Updated: September 15, 2014.
(1) Collection of Information
When you use the Service, our servers automatically record certain information sent by your web browser. These server logs may include information such as your web request, Internet Protocol (“IP”) address, browser type, and other such information. We also may collect information about the use of your account, such as how much storage you are using, how often you log in and other information related to your registration and use of Centask. Information displayed or clicked on in your Centask account.
When you use the Service, we may send one or more “cookies” – a small data file – to your computer to uniquely identify your browser and let Centask help you log in faster and enhance your navigation through the site. A cookie may convey anonymous information about how you browse the Service to us. A persistent cookie remains on your hard drive after you close your browser so that it can be used by your browser on subsequent visits to the Service. Persistent cookies can be removed by following your web browser’s directions. A session cookie is temporary and disappears after you close your browser. You can reset your web browser to refuse all cookies or to indicate when a cookie is being sent. However, some features of the Service may not function properly if the ability to accept cookies is disabled.
(3) Consent to Use Your Data/Information
Centask uses the information we collect to operate, maintain and provide you the features and functionality of the Service, to analyze how the Service is used, diagnose service or technical problems, maintain security, remember information to help you efficiently access your account, monitor aggregate metrics such as total number of visitors, traffic, and demographic patterns.
We may use your email address to send you Service-related notices. We may also use your contact information to send you marketing messages. If you don’t want to receive these messages, you may indicate a preference to stop receiving further promotional communications from us and you will have the opportunity to “opt-out” by following the “unsubscribe” instructions provided in the promotional e-mail you receive or by contacting us directly at email@example.com.When you use Centask service, you also post and synchronize content to the Service. Centask employees do not access the content of account information unless you specifically request them to do so (for example, if you are having technical difficulties accessing your account) or if required by law, to maintain our system, or to protect Centask or the public.
(4) How We Share Your Information
Centask does not rent, sell, or share personal information about you with other people, or non-affiliated companies except for trusted partners for the purpose of providing the Service to you. We engage “Third Party Service Providers” to perform functions like sending out and distributing our administrative and promotional emails. We may share your Personally Identifiable Information with such Service Providers to send postal or email communication, remove repetitive information on customer lists, analyze data, provide marketing assistance, provide search results and links, process credit card payments, operate the Website, troubleshoot, and provide customer service. These partners/service providers do not have any independent right to share or use this information other than to provide these services to us. We may also store personal information in locations outside the direct control of Centask (for instance, on servers or databases co-located with hosting providers).
(5) Disclosure of Your Information
Centask may disclose your personal information if required to do so by law or subpoena or if we believe that it is reasonably necessary to comply with a law, regulation or legal request; to protect the safety of any person; to address fraud, security or technical issues; or to protect Centask’s rights or property; in order to establish, exercise or defend our legal rights.
Without limiting the above, we will not otherwise disclose your personal information to law enforcement, other government officials, or other third parties without a subpoena, court order or substantially similar legal procedure, except when we believe in good faith that the disclosure of information is necessary to prevent imminent physical harm or financial loss or to report suspected illegal activity.
(6) Confidentiality and Security
The security of your information is important to us. When you enter sensitive information (such as a credit card number) as part of our service, we encrypt the transmission of that information using secure socket layer technology (SSL).Centask uses commercially reasonable physical, managerial, and technical safeguards to preserve the integrity and security of your personal information, once we receive it. For example, we continuously and regularly back up your data to help prevent data loss and aid in data recovery. No method of electronic transmission of storage is 100% secure, however, and we cannot guarantee the security of your data while it is being transmitted over the Internet and through servers that are out of our control. Centask cannot ensure or warrant the security of any information you transmit to our website or services. Any data transmissions you make over the internet are done so at your own risk. Once we receive the data transmission, we make our best efforts to ensure its security and privacy on our systems.
The contents of your Centask account are stored and maintained on our servers in order to provide the service. Because we keep back-up copies of data for the purposes of recovery from errors or system failure, residual copies of any account information may remain on our systems for some time, even after you have deleted information or after the termination of your account.
You can terminate your account at any time by sending a request to us; and we will close your account and remove your personal information from view as soon as reasonably possible, based on your account activity and in accordance with applicable law. However, your information may remain stored in archive on our servers even after the deletion or termination of your account to comply with law, prevent fraud, collect any fees owed, resolve disputes, troubleshoot problems, assist with any investigations, enforce Centask User Agreement, and take other actions otherwise permitted by law. However, we will not sell, transfer, or use the information relating to the terminated account of an individual in any way.
The transmission of information via the internet is not completely secure and therefore Centask cannot guarantee the security of data sent to us electronically and transmission of such data is therefore entirely at your own risk.
You are responsible for keeping your password and user details confidential since that is the key to your Centask account. Include alpha-numerals with special characters and remember it. We will not ask you for your password. Please do not share your password with others. Change your password regularly. Use of your password by a third party may land you in legal complications. Hence, do not compromise the security of your password and notify Centask immediately in case you observe that your password is used by someone else.
(7) Your Choices about Your Information
If your personally identifiable information changes, or if you no longer desire our service, you may correct, update, delete/deactivate it by making the change on our member information page or by emailing our Customer Support at firstname.lastname@example.org. We will respond to your request to access within 30 days.
(8) Public Forums
Our Service offers publicly accessible community services including blogs, and forums. You should be aware that any information you provide in these areas may be read, collected, and used by others who access them. Your posts may remain even after you cancel your account. Hence, you agree to consider these aspects while disclosing Personal Information
(9) Children’s Privacy
(10) Links to Other Web Sites
If you object to any such changes, you must cease using Centask. Continued use of Centask following notice of any such changes shall indicate your acknowledgement of such changes and agreement to be bound by the terms and conditions of such changes.
(12) Business Transitions
(13) Contact Us