- What personally identifiable information is collected from you through the web site and our applications, how it is used and with whom it may be shared.
- What choices are available to you regarding the use of your data.
- The security procedures in place to protect the misuse of your information.
- How you can correct any inaccuracies in the information.
Information Collection, Use, and Sharing
We are the sole owners of the information collected through our website and applications. We collect two types of information through the 4th Office app: General Statistical Information and Personal Information. We will not sell or rent this information to anyone.General Statistical Information
When you use the 4th Office app we collect statistics and analytical data about your usage of 4th Office. We may gather information about your mobile device and internet connection, including the application-specific device identifier, IP addresses, operating system, browser type, mobile network information, location, installed email, etc. This information is collectively referred to as "General Statistical Information". We use it to improve your experience in our app since it helps us determine how you interact with the various parts of the 4th Office app.
We use third party services, such as Google Analytics, Facebook Analytics and Mixpanel, to collect and analyze how you use 4th Office. These services may collect information about you and your usage of 4th Office in accordance with their respective privacy policies.Personal Information
In addition to General Statistical Information we may ask you to provide us with certain personally identifiable information. Information that can reasonably be used to identify you is referred to as "Personal Information". Any email you connect to 4th Office may used to reach out to you periodically with information about features, updates, announcements, in-app chat support or to request your feedback.
Accounts are added to 4th Office through OAuth where possible. Where OAuth is not supported we keep your account username and password on our secure servers. We then use the authorization provided to download your emails to our virtual servers and push to your device. We use Amazon Web Services (AWS) and Microsoft Azure infrastructure to process and store your data. Apart from the AWS' and Azure’s security policies we take a number of measures to ensure that your data is never read by anyone else. We ensure that all transmission is secured with HTTPS so that no one else can access your data. Your account credentials are stored on secure cloud-based servers using asymmetric encryption.
The safety and security of your information also depends on you. You should not share your email and password combinations with anyone. If you find out that anyone has improperly obtained your login credentials and accesses your email account through 4th Office, you should immediately change your password. We are not responsible for such unauthorized access unless the access is our fault.
Any support inquiries you raise with us may contain Personal Information. We use information in these tickets only to help you resolve the issues reported and improve the product quality.Use of Email Addresses
When you connect an email account with 4th Office, we use it as a way to let you know about important 4th Office announcements and send you tips and tricks on getting the most out of our app. You can always unsubscribe from our email messages and newsletters. Unsubscribe instructions are included in each newsletter.
When you contact our customer support, your email will be retained in our customer support ticketing system. We may use this email to contact you later with updates about your request, with information about related features and other announcements.
Your Access to and Control Over Information
You may opt out of any future contacts from us at any time. You can do the following at any time by contacting us via the email address or phone number given on our website:
- • See what data we have about you, if any.
- • Change/correct any data we have about you.
- • Have us delete any data we have about you.
- • Express any concern you have about our use of your data.
We take precautions to protect your information. When you submit sensitive information via the website or our applications, your information is protected both online and offline. Wherever we collect sensitive information, that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a closed lock icon at the bottom of your web browser, or looking for "https" at the beginning of the address of the web page. While we use encryption to protect sensitive information transmitted online, we also protect your information offline.
Only employees who need the information to perform a specific job (for example, billing or customer service) are granted access to personally identifiable information. The computers/servers in which we store personally identifiable information are kept in a secure environment.
We have a strict access control policy for cases where we need to access your e-mail account on your behalf to solve account-related issues or if we receive such a request by law.
Use of Personal Information and Access Control Policy
We take personal and sensitive information very seriously and maintain strict records and control over who can access a customer’s email account.
Anyone who wants to access a customer's information for whatever reason has to get the permission of the COO, who authorizes access or not and we keep a record of it.
Generally, access is authorized only in case we need to access a customer account on their behalf to solve an account-related issue.
4th Office does not rent, sell, or share personally identifiable information about you with non-affiliated third parties (other than our subsidiaries and affiliates), except to provide products or services you have requested, when we have your permission, or under the following circumstances:
- • We respond to subpoenas, court orders, or legal process, or to establish or exercise our legal rights or defend against legal claims.
- • We believe disclosure is necessary or appropriate to protect the rights, property, or safety of our company, our customers or others. This includes exchanging information with other companies and organizations for the purposes of fraud protection and credit risk reduction.
- • We transfer your information in the event a merger, divestiture, restructuring, reorganization, dissolution or sale or transfer of some or all of our assets, whether as a going concern or as part of bankruptcy, liquidation or similar proceeding and you agree to and do hereby consent to our assignment or transfer of rights to your Personal Information.