Last updated 2022
For purposes of this Agreement, “Site” refers to the Company’s website, which can be accessed at journeytrack.io.
“Service” refers to the Company’s services accessed via the Site, in which users can create, collaborate, and share personas and journey maps.
The terms “we,” “us,” and “our” refer to the Company.
“You” refers to you, as a user of our Site or our Service.
I. INFORMATION WE COLLECT
We collect “Non-Personal Information” and “Personal Information.” Non-Personal Information includes information that cannot be used to personally identify you, such as anonymous usage data, general demographic information we may collect, referring/exit pages and URLs, platform types, preferences you submit and preferences that are generated based on the data you submit and number of clicks. Personal Information includes your email, your username and address, which was submitted to us through our sales team and your account owner.
1. Information collected via Technology
The Company may use both persistent and session cookies; persistent cookies remain on your computer after you close your session and until you delete them, while session cookies expire when you close your browser.
2. Information you provide us by registering for an account
II. HOW WE USE AND SHARE INFORMATION
In general, the Personal Information you provide to us is used to help us communicate with you. For example, we use Personal Information to contact users in response to questions, solicit feedback from users, provide technical support,service announcements (e.g. maintenance window), and inform users about new features and services being added to JourneyTrack and to contact you for marketing purposes (if you opt in)..
Additionally, for purposes of creating an audit trail, we track activities performed by user on JourneyTrack:
Actions Type: e.g. Login, Create, Share, Rename, Delete, and Remove
When: Date & Time of Action
Who: First and Last Name of User
Entity: Project Name
We may share Personal Information with outside parties if we have a good-faith belief that access, use, preservation or disclosure of the information is reasonably necessary to meet any applicable legal process or enforceable governmental request; to enforce applicable Terms of Service, including investigation of potential violations; address fraud, security or technical concerns; or to protect against harm to the rights, property, or safety of our users or the public as required or permitted by law.
Non-Personal Information: In general, we use Non-Personal Information to help us improve the Service and customize the user experience. We also aggregate Non-Personal Information in order to track trends and analyze use patterns on the Site such as:
Total number of users in an account
Total number of projects in an account
Total number of personas in an account
Total number of journeys in an account
Line graph of active users over time in an account
III. HOW WE PROTECT INFORMATION
We implement security measures designed to protect your information from unauthorized access. Your account is protected by your account password and we urge you to take steps to keep your personal information safe by not disclosing your password and by logging out of your account after each use. We further protect your information from potential security breaches by implementing certain technological security measures including encryption, firewalls and secure socket layer technology. However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such firewalls and secure server software. By using our Service, you acknowledge that you understand and agree to assume these risks.
The security of your personal information is important to us. We follow industry best practices to protect the personal information submitted to us, both during transmission and once we receive it. Our security measures include but are not limited to:
- Data Encryption both at rest and in transit
- Continuous infrastructure monitoring
- Periodic internal vulnerability scans
- Secure backup policy and disaster recovery plan
- Internal Risk Assessments
- SOC2 Certification.
Of course, no method of transmission over the internet, or method of electronic storage, is 100% secure. Therefore, we cannot guarantee absolute security.
IV. YOUR RIGHTS REGARDING THE USE OF YOUR PERSONAL INFORMATION
V. LINKS TO OTHER WEBSITES
VII. CONTACT US
Copyright 2023. All Rights Reserved