Our security commitments
The kinds of individual data we gather and hold
We gather individual data about our clients all together to give our services and client support. Our services and client support are provided through numerous stages, including yet not restricted to: sites, telephone applications, email, and phone.
Not all data mentioned, gathered, and handled by us is “Individual Information” as it doesn’t distinguish you as a particular familiar individual. It will incorporate the dominant part of “Client Generated Content” that gives us the goal of offering different clients. Such “Non-Personal Information” isn’t covered by this security strategy. In any case, as non-individual data might be utilized in total or be connected with existing individual data when in this structure, it will be treated as close to home data. Accordingly, this protection strategy will list the two sorts of data for straightforwardness.
How we gather Personal Information
While you utilize our services, you might be asked to give specific sorts of personal information. Our site, applications, online visit frameworks, phone, paper structures, or in-person gatherings may occur through our site. We will give you a Collection Notice at that point to clarify how we will utilize the personal information we are requesting. The notification might be composed or verbal.
Data we gather as you utilize our services.
We keep up records of the cooperation we have with our clients, including the services and client care we have given. It incorporates our clients’ connections with our foundation, for example, when a client has seen a page or clicks a catch.
We may latently gather your GPS arranges to convey certain services, which were accessible from your gadget. For example, most current devices will show an authorization demand when our foundation demands this information.
When we are reached, we may gather personal data that is characteristic of the correspondence. For instance, if we are reached through email, we will collect the email address.
Connections to different sites
On our site, you will experience connections to outsider sites. These connections might be from us, or they may show up as substance created by different clients. We do not heavily influence these connected locales, and subsequently, we are not liable for their activities. Before giving your data through some other site, we encourage you to look at the terms and states of utilizing that site and its protection strategy.
Our third party service organizations
Clients’ data might be held, sent to, or prepared for our sake worldwide, remembering ‘in the cloud’ by our third-party service organization. Our third party specialist organizations are limited by agreement to utilize your data for our benefit, under our directions.
Our outsider specialist organizations include:
- IT Managers
- Installment and banking suppliers
- Showcasing and investigation suppliers
- Security suppliers
It is feasible for clients to allow outsider application admittance to their Freelancer record through the Freelancer API. Contingent upon the consents that are in truth, these applications might have the option to get to some close to home data or do activities for the clients’ benefit. These outsider applications are not constrained by us and will be administered by their protection strategy. Clients can eliminate outsider applications from accessing their information through their settings.
Practicing your different rights
You have various rights comparable to the personal information students hold about you, be that as it may, there might be limitations on how you may practice the rights. It is generally because of the idea of the services we give. A significant part of the information we gather is encouraging contracts between clients, encouraging installments, and providing security to our commercial center’s authentic clients. This information utilizes ensured against the beneath rights.
You reserve the privilege to:
- Look for a human survey of decision making or profiling.
- Quit direct showcasing and profiling for promoting
Human survey of decision making/profiling – For our positioning calculations, it is unimaginable to expect to practice this privilege. This positioning is a principal part of the jobs that students partake in; quitting would mean not having the option to take an interest in the positions. People now investigate choices influencing commercial center security.
Direct promoting and profiling – clients can control what messages they get through their settings page.
Eradication – Most close to home data and client created content can’t be erased. They are utilized to help contracts between clients, archive budgetary exchanges, and secure other authentic clients of the commercial center. On account of non-individual information that can be connected with personal information, it will either be deleted or, in any case, anonymized from the individual data.
Impermanent limitation to handling – in specific situations, you may practice this right, specifically on the off chance that you accept that the individual information we have isn’t exact or get that we don’t have genuine justification preparing your data. In either case, you may practice this privilege by reaching our security official.