These Policies were last updated on: January 25, 2021.
1.3 Agreement with Terms & Conditions
1.4 Third Party Links
The Service contains third party links to other websites or services. Please be aware that we are not responsible for the content or privacy practices of such other third party websites or services. We encourage our users to be aware when they leave the Service and to read the privacy statements of any other site that collects personal information.
2.1 Information You Provide
It goes without saying, we can’t help you develop meaningful connections without some information about you, such as basic profile details and the types of people you’d like to meet. We also collect information generated as you use our services, for example access logs, as well as information from third parties, like when you access our services through a social media account. We will refer to information that identifies you when you use the Service or register for an account as “Personal Information.” If you want additional info, we go into more detail below. You choose to give us certain information when using our services. This includes:
2.2 Information We Collect
(a) Usage data: Traffic and usage information generated from your visit to the Service, including traffic data, pages you visit, browser information, operating system, IP address, cookie information, and the type of device that you use to access the Service;
(1) hardware and software information such as IP address, device ID and type, device-specific and apps settings and characteristics, app crashes, advertising IDs (such as Google’s AAID and Apple’s IDFA, both of which are randomly generated numbers that you can reset by going into your device’ settings), browser type, version and language, operating system, time zones, identifiers associated with cookies or other technologies that may uniquely identify your device or browser (e.g., IMEI/UDID and MAC address);
(2) information on your wireless and mobile network connection, like your service provider and signal strength
(d) Location: When you access or use the Service, or any portion thereof, we collect physical location information that is sufficiently precise to allow us to locate a specific person or device (“Location Information”). We only collect Location Information with your permission (e.g., such as when you agree to provide it to us after you initially access or use the Service). We may use Location Information and provide it to third parties to provide you with content and services that are relevant to a particular location, such as advertising, search results, and directions. However, we will never sell your location data - we will only use it to provide the Service features to you.
3.2 Web beacons
“Web beacons,” also known as an Internet tags, pixel tags or clear GIFs, link web pages to web servers and their cookies. Web beacons can be embedded in web pages, videos, or emails, to collect certain types of information from your browser, check whether you have viewed a particular web page or email message, and determine, among other things, the time and date on which you viewed the content, the IP address of your computer, and the URL of the web page from which the content was viewed.
3.3 Local shared objects
“Local shared objects,” sometimes known as Flash cookies, may be used to store your preferences or display content based upon what you have viewed on various websites to personalize your visit.
3.4 “Ad IDs” and Other In-App Tracking Methods
There are a variety of tracking technologies that may be included in mobile applications, and these are not browser-based like cookies and cannot be controlled by browser settings. Some use device identifiers, or other identifiers such as “Ad IDs” to associate app user activity to a particular app.
3.5 Google Analytics
The main reason we use your information is to deliver and improve our services. Additionally, we use your info to help keep you safe and to provide you with advertising that may be of interest to you. Read on for a more detailed explanation of the various reasons we use your information, together with practical examples.
We may use the information that we collect for any of the following purposes:
To administer your account and provide our services to you
To help you connect with other users
To ensure a consistent experience across your devices
To provide new Hangouts services to you
To serve you relevant offers and ads
To improve our services and develop new ones
To prevent, detect and fight fraud or other illegal or unauthorized activities
To ensure legal compliance
To process your information as described above, we rely on the following legal bases:
5.1 Advertising Partners
5.2 Service Providers
5.3 With Other Users
You share information with other users (and in the case of any sharing features available on Friendly, the individuals or apps with whom a Friendly user may choose to share you with) when you voluntarily disclose information on the service (including your public profile). Please be careful with your information and make sure that the content you share is stuff that you’re comfortable being publically viewable since neither you nor we can control what others do with your information once you share it.
5.4 Authorized Personnel
Our employees, agents, consultants, contractors, or other authorized personnel, may have access to user information as necessary in the normal course of our business.
5.5 Business Transfers
In some cases, we may choose to buy or sell assets. In these types of transactions, user information is typically one of the business assets that is transferred. Moreover, if the Service or Hangouts, or substantially all of its assets, were acquired, liquidated, or dissolved, user information would be one of the assets that is transferred. If the Service or Hangouts is dissolved, all data will be disposed of using a method that renders the sensitive information unreadable or indecipherable.
5.6 Government, Law Enforcement or Third Parties
We may disclose any information, including, without limitation, Personal Information that we deem necessary, in our sole discretion and without your prior permission, to comply with any applicable law, regulation, legal process or governmental request. We also may exchange information, including, without limitation, Personal Information, with other companies and organizations to protect the rights, property, or safety of Hangouts and its affiliates, personnel, users, third parties, or others. We reserve the right to disclose a user’s Personal Information if we believe, in good faith, that the user is in violation of the Terms & Conditions, even without a subpoena, warrant or other court order.
5.7 Social Media Networks
We provide you the ability to exercise certain controls and choices regarding our collection, use and sharing of your information.
We want you to be in control of your information, so we have provided you with the following tools:
In accordance with local law, your controls and choices may include:
(a) You may correct, update and delete your account information, as described below;
(b) You may change your choices for subscriptions and newsletters;
(c) You may choose whether or not to receive offers from us;
(d) You may choose whether you received targeted advertising from us or our partners.
6.2 Accessing and Correcting Your Information
If you have an account, you can help ensure that your contact information and preferences are accurate, complete, and up to date by logging in to your account or by emailing us at email@example.com. For other personal information we hold, we will provide you with access for any purpose including requesting that we correct the data if it is inaccurate or delete the data if we are not required to retain it by law or for legitimate business purposes. We may decline to process requests that are frivolous/vexatious, jeopardize the privacy of others, are extremely impractical, or for which access is not otherwise required by local law.
7.1 Security MeasuresWe work hard to protect you from unauthorized access to or alteration, disclosure or destruction of your personal information. As with all technology companies, although we take steps to secure your information, we do not promise, and you should not expect, that your personal information will always remain secure.
We regularly monitor our systems for possible vulnerabilities and attacks and regularly review our information collection, storage and processing practices to update our physical, technical and organizational security measures.
We may suspend your use of all or part of the services without notice if we suspect or detect any breach of security. If you believe that your account or information is no longer secure, please notify us immediately!
In order to ensure that our systems and your information are protected against unauthorized access, theft and loss, we implemented a bug bounty program. For more information about our bug bounty program, please contact us.
Our services are restricted to users who are 18 years of age or older. We do not permit users under the age of 18 on our platform and we do not knowingly collect personal information from anyone under the age of 18. If you suspect that a user is under the age of 18, please use the reporting mechanism available through the service and contact us at firstname.lastname@example.org.
If you are a California resident, you may have certain additional rights.
California Civil Code Section 1798.83 permits you to request information regarding the disclosure of your Personal Information by us to third parties for the third parties’ direct marketing purposes. California Business and Professions Code Section 22581 permits registered users who are minors to request and obtain deletion of certain posted content. To make any such requests, please email us at email@example.com or contact us at the address below.
California Business & Professions Code Section 22575(b) (as amended effective January 1, 2014) provides that California residents are entitled to know how we respond to “Do Not Track” browser settings. We do not currently take action to respond to Do Not Track signals because a uniform technological standard has not yet been developed. We continue to review new technologies and may adopt a standard once one is created.
Should the Company experience a data breach which compromises personal information we will notify users by email as expeditiously as possible.