated to comply and share the relevant PII.
-
To Assist with Identity Verification, and to Prevent Fraud and Identity Theft: Protecting against fraud and ensuring secure transactions is a high priority. To achieve this, we may share PII to:
- Verify your identity: When you perform certain actions, such as setting up an account or making a large transaction, we may need to verify your identity to prevent unauthorized activity. This might involve sharing PII with identity verification services.
- Prevent fraud: We may share information with fraud prevention partners to detect and prevent fraudulent transactions or activities on our platform. This could include sharing IP addresses, device information, or transaction details with specialized fraud detection services.
- Prevent identity theft: To protect you and ourselves from identity theft, we might share PII with services that help us verify the authenticity of information and prevent unauthorized use of personal data.
- Example: When you open a new account, we might use a third-party identity verification service to confirm that you are who you claim to be. This process may involve sharing your name, address, and date of birth with the verification service. Similarly, if we detect a suspicious transaction, we might share transaction details with a fraud prevention partner to assess the risk.
-
Enforcing Our Agreements and Property Rights: We may need to share PII to protect our legal rights and enforce our agreements:
- Enforcing our Terms of Service: If you violate our Terms of Service, we may need to share PII with legal counsel or law enforcement to enforce our terms and address the violation.
- Protecting our property rights: To protect our intellectual property or other company assets, we may need to share PII in legal proceedings or investigations related to intellectual property infringement or theft.
- Enforcing other agreements: If we have other agreements in place with you (e.g., specific contracts), we may share PII to enforce those agreements if necessary.
- Example: If a user is found to be engaging in copyright infringement on our platform, we might share their contact information with copyright holders or legal authorities to enforce our intellectual property rights and address the infringement.
-
Assisting Us in Providing You with Our Services: To effectively provide you with our services, we often rely on third-party service providers. In these cases, we may need to share PII with these providers to enable them to perform their functions on our behalf. This includes:
-
Fulfilling Purchases - Shipping Information: When you make a purchase on our Website, App, or Service, we must share certain PII to fulfill your order. Specifically:
- Shipping Address: We share your submitted shipping address with the entities responsible for delivering your order.
- Phone Number: We share your phone number (if provided) for shipping purposes, so the shipping provider can contact you if needed regarding delivery.
- Recipients: This shipping information is shared with entities directly involved in fulfilling and shipping your order. This typically includes:
- The Merchant: If you are purchasing from a third-party merchant through our platform, we will share the shipping information with that merchant so they can prepare and ship your order.
- The Shipping Provider: We share the shipping address and phone number with the shipping company (e.g., postal service, courier service) that will physically deliver your order to you.
- Purpose is Shipping Purposes Only: It's important to note that this shipping information is shared solely for the purpose of fulfilling your order and ensuring delivery. These entities are instructed to use this information only for shipping-related activities.
-
Sharing PII with Other Service Providers: Beyond shipping, we also share PII with other types of third-party service providers who assist us in various aspects of operating our business and providing our services. Examples include:
- Web Hosting Companies: Companies that host our Website, App, and Service infrastructure. They may have access to PII stored on their servers as part of providing hosting services.
- Payment Processors: Companies that securely process your payments when you make purchases. They handle your financial information to facilitate transactions.
- Fraud Prevention Partners: Companies that provide fraud detection and prevention services, as mentioned earlier.
- Marketing Partners: Companies that assist us with marketing activities, such as email marketing, advertising, or analytics related to marketing campaigns (but not for direct marketing by these partners, as explained below).
- Customer Support Systems Providers: Companies that provide software or services to manage our customer support operations. These systems may store PII you provide when contacting customer support.
-
Important Limitation: We Do Not Share PII for Third-Party Direct Marketing:
-
Our Commitment: We have a firm policy: We do not share your PII with third parties for the purpose of direct marketing by those third parties.
-
What this means: This means we will not sell, rent, or intentionally provide your PII to external companies so that they can directly market their own products or services to you. We respect your privacy and do not want your PII to be used for unsolicited marketing by other companies.
-
Our Marketing is Different: Please note that we may still engage in marketing activities, and we may use marketing partners to assist us with our own marketing efforts. However, this is different from sharing your PII with third parties for their direct marketing purposes.
In Summary: Zigass may share your PII in limited and specific circumstances, primarily for legal compliance, fraud prevention, enforcement of our rights, and to enable us to provide you with our services effectively. We are committed to protecting your privacy and do not share PII for third-party direct marketing. We choose our partners carefully and strive to ensure they also handle your information responsibly. When we share PII, we aim to do so securely and only to the extent necessary for the specified purpose.
# 6. Anonymous & Aggregate Information
Understanding Anonymous and Aggregate Data: Protecting Your Privacy While Using Data for Improvement:
This section explains how Zigass handles information in a way that protects your individual privacy. Specifically, we will discuss "anonymous information" and "aggregate information," what these terms mean, how we create them, and why we use them. These types of data are crucial for improving our services and understanding user trends, all while safeguarding your personal identity.
Anonymous Information: Data That Cannot Identify You Personally:
-
What is Anonymous Information? Anonymous information is data that does not directly or indirectly identify you as an individual. When information is truly anonymous, it is no longer linked to your personal identity and cannot be used to trace back to you.
-
How We Collect Anonymous Information: We collect some information in a way that is inherently anonymous from the outset. This might include:
- Certain types of Device Information: Some device data, especially when generalized or not linked to your account, can be considered anonymous. For example, knowing that "10% of our users use Android version X" is anonymous if it's not tied to specific users' identities.
- Aggregated Usage Statistics: Counting the total number of website visits or app downloads across all users, without identifying who those users are individually, results in anonymous data.
-
How We Anonymize Personal Information: In addition to collecting some inherently anonymous data, we also take steps to anonymize personal information that we initially collect in a way that could identify you (PII). This process, called anonymization or de-identification, involves removing or altering personally identifiable elements from the data so that it can no longer be linked back to a specific person. Methods for anonymization can include:
- Removing Direct Identifiers: Deleting data points that directly identify you, such as your name, email address, phone number, and precise address.
- Generalization/Aggregation: Combining data into broader categories or groups. For example, instead of storing individual ages, we might group users into age ranges (e.g., 18-24, 25-34). Similarly, precise location data might be generalized to a city or region level.
- Pseudonymization: Replacing direct identifiers with pseudonyms (like random codes or numbers). While pseudonymized data is not fully anonymous (as the pseudonym could potentially be linked back to the original identity under certain conditions, although Zigass would not retain this link in anonymized datasets), it significantly reduces identifiability compared to directly identifiable PII. True anonymization goes a step further to eliminate any reasonable possibility of re-identification.
Aggregate Information: Combining Anonymous Data into Groups for Analysis:
-
What is Aggregate Data? Aggregate data is formed by combining anonymous data that meets certain criteria into groups or summaries. It represents data about groups of users or data points, not individual users.
-
How We Obtain Aggregate Data: We obtain aggregate data by:
- Grouping Anonymous Data: We take sets of anonymous data points and group them together based on shared characteristics. For example, we might group anonymous data from all users in a particular country, or all users who accessed a specific feature of our App.
- Calculating Summary Statistics: Once we have these groups of anonymous data, we calculate summary statistics, such as averages, totals, percentages, and trends, for each group. For instance, we might calculate the "average time spent on our website by users in Country X" or "the percentage of users who clicked on Feature Y."
-
Example of Aggregation: Imagine we have anonymous data about website usage, including pages visited and time spent on each page, but without any user IDs. To create aggregate data, we could:
- Group by Page: Group all anonymous data points related to visits to a specific webpage (e.g., the homepage).
- Calculate Statistics: Then, we calculate aggregate statistics for that webpage group, such as:
- "Total number of visits to the homepage in the last month."
- "Average time spent per visit on the homepage."
- "Bounce rate (percentage of users who leave the homepage without visiting other pages)."
This aggregate data tells us about overall website performance and user behavior on the homepage, but it does not reveal any information about individual users' browsing activity.
How We May Share Aggregate or Anonymous Information and With Whom:
-
Sharing with Trusted Non-Zigass Entities: Zigass may share aggregate or anonymous information with trusted entities that are not part of Zigass (i.e., external organizations).
-
Various Formats for Sharing: We may share this information in various formats, such as:
- Reports: Summarized reports containing aggregate statistics and analyses.
- Data Sets: Providing anonymized and aggregated datasets (while ensuring individual identifiability is not possible).
- Visualizations: Charts, graphs, and other visual representations of aggregate data.
-
No Restrictions on Sharing: We share aggregate or anonymous information without restriction. This means we have more freedom to share this type of data compared to PII, because it does not pose a risk to individual privacy. Since anonymous and aggregate data cannot identify you, privacy regulations typically place fewer restrictions on its use and sharing.
-
Working with Entities for Research, Products, and Services: We may work with these trusted non-Zigass entities to:
- Do Research: Share aggregate or anonymous data for research purposes, such as academic studies, market research, or industry trend analysis. This research can help advance knowledge and understanding in relevant fields.
- Provide Products and Services: Collaborate with external entities to develop new products and services or improve existing ones. For example, aggregate data might be used to understand market trends and inform the development of new features or offerings by Zigass or our partners.
-
Examples of Trusted Non-Zigass Entities: These could include:
- Analytics Partners: Companies that help us analyze website and app data.
- Research Institutions: Universities or research organizations conducting studies relevant to our industry or user base.
- Business Partners: Companies we collaborate with on joint ventures or product development initiatives.
- Industry Associations: Organizations that collect and analyze industry-wide data.
Why We Use and Share Anonymous & Aggregate Information:
The use of anonymous and aggregate information is beneficial for several reasons:
- Privacy Protection: It allows us to analyze user trends and improve our services without compromising the privacy of individual users. Because the data is anonymized and aggregated, it cannot be traced back to any specific person.
- Service Improvement: Analyzing aggregate data helps us understand how our services are being used in general, identify areas for improvement, optimize performance, and develop new features that benefit our user base as a whole.
- Business Insights: Aggregate data provides valuable insights into market trends, user behavior patterns, and the effectiveness of our marketing efforts. This information is essential for making informed business decisions and improving our overall strategy.
- Research and Innovation: Sharing anonymized and aggregated data with researchers and partners can contribute to broader knowledge and innovation in our industry and beyond.
In Summary: Zigass is committed to using data responsibly and ethically. We utilize anonymous and aggregate information extensively because it provides valuable insights for service improvement and business development while rigorously protecting individual privacy. We share this type of data freely with trusted partners to further these goals, knowing that it cannot be used to identify or harm individual users. This practice allows us to leverage the power of data for positive purposes while upholding our commitment to user privacy.
# 7. Safeguarding Your Information: Our Policy on Data Protection and Security
How Zigass Protects Your Information: Our Commitment to Security and Responsible Data Handling:
This section is dedicated to explaining the measures Zigass takes to protect your information. We understand that security is a paramount concern when entrusting your data to any organization. This section outlines our policies and practices related to data protection and security to reassure you that we are committed to safeguarding your Personally Identifiable Information (PII).
Our Core Principle: We Do Not Sell Your PII - Your Data is Not a Commodity:
-
Unequivocal Commitment: Zigass has a firm and unwavering commitment: We do not sell your PII to anyone, for any purpose whatsoever.
-
Your Data is Not for Sale: We want to be absolutely clear on this point. Your personal information is not treated as a commodity to be bought and sold for profit. Our business model is based on providing you with valuable services, not on monetizing your personal data through sales to third parties.
-
No Third-Party Marketing Sales: This principle directly reinforces our statement in Section 5. We will not sell or rent your PII to marketing companies, advertisers, data brokers, or any other entities for their independent use.
-
Trust and Transparency: This "no selling" policy is fundamental to building and maintaining your trust. We believe in being transparent about our data practices, and this commitment is a cornerstone of our approach to privacy.
Data Retention Policy: How Long We Keep Your Information and Why:
-
Retention Period - While You Are a User: We actively maintain information about you in our business records while you are an active user of our Website, App, or Service. This is necessary to provide you with ongoing access to our services, manage your account, and personalize your experience.
-
Retention After You Cease Being a User - Until No Longer Needed: Even after you cease to be an active user (e.g., if you close your account or stop using our services), we may still retain some of your information for a limited period. We retain data only until it is no longer needed for legitimate business, tax, or legal purposes.
-
Legitimate Reasons for Data Retention After Account Closure: There are several valid reasons why we might need to retain some information even after you stop actively using our services:
-
Business Purposes:
- Record Keeping: Maintaining records of transactions, service usage history, and communications can be important for internal business operations, analysis, and improvement of services.
- Customer Service History: Retaining some information allows us to provide better customer support if you contact us in the future, even after a period of inactivity.
- Service Improvement Analysis (Aggregated & Anonymized): While PII is protected, anonymized and aggregated data derived from past user data (including data from former users) can be valuable for improving our services and understanding long-term trends.
-
Tax Purposes: Tax laws in many jurisdictions require businesses to keep financial records and transaction history for a specific period (e.g., several years) for auditing and compliance purposes. This may include PII associated with financial transactions.
-
Legal Purposes: There may be legal obligations to retain certain types of information for specified periods, such as:
- Compliance with legal requirements: Laws and regulations in some countries may mandate data retention for specific types of data (e.g., data related to legal obligations, fraud prevention, or law enforcement investigations).
- Responding to legal requests: In the event of a valid legal request (e.g., subpoena, court order) for data, we need to be able to access and provide information that is still retained within the legally required retention period.
- Defending legal claims: In case of potential legal disputes or claims, retaining relevant data for a period of time may be necessary to establish facts and defend our legal position.
-
-
Data Minimization - Retention Only as Long as Necessary: While we retain data for legitimate reasons, we are also committed to data minimization. This means we strive to retain data only for as long as is truly necessary to fulfill the purposes outlined above. Once data is no longer needed for these legitimate reasons, we will securely dispose of it according to our data disposal policies (which will be detailed in further sections of the full privacy policy document). We do not keep data indefinitely.
Security Measures: Encryption and Other Controls to Protect Your PII:
-
Commitment to Security: Protecting your PII from unauthorized access, use, or disclosure is a top priority for Zigass. We implement a range of security measures designed to safeguard your data.
-
Encryption: We have implemented encryption as a crucial security control to protect PII, both:
- When Stored (Data at Rest): Encryption is used to protect PII while it is stored in our databases and systems. Encryption transforms data into an unreadable format (ciphertext) so that even if unauthorized access occurs, the data remains unintelligible without the correct decryption key.
- When Transmitted (Data in Transit): Encryption is also used to protect PII when it is being transmitted over the internet or between our systems. Secure communication protocols (like HTTPS/TLS) are used to encrypt data while it is in transit, preventing eavesdropping or interception.
-
Other Appropriate Security Controls: In addition to encryption, we implement a range of other security controls, which may include:
- Access Controls: Restricting access to PII to only authorized personnel who need it for legitimate business purposes. This includes measures like strong passwords, multi-factor authentication, and role-based access permissions.
- Physical Security: Protecting the physical infrastructure where data is stored (e.g., secure data centers, controlled access).
- Network Security: Using firewalls, intrusion detection systems, and other network security measures to protect our systems from unauthorized access and cyber threats.
- Regular Security Assessments: Conducting regular security audits and vulnerability assessments to identify and address potential security weaknesses in our systems and practices.
- Employee Training: Training our employees on data security best practices and privacy policies to ensure they understand their responsibilities in protecting user data.
- Data Minimization (again, as a security principle): As mentioned earlier, retaining data only as long as necessary is also a security measure. Minimizing the amount of data we hold reduces the potential attack surface and risk of data breaches.
-
Continuous Improvement: Security is an ongoing process, not a one-time fix. We continuously monitor the evolving threat landscape, update our security measures, and strive to improve our data protection practices to stay ahead of emerging risks.
Data Protection by Third-Party Companies Acting on Our Behalf:
-
Requirement for Non-Zigass Companies: As explained in Section 5, we sometimes use non-Zigass companies (third-party service providers) to perform certain functions on our behalf (e.g., web hosting, payment processing, marketing support). When we do this, we require these non-Zigass companies acting on our behalf to protect any PII they may receive.
-
Contractual Obligations: We ensure this data protection through contractual agreements. Our contracts with these third-party service providers include clauses that legally obligate them to:
- Protect PII Consistently with this Privacy Policy: They must adhere to data protection standards that are consistent with the principles and practices outlined in our own Privacy Policy. We don't simply require generic security; we require them to meet standards that align with our commitment to privacy.
- Implement Appropriate Security Measures: They must implement and maintain reasonable and appropriate security measures to protect PII from unauthorized access, use, or disclosure.
-
Restriction on Usage - No Other Purposes Allowed: Furthermore, we do not allow these non-Zigass companies to use such information for any other purpose than the specific services they are contracted to provide to Zigass.
-
Limited Scope of Access and Use: Third-party service providers are granted access to PII only to the extent strictly necessary for them to perform their designated tasks for us. They are not authorized to use PII for their own purposes, such as marketing, data aggregation for their own benefit, or any other activity not directly related to the services they are providing to Zigass.
-
Accountability and Oversight: We maintain oversight and accountability for how our third-party service providers handle PII. We may conduct audits or assessments to ensure they are meeting their contractual obligations and adhering to our data protection standards.
In Summary: Zigass is deeply committed to safeguarding your information. We prioritize data security throughout the data lifecycle, from collection and storage to transmission and processing by third parties. Our commitment to not selling your PII, our data retention policies, our implementation of strong security measures like encryption, and our requirements for third-party data protection all demonstrate our dedication to maintaining the confidentiality, integrity, and availability of your personal information. We continually strive to enhance our security posture and adapt to evolving threats to ensure your data remains protected.
# 8. Links to/from Other Web Sites
Understanding Links to External Websites: Your Privacy Journey Beyond Zigass's Control:
This section addresses the important topic of links that may be present on Zigass's Website, App, or Service, which could lead you to external websites that are not operated by Zigass. It's crucial to understand that once you click on a link that takes you away from our platform, our Privacy Policy no longer applies. This section clarifies Zigass's responsibility (and lack thereof) regarding these external websites and emphasizes the importance of reviewing their privacy policies.
Zigass's Limited Responsibility for Linked Websites:
-
Not Responsible for External Website Practices: Zigass explicitly states that we are not responsible for the practices employed by websites linked to or from our website. This means we do not control and are not accountable for:
- Privacy Practices: How these external websites collect, use, protect, and disclose your personal information. Their privacy policies and data handling procedures may be different from ours.
- Terms of Use: The rules and conditions that govern your use of those external websites.
- Content: The information, text, images, videos, and other materials presented on those external websites.
- Functionality and Operation: How those external websites work, their features, and their overall reliability.
-
No Endorsement Implied by Links: The presence of links to external websites on Zigass's platform does not imply that Zigass endorses, recommends, or is affiliated with those websites, their operators, or their content, unless explicitly stated otherwise. Links are often provided for convenience, informational purposes, or to offer additional resources.
Leaving Zigass's Domain: When Our Privacy Policy No Longer Applies:
-
Privacy Policy Boundary: Please remember that when you use a link to go from our website to another website, our Privacy Policy is no longer in effect. This is a critical point. Our Privacy Policy is specifically designed to govern your interactions with Zigass's Website, App, and Service. It does not extend to websites operated by other parties.
-
Transition to External Rules: As soon as you click a link that directs you to an external website, you are essentially leaving Zigass's "digital space" and entering a new online environment governed by different rules.
-
Analogy: Crossing a Border: Think of it like crossing a border between countries. When you are within Zigass's Website, App, or Service, you are under the jurisdiction of our Privacy Policy. However, when you click a link and move to an external website, you are crossing into a different "country" with its own set of laws and regulations – in this case, its own privacy policy and terms of use.
Your Browsing and Interaction on External Websites are Subject to Their Rules:
-
External Websites Have Their Own Rules and Policies: Your browsing and interaction on any other website, including those that have a link on our website, is subject to that website’s own rules and policies. Every website operates under its own set of terms and conditions, including its privacy policy, data security practices, content guidelines, and usage restrictions.
-
Independent Policies: These external websites are independent entities with their own distinct privacy policies and terms of use, which are separate from and independent of Zigass's policies. Zigass has no control over these external policies.
-
Responsibility to Review External Policies: It is your responsibility to understand the rules of any website you choose to visit, especially those you access through links on Zigass's platform. Just as you would want to understand the laws of a country you are visiting, it is essential to understand the privacy policies and terms of use of any website you interact with online, particularly when you are providing personal information or engaging in transactions.
Crucial Advice: Read the Policies Before Proceeding on External Websites:
-
Strong Recommendation: Please read over those rules and policies [of external websites] before proceeding. This is highly recommended best practice for online safety and privacy.
-
Take Proactive Steps to Protect Your Privacy: Before you start browsing and interacting with an external website, especially before you provide any personal information, take a moment to:
- Locate and Read the Privacy Policy: Most reputable websites will have a link to their Privacy Policy, often found in the website's footer (at the bottom of the page) or in a "Privacy" or "Legal" section. Click on this link and carefully read the policy to understand how that website collects, uses, and protects your data.
- Locate and Read the Terms of Use (or Terms of Service): Also, look for and review the website's Terms of Use (sometimes called Terms of Service or User Agreement). These terms outline the rules and conditions you must agree to in order to use the website.
- Check for Security Indicators: Look for visual cues that suggest the website is secure, such as "HTTPS" in the website address (indicating encrypted communication) and a padlock icon in your browser's address bar.
- Be Cautious About Providing Personal Information: Exercise caution when providing personal information (name, email, address, financial details, etc.) to any website, especially one you are visiting for the first time via a link from another site. Make sure you understand why they are asking for the information and how they will use it, as explained in their privacy policy.
- If Unsure, Err on the Side of Caution: If you are unsure about the website's legitimacy, privacy practices, or terms of use, it is always best to err on the side of caution and avoid providing sensitive information or engaging in transactions on that website. You can always research the website further or choose not to use it if you have concerns.
In Summary: Zigass provides links to external websites for your convenience, but our responsibility ends when you leave our platform. Once you click on a link that takes you to another website, you are governed by their rules, not ours. Protecting your privacy online requires you to be proactive and informed. Therefore, it is essential to always read the privacy policies and terms of use of any website you visit, especially when navigating to external websites through links from Zigass or any other platform. By doing so, you can make informed decisions about your online activity and better protect your personal information in the broader online environment.
# 9. Data Security and Data Breach
Our Commitment to Data Security, Acknowledging the Realities of the Digital World, and Our Breach Response Plan:
This section is dedicated to explaining Zigass's approach to data security and what happens in the unfortunate event of a data breach. We want to be transparent about the measures we take to protect your information, while also acknowledging the inherent risks of storing and transmitting data online. This section outlines both our efforts and our plan to respond responsibly should a security incident occur.
Security Measures Implemented by Zigass - Protecting Your Information from Threats:
-
Measures to Secure PII: Zigass has implemented a range of measures designed to secure your PII (Personally Identifiable Information) from various risks. These measures are designed to protect against:
- Accidental Loss: Unintentional loss of data due to errors, accidents, or system failures.
- Unauthorized Access: Access to your PII by individuals who are not authorized to view it (e.g., hackers, unauthorized employees).
- Unauthorized Use: Use of your PII for purposes that are not legitimate or not in accordance with this Privacy Policy.
- Alteration: Unauthorized modification or changes to your PII.
- Disclosure: Unauthorized sharing or release of your PII to individuals or entities who should not have access to it.
-
Types of Security Measures: Our security measures are comprehensive and encompass different aspects of data protection:
-
Technical Safeguards: These are technology-based security measures implemented within our systems and infrastructure. Examples include:
- Encryption: As discussed in Section 7, we use encryption to protect PII both when it is stored (at rest) and when it is transmitted (in transit).
- Firewalls: Security systems that act as barriers to control network traffic and prevent unauthorized access to our systems.
- Intrusion Detection Systems: Systems that monitor our network for suspicious activity and potential security breaches, alerting us to possible threats.
- Regular Security Updates and Patching: Keeping our software and systems up-to-date with the latest security patches to address known vulnerabilities.
- Secure Software Development Practices: Following secure coding practices to minimize vulnerabilities in our applications.
-
Administrative Safeguards: These are policies, procedures, and guidelines that govern how we handle data and manage security risks. Examples include:
- Data Access Policies: Clearly defined rules about who has access to what types of data and under what circumstances.
- Employee Training on Data Security and Privacy: Ensuring our employees are trained on security best practices and privacy policies to minimize human error and promote a security-conscious culture.
- Incident Response Plan: Having a documented plan in place to respond effectively to security incidents and data breaches (explained further below).
- Vendor Security Assessments: Assessing the security practices of our third-party service providers to ensure they also maintain adequate data protection standards.
-
Managerial Safeguards: These are organizational and management practices that support our security efforts. Examples include:
- Security Risk Assessments: Regularly assessing and evaluating potential security risks to our systems and data.
- Security Audits: Periodic independent audits of our security controls and practices to verify their effectiveness.
- Data Governance Framework: Establishing clear roles, responsibilities, and accountability for data security and privacy within the organization.
- Continuous Security Improvement: A commitment to continuously review and improve our security measures based on evolving threats and best practices.
-
Acknowledging the Inherent Risks of Online Security - No Absolute Guarantee:
-
Limitations of Security Measures: Despite our efforts to ensure security on our networks, we cannot guarantee that PII may not be accessed, disclosed, altered, or destroyed by breach of our administrative, managerial, and technical safeguards. This is a crucial and realistic statement.
-
The Reality of Cyber Threats: The digital landscape is constantly evolving, and cyber threats are becoming increasingly sophisticated. No security system is completely impenetrable. Skilled attackers may, in rare instances, find ways to bypass even well-designed security measures.
-
Acknowledging Human Factor: Security measures can also be undermined by human error, both on our side and on the user's side.
-
Prudent and Realistic Approach: While we are committed to using robust security measures, it is important to be realistic and acknowledge that absolute security in the online world is not attainable. Our goal is to minimize risks to the greatest extent possible using industry best practices and continuous vigilance.
Your Role in Data Security: Shared Responsibility:
-
Your Security is Also Dependent on You: The safety and security of your information also depends on you. Data security is a shared responsibility between Zigass and our users. We provide security measures on our end, but you also have a vital role to play in protecting your own information.
-
Password Confidentiality - Your Key Responsibility: Where we have given you (or where you have chosen) a password for access to certain parts of our Website, App or Service, you are responsible for keeping this password confidential. Passwords are a primary means of controlling access to your accounts and personal information online.
-
Urging You to Take Adequate Precautions: Therefore, we urge you to take adequate precautions to protect PII as well, including never sharing any login or account information with anyone. Best practices for password security include:
- Choosing Strong Passwords: Use passwords that are complex, unique, and difficult to guess. Combine uppercase and lowercase letters, numbers, and symbols.
- Keeping Passwords Confidential: Never share your passwords with anyone, including friends, family, or colleagues. Do not write passwords down in easily accessible places.
- Avoiding Password Reuse: Do not use the same password for multiple online accounts. If one account is compromised, all accounts with the same password become vulnerable.
- Changing Passwords Regularly: Consider changing your passwords periodically, especially for sensitive accounts.
- Being Cautious of Phishing Attempts: Be wary of suspicious emails or messages asking for your login credentials. Always verify the legitimacy of a website before entering your password.
- Using Password Managers (Optional): Password manager tools can help you generate, store, and manage strong, unique passwords securely.
Internet Transmission Risks - Acknowledging the Unsecured Nature of the Internet:
-
Internet Transmission is Not Completely Secure: Unfortunately, the transmission of information via the internet is not completely secure. The internet is a public network, and data transmitted over it can potentially be intercepted or accessed by unauthorized parties, even when websites use security measures like encryption.
-
Best Efforts but No Guarantee of Security During Transmission: Although we do our best to protect PII, we cannot guarantee the security of PII transmitted to our Website, App or Service. We use encryption to protect data in transit, but we cannot control every aspect of the internet's infrastructure.
-
Transmission at Your Own Risk: Any transmission of personal information is at your own risk. By choosing to transmit information to us online, you acknowledge and accept this inherent risk.
-
No Responsibility for Circumvention of Security Measures: We are not responsible for circumvention of any privacy settings or security measures contained on the Website, App or Service. While we implement security features and privacy settings, we cannot be held liable if malicious actors are able to bypass these measures through sophisticated attacks or exploits that are beyond our reasonable control. This is a standard legal disclaimer acknowledging the limitations of even the best security systems in the face of determined and sophisticated attacks.
Data Breach Response Plan - What Happens If Security is Breached:
-
Data Breach Occurrences - Acknowledge Possibility: Despite our best efforts, data breaches can unfortunately occur. In the event of a security incident that compromises PII, Zigass has a plan to respond responsibly and in accordance with applicable laws.
-
Notification to You and Relevant Authorities: Should a data breach occur, we will notify you and the relevant authorities as required by applicable law. Our data breach response plan includes:
- Prompt Investigation: Upon discovering a potential data breach, we will initiate a prompt investigation to determine the nature and scope of the incident, identify affected data, and assess the potential impact on users.
- Security Measures to Contain Breach: We will take immediate steps to contain the breach and prevent further unauthorized access or data loss. This may involve isolating affected systems, patching vulnerabilities, and strengthening security controls.
- Notification to Affected Users (as required by law): We will notify users whose PII may have been affected by the breach, as required by applicable data protection laws. The notification will typically include:
- Nature of the Breach: A description of what happened and the type of data that may have been compromised.
- Steps We Are Taking: Information about the actions we are taking to address the breach and mitigate its impact.
- Steps You Should Take: Recommendations for steps you should take to protect yourself (e.g., changing passwords, monitoring accounts, reporting identity theft).
- Contact Information: Details on how to contact us if you have questions or concerns.
- Notification to Data Protection Authorities (as required by law): We will also notify the relevant data protection authorities or regulatory bodies as required by applicable privacy laws, such as GDPR (in Europe) or other relevant legislation.
-
Receiving Written Notice of Data Breach and Withdrawing Consent:
-
Option for Written Notice: You have the option to receive written notice of a data breach. Typically, breach notifications may be provided electronically (e.g., via email or website announcement), but you can request to receive written notice instead.
-
Withdrawing Consent for Written Notice: Conversely, if you initially requested written notice but later prefer to receive electronic notifications (or no written notice), you can withdraw your consent from receiving such written notice.
-
Contacting Support Center: To indicate your preference for written breach notices, or to withdraw your consent for them, please contact us at Support Center
-
In Summary: Data security is a continuous and evolving priority for Zigass. We implement a multi-layered approach using technical, administrative, and managerial safeguards to protect your PII. While we strive to maintain a high level of security, we acknowledge that no system is completely immune to threats, and internet data transmission carries inherent risks. We are committed to responsible data handling, transparency about our security practices, and a clear plan to respond effectively and notify you in the unlikely event of a data breach. Data security is a shared responsibility, and we encourage you to play your part in protecting your information by following password best practices and staying informed about online safety.
# 10. How to Delete Your Data
Understanding Your Right to Data Deletion and How to Exercise It with Zigass:
This section explains your right to have your personal data deleted from Zigass's systems. We believe in giving you control over your data, and this section provides clear instructions on how to request the deletion of your information, while also outlining important exceptions and consequences you should be aware of.
Your Right to Data Deletion - "The Right to be Forgotten":
-
General Right to Delete Your Data: You have the right to request the deletion of your personal data held by Zigass. This right is often referred to as the "right to be forgotten" or "right to erasure" under data protection regulations like GDPR (General Data Protection Regulation).
-
Exceptions to Data Deletion - When We May Need to Retain Your Data: While your right to deletion is important, it's not absolute. There are specific situations where we may be legally obligated or have legitimate grounds to retain and process your data even after you request deletion. These exceptions are clearly defined and limited to specific circumstances:
-
Processing Necessary for Exercising Freedom of Expression and Information: If deleting your data would infringe on our right (or the rights of others) to freedom of expression or freedom of information, we may need to retain certain data. This exception is typically narrowly interpreted and applies to situations where data is essential for journalistic, academic, artistic, or literary expression. It is unlikely to apply in most typical user data deletion requests in the context of Zigass's services.
-
Compliance with a Legal Obligation Under International or National Law: We may be required to retain your data to comply with laws and regulations, both at the international and national level. Examples of legal obligations that could necessitate data retention include:
- Tax Laws: Regulations requiring us to keep financial records and transaction history for a certain period for tax auditing purposes.
- Anti-Money Laundering (AML) and Know Your Customer (KYC) Laws: Regulations in the financial sector that may require us to retain certain customer data for compliance and security purposes.
- Legal Orders and Law Enforcement Requests: As discussed in Section 5, we are legally obligated to comply with valid court orders and legal processes, which may require us to preserve data even if a deletion request has been made.
- Other Applicable Laws: Various other laws and regulations in different jurisdictions may impose data retention requirements on businesses.
-
Processing Necessary for Performance of a Task Carried Out in the Public Interest: In very limited circumstances, data processing (and therefore retention) might be necessary for tasks carried out in the public interest. This exception is generally narrowly defined and is more applicable to public authorities or organizations performing specific public functions. It is unlikely to be a frequent reason for Zigass to refuse a data deletion request in typical user scenarios.
-
Processing Necessary for Establishment, Exercise, or Defense of Legal Claims: If we need to retain your data to establish, exercise, or defend legal claims in court or other legal proceedings, we may be justified in not immediately deleting it. This could apply in situations where:
- Pending Legal Disputes: We are involved in an active legal dispute with you or a third party, and the data is relevant to that dispute.
- Potential Legal Claims: We reasonably believe that we may need the data to defend against potential future legal claims.
- Enforcing Agreements: Data may be needed to enforce our Terms of Service or other agreements and protect our legal rights.
-
How to Delete Your Data via the Zigass Application (App):
If you wish to delete your data using the Zigass Mobile Application, please follow these step-by-step instructions, specifically for Apple devices (iOS - iPhone, iPad):
- Open the Zigass App: Launch the Zigass App on your Apple iPhone or iPad device.
- Open Your Profile Tab: Navigate to your profile section within the App. This is usually indicated by a profile icon or your profile picture, typically located in the bottom navigation bar or top menu.
- For Apple Devices: Open "Settings": Within your profile section, look for and tap on a "Settings" option. On Apple devices, settings are often represented by a gear icon or labelled as "Settings."
- Click "Conditions and Confidentiality" / "Privacy and Terms": In the Settings menu, find and tap on an option related to privacy and terms. Depending on the exact version of the app, this option might be labelled as:
- "Conditions and Confidentiality"
- "Privacy and Terms"
- "Privacy Policy and Terms of Service"
- Or similar wording indicating privacy and legal information.
- Click "Personal Information": Within the "Conditions and Confidentiality" or "Privacy and Terms" section, look for and tap on an option related to "Personal Information" or "My Data."
- Select "Delete Data": On the "Personal Information" screen, you should find a clear option to "Delete Data" or "Delete My Account and Data." Tap on this option.
- Confirmation and Final Steps (Likely within the App - Not Explicitly Mentioned): The App will likely guide you through a confirmation process to ensure you really want to delete your data. This might involve:
- Confirmation Prompts: Pop-up messages asking you to confirm your decision to delete data.
- Password Re-entry: You may be asked to re-enter your password to verify your identity and ensure it's really you making the deletion request.
- Final Confirmation Button: A final button to click to initiate the data deletion process.
How to Delete Your Data via the Zigass Website:
If you prefer to delete your data through the Zigass Website, please follow these instructions:
- Visit our Privacy Policy Page: Open your web browser and go to the following web address:
. This will take you directly to the full Zigass Privacy Policy document on our Website.https://www.zigass.com/privacy-policy - Scroll to the Bottom of the Privacy Policy: Once you are on the Privacy Policy page, scroll down to the very bottom of the document.
- Submit the Request to Delete Your Data: At the bottom of the Privacy Policy page, you should find instructions or a method to submit your data deletion request. This might be in the form of:
- A Contact Form: A form you can fill out with your data deletion request details and submit directly through the website.
- An Email Address: Instructions to send an email to a specific email address (e.g., [email address removed] or privacy@zigass.com) with your data deletion request. The instructions in the privacy policy should specify the email address and any required information to include in your request email.
- A Link to a Data Request Portal: A link that takes you to a dedicated portal or page where you can manage your data and submit a deletion request.
Important Consequences of Data Deletion - Please Read Carefully Before Proceeding:
-
Account Deletion: Please remember that following the removal of your personal data, your account will also be deleted. Deleting your data is typically tied to deleting your user account entirely.
-
Loss of Order Information: You will lose all information about your orders. All records of your past purchases, order history, shipping details, and invoices associated with your account will be permanently deleted.
-
Inability to Track Orders: You will not be able to track them [orders] after data deletion. Once your order information is deleted, you will no longer be able to access any tracking details or updates for past or pending orders.
-
Inability to Ask for a Refund if Necessary: and ask for a refund if necessary. Critically, if you delete your data and account before resolving any issues with past orders or seeking refunds, you will likely lose the ability to request refunds or resolve order-related problems. We will no longer have the necessary order information linked to your deleted account to process refund requests or investigate order issues.
-
Consider Downloading Important Information Before Deletion: Therefore, it is strongly recommended that you download or save any important information (e.g., order confirmations, invoices, contact details, any other data you may need in the future) ** before submitting your data deletion request.** Once your data is deleted, it is typically irreversible, and we may not be able to recover it for you.
In Summary: You have the right to delete your personal data held by Zigass, and we provide clear methods for you to do so through both our App and Website, as detailed above. However, please carefully consider the exceptions to data deletion (legal obligations, etc.) and, most importantly, the significant consequences of data deletion, particularly the irreversible loss of your account and order history, and the potential inability to obtain refunds or resolve order issues after deletion. We encourage you to download any important information before proceeding with data deletion and to contact our Support Center if you have any questions or need assistance with this process. We aim to empower you with control over your data while ensuring you are fully informed about the implications of your choices.
# 11. Changes to Our Privacy Policy
Staying Informed About Updates to Our Privacy Practices: How Zigass Will Notify You of Changes:
This section explains how Zigass will inform you about any modifications or updates to our Privacy Policy. Privacy practices and regulations can evolve over time, and it's important for you to be aware of any changes to how we handle your information. This section clarifies our commitment to keeping you informed about updates to our Privacy Policy and how we will communicate these changes to you.
How We Will Communicate Changes to Our Privacy Policy:
-
Posting Changes on Our Platforms: If we change our privacy policies and procedures, we will post those changes on our Website, App or Service. This is our primary method of communicating updates to the Privacy Policy. We will make the revised Privacy Policy readily accessible and prominently displayed on these platforms to ensure you can easily find and review it.
-
Platforms for Posting Changes: We will post the updated Privacy Policy in the following locations:
- Our Website: The updated Privacy Policy will be published on our official website, typically on a dedicated "Privacy Policy" page (e.g.,
). We will ensure this page is easily navigable from the website's main navigation or footer.https://www.zigass.com/privacy-policy - Our App (Zigass App): Within our mobile application, we will also make the updated Privacy Policy available. You can usually find it within the App's settings or a "Legal" or "About" section. The exact location might vary slightly depending on the App's design, but it will be accessible within the application itself.
- Our Service (if applicable and through in-service notifications): In some cases, depending on the nature of the service and the changes, we might also provide notifications directly within the Service itself, alerting you to updates in the Privacy Policy. This might be in the form of in-app messages, banners, or pop-up notifications.
- Our Website: The updated Privacy Policy will be published on our official website, typically on a dedicated "Privacy Policy" page (e.g.,
-
Purpose of Posting Changes: The reason for posting these changes on our Website, App, and Service is to keep you aware of key aspects related to your privacy:
- What Information We Collect (Changes in Data Collection Practices): If there are any changes to the types of information we collect from you, or how we collect it, the updated Privacy Policy will reflect these modifications. For example, if we start collecting a new type of data or adopt a new tracking technology, this will be described in the revised policy.
- How We Use It (Changes in Data Usage): If there are changes to how we use the information we collect, these changes will be detailed in the updated Privacy Policy. For example, if we start using data for a new purpose, or if we change how we personalize content, this will be explained in the revised policy.
- Under What Circumstances We May Disclose It (Changes in Information Sharing): If there are changes to the circumstances under which we may disclose your information to third parties, or the types of third parties we might share data with, these updates will be reflected in the revised Privacy Policy.
Effective Date of Changes - When the New Privacy Policy Becomes Operative:
-
Changes Effective Upon Posting: Changes to this Privacy Policy are effective when they are posted on this page. This means that as soon as the updated Privacy Policy is published on our Website, App, or Service, the new terms and practices described in the revised policy will take effect immediately.
-
No Retroactive Effect (Generally): Typically, changes to the Privacy Policy will apply to data collected after the effective date of the updated policy. They generally do not apply retroactively to data collected under previous versions of the Privacy Policy, unless explicitly stated otherwise in the update (which is uncommon).
-
Importance of Reviewing the "Effective Date": When reviewing an updated Privacy Policy, it's always a good practice to look for the "effective date" or "last updated" date, which is usually displayed at the top or bottom of the document. This date indicates when the current version of the policy became operative.
Your Responsibility to Stay Informed - Periodic Review is Recommended:
-
Proactive Checking for Updates: Because our Privacy Policy may change from time to time, it is important for you to be proactive in staying informed about our current practices. We encourage you to periodically check our Website, App, or Service for updates to the Privacy Policy.
-
Regular Review Habit: Making it a habit to periodically review the Privacy Policy (e.g., every few months, or whenever you notice a notification about policy updates) will help you stay informed about how we are handling your data and ensure you are comfortable with our practices.
-
Continued Use Implies Acceptance of Changes: As mentioned in Section 1, Your continued use of this Website, App or Service after we make changes is deemed to be acceptance of those changes. This means that if you continue to use our services after an updated Privacy Policy is posted, you are implicitly agreeing to the terms of the revised policy, even if you have not explicitly clicked an "I Agree" button. Therefore, it's crucial to review the updated policy to understand what you are agreeing to by continuing to use our services.
In Summary: Zigass is committed to transparency and will keep you informed of any changes to our Privacy Policy by posting updates on our Website, App, and Service. These changes become effective immediately upon posting. It is your responsibility to periodically review the Privacy Policy for updates to stay informed about our data handling practices. By continuing to use our services after changes are posted, you are indicating your acceptance of the updated Privacy Policy. We encourage you to check for updates regularly to ensure you are always aware of our current privacy practices.
# 12. Contact Information
Getting in Touch with Zigass Regarding Privacy: Questions, Comments, Complaints, and Data Management:
This section provides you with all the necessary contact details and options for reaching out to Zigass if you have any questions, comments, complaints, or concerns related to this Privacy Policy or our data privacy practices in general. We encourage you to contact us if you need clarification or assistance. This section also outlines your options for managing your personal data directly.
General Contact Information for Privacy Inquiries:
-
How to Reach Us: If you have questions, comments, or want to register a complaint or concern specifically about this Privacy Policy and our privacy practices, please contact us through the following means:
-
Company Name and Address for Written Correspondence:
Zigass Our Dedicated Support Center or Resolution Center 651 North Broad Street, 201 Middletown, DE 19709 (United States)
- Physical Address for Formal Inquiries: This physical address is provided for formal written correspondence related to privacy matters. If you need to send a letter, legal notice, or official communication regarding your privacy, please use this address.
- Support Center or Resolution Center Designation: The designation "Our Dedicated Support Center or Resolution Center" indicates that correspondence sent to this address will be directed to the appropriate team within Zigass that handles privacy-related inquiries and resolutions.
- Please note: While postal mail is an option, for quicker responses and more efficient communication, we generally recommend using the digital contact methods outlined below when possible.
Self-Service Data Management Options - Direct Control Over Your Data:
In addition to general contact information, we provide you with self-service options to directly manage aspects of your personal data. These options are designed to give you more control and transparency. You can access these options through links provided within this "Contact Information" section, typically on the online version of our Privacy Policy page.
Let's explore each of these self-service options in detail:
-
Manage your personal data: This is a general heading encompassing several data management tools.
-
Download my data:
- Purpose: This option allows you to send a request to get a copy of your data that Zigass holds about you. This is often referred to as a "Data Subject Access Request" or "Right of Access" under privacy regulations.
- Functionality: By clicking on the "Download my data" link or button, you will typically initiate a process to request a digital copy of your personal information in a structured, commonly used, and machine-readable format (e.g., JSON, CSV).
- Process After Request: Once you submit this request, Zigass will:
- Verify your identity to ensure you are the legitimate data subject.
- Compile a copy of your personal data that is subject to access rights (within legal limitations and exceptions).
- Make the data copy available to you, often through a secure download link or other secure method.
- Example Use Case: You might use this option if you want to review all the personal information Zigass has collected about you, understand what data we hold, or if you want to transfer your data to another service provider (data portability).
-
Manage data sharing:
- Purpose: This option allows you to opt-out of having your data shared with specific third-party platforms that we may use for advertising, analytics, or other purposes. The example platforms listed are "Facebook, Adjust and Google or other channels," indicating these are likely advertising or analytics partners.
- Functionality: By clicking on "Manage data sharing," you will typically be taken to a settings page or preference center where you can control your data sharing preferences with these specified third-party platforms.
- Opt-out Mechanisms: The opt-out mechanism may vary depending on the platform and technical feasibility, but it usually involves:
- Disabling specific data sharing: Preventing Zigass from sharing certain categories of your data with the listed platforms going forward.
- Setting advertising preferences: Limiting or opting out of personalized advertising delivered through these platforms.
- Managing analytics tracking: Restricting the collection of your data by analytics tools used by these platforms on Zigass's services.
- Scope of Opt-out: It's important to understand the scope of this opt-out. It generally applies to future data sharing for the specified purposes. It might not retroactively remove data already shared with these platforms (depending on their data retention policies and technical limitations). Also, this opt-out option specifically targets data sharing with the listed advertising and analytics partners. It may not cover all data sharing described in other sections of the Privacy Policy (e.g., data sharing with payment processors for transaction fulfillment, or legal compliance disclosures).
-
Delete account:
- Purpose: This option allows you to send a request to delete your account entirely, along with your associated personal data (subject to exceptions explained in Section 10 - "How to Delete Your Data").
- Functionality: Clicking "Delete account" will initiate the account deletion request process. This typically involves:
- Confirmation Steps: You will likely be asked to confirm your decision to delete your account, as this is a permanent action.
- Account Closure and Data Deletion Process: Once you confirm, your user account will be scheduled for closure, and the process of deleting your personal data will begin, according to our data retention and deletion policies (and subject to the exceptions outlined in Section 10).
- Consequences (Reiterating Section 10 Warnings): As clearly stated in Section 10, deleting your account has significant consequences: you will lose access to your account, all your order information will be deleted, you will be unable to track past orders or request refunds through the deleted account. It is crucial to understand these implications before proceeding with account deletion.
-
Other:
- Purpose: The "Other" option provides a general channel for various privacy-related actions and inquiries that are not covered by the specific "Download data," "Manage data sharing," or "Delete account" options.
- Functionality: Clicking "Other" will typically present you with a way to:
- Withdraw your consent on our use of all or a specific category of your data: If you have previously provided consent for certain data processing activities (where consent is the legal basis), you can use this option to withdraw that consent. This means you can change your mind and opt out of data processing activities that you previously agreed to, where applicable.
- Ask us a question: This is a general contact form or method for submitting any privacy-related question or inquiry that you might have that is not directly addressed by the other self-service options or the general contact address. You can use this to seek clarification on our Privacy Policy, ask about our data practices, raise concerns, or request further information.
- Communication Method: The "Other" option usually leads to a contact form, email submission, or interaction with a support/privacy team that will handle your specific request or question.
-
"Having Trouble?" - Dedicated Support Team Availability:
-
24/7 Support Availability: Having trouble? Our support team is here for you, available 24/7 to assist you in your language. Zigass emphasizes the availability of its support team to help you with any issues you might encounter, including privacy-related questions or difficulties using the data management tools. The 24/7 availability indicates a strong commitment to customer assistance across different time zones and at any time you might need help.
-
Multilingual Support: The phrase "to assist you in your language" suggests that Zigass aims to provide support in multiple languages, catering to a diverse international user base.
-
Reference to Support Policy: Discover all the details about our support services in our Support Policy. For comprehensive information about the scope of support services offered, the channels through which you can contact support, the languages supported, response times, and other details, you are directed to consult our separate "Support Policy" document. This document likely provides more granular information about the support services available beyond privacy-related inquiries, covering technical support, billing support, account assistance, and more.
In Summary: Zigass provides multiple avenues for you to contact us regarding privacy matters and manage your personal data. You can use the provided physical address for formal written correspondence. More conveniently, you can utilize the self-service data management options ("Download my data," "Manage data sharing," "Delete account," and "Other") available through our online Privacy Policy page to directly control aspects of your data. And if you encounter any difficulties or have general questions, our 24/7 multilingual support team is readily available to assist you, with further details outlined in our Support Policy. We aim to make it easy for you to exercise your privacy rights and get the support you need.