Created: March 1, 2011
Updates: June 17 , 2016
1. Information we collect and how we use it
We may collect the following types of information:
Information you provide – When you sign up for a Telepremium Account, we ask you for personal information.
service, including for storing user preferences, improving search results and tracking user trends.
Log information – When you access Telepremium via a browser, application or other client our servers automatically record certain information. These server logs may include information such as your web request, your interaction with a service, Internet Protocol address, browser type, browser language, the date and time of your request and one or more cookies that may uniquely identify your browser or your account.
User communications – When you send email or other communications to Telepremium, we may retain those communications in order to process your inquiries, respond to your requests and improve our services. We may use your email address to communicate with you about our services.
2. Information sharing
Telepremium only shares personal information outside of Telepremium in the following limited circumstances:
We have your consent. We require opt-in consent for the sharing of any sensitive personal information.
We provide such information to our subsidiaries, affiliated companies or other trusted businesses or persons for the purpose of processing personal information on our behalf. We require that these parties agree to process such information based on our instructions and in compliance with this
We have a good faith belief that access, use, preservation or disclosure of such information is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or enforceable governmental request, (b) enforce applicable Terms of Service, including investigation of potential violations thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues, or (d) protect against harm to the rights, property or safety of
Telepremium, its users or the public as required or permitted by law.
3. Information security
We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data.
These include internal reviews of our data collection, storage and processing practices and security measures, including appropriate encryption and physical security measures to guard against unauthorized access to systems where we store personal data.