Copyright © 2018 Centripetal Networks Inc. All Rights Reserved.
Ownership of copyright
The copyright in this website and the material on this website (including without limitation the text, computer code, artwork, photographs, images, music, audio material, video material and audio-visual) is owned by Centripetal Networks Inc.
Centripetal Networks Inc. grants to you a worldwide non-exclusive royalty-free revocable license to: view this website and the material on this website on a computer or mobile device via a web browser; copy and store this website and the material on this website in your web browser cache memory; and print pages from this website for your own [personal and non-commercial] use. Centripetal Networks Inc. does not grant you any other rights in relation to this website or the material on this website. In other words, all other rights are reserved. For the avoidance of doubt, you must not adapt, edit, change, transform, publish, republish, distribute, redistribute, broadcast, rebroadcast or show or play in public this website or the material on this website (in any form or media) without Centripetal Networks Inc. prior written permission.
The automated and/or systematic collection of data from this website is prohibited.
You may request permission to use the copyright materials on this website by writing to firstname.lastname@example.org.
Enforcement of copyright
Centripetal Networks Inc. takes the protection of its copyright very seriously. If Centripetal Networks Inc. discovers that you have used its copyright materials in contravention of the license above; Centripetal Networks Inc. may bring legal proceedings against you seeking monetary damages and an injunction to stop you from using those materials. You could also be ordered to pay legal costs. If you become aware of any use of Centripetal Networks Inc. copyright materials that contravenes or may contravene the license above, please report this by email to email@example.com.
If you become aware of any material on the website that you believe infringes your or any other person’s copyright, please report this by email to firstname.lastname@example.org.
What we Collect
We get information about you in a range of ways.
Information You Give Us
We collect your email address, and other information you directly give us on our Site.
Information We Get from Others
We may get information about you from other sources. We may add this to information we get from this Site.
Information Automatically Collected
We automatically log information about you and your computer. For example, when visiting our Site, we log your computer operating system type, browser type, browser language, the website you visited before browsing to our Site, pages you viewed, how long you spent on a page, access times, Internet protocol (IP) address and information about your use of and actions on our Site.
Cookies and Leadlander
We may log information using digital images called Web beacons on our Site or in our emails. We use Web beacons to manage cookies, count visits, and to learn what marketing works and what does not. We also use Web Beacons to tell if you open or act on our emails.
Use of Personal Information
We use your personal information as follows:
Sharing of Personal Information
We may share personal information as follows:
We may also share aggregated and/or anonymized data with others for their own uses.
Information Choices and Changes
Our marketing emails tell you how to opt-out. If you opt out, we may still send you non-marketing emails. Non-marketing emails include emails about your accounts and our business dealings with you.
You may send requests about personal information to our Contact Information below. You can request to change contact choices, opt-out of our sharing with others, and update your personal information.
You can typically remove and reject cookies from our Site with your browser settings. Many browsers are set to accept cookies until you change your settings. If you remove or reject our cookies, it could affect how our Site works for you.
Security of Your Personal Information
We take steps to help protect personal information. No company can fully prevent security risks, however. Mistakes may happen. Bad actors may defeat even the best safeguards.