1. Information We Collect
- is committed to transparency concerning the information we collect about you. This section outlines the various types of information we gather through our website and services, inclusive of telephonic interactions such as SMS/MMS communications, and provides clarity on the purpose and use of such information.
- Personal Information
- We collect personal information that can be used to identify you as an individual, collected either directly from you or through your interactions with our services. This includes, but is not limited to:
- Name: Full legal name
- Contact Details: Email address, postal address, telephone number, and other similar contact information.
2. Billing Information
- For transactional and billing purposes, we collect specific financial information, which includes:
- Credit Card Information: Card number, expiration date, and CVVg
- Address: Postal address associated with the payment method. The collection of billing information is essential for processing payments and managing your subscription or purchases of services. This information is stored in compliance with the Payment Card Industry Data Security Standard (PCI DSS).
- Usage Information
- To optimize and enhance your experience, we gather detailed usage data reflecting your interactions with our services and website:
- IP Address: Internet Protocol address used to connect your computer or mobile device to the internet.
- Service Usage: Data concerning features accessed, duration and frequency of use, service plan choices, and other metrics.
- Calling History: Records of calls made and received via our services, including timestamps and call durations.
- Click Patterns: Data on navigation and clicks on the Website, reflecting user interaction patterns. Collection of such information is standard practice to improve service delivery, ensure security, and understand user preferences.
- Anonymous Information
- We also collect anonymized data that cannot be used to identify you personally. This aggregated data includes:
- Aggregated Usage Data: Information compiled from multiple users in a manner that ensures individual anonymity. The purpose of collecting anonymous data is to conduct market research, improve our services, monitor performance, and support commercial activities without compromising individual privacy.
- Additional Information
- In the course of providing our services, we may also collect supplementary information necessary for business operations:
- Business Name: Company name and related details for enterprise clients.
- Demographic Details: Age, gender, occupation, and other demographic characteristics.
- Technology Preferences: Information about your preferred technologies and platforms.
- Referral Information: How you discovered , including referral sources. This additional information helps us tailor our services, improve customer interactions, and develop targeted marketing strategies.
3. How We Use Your Information
- is committed to ensuring that the information we collect from you is used in a manner that is transparent, secure, and compliant with applicable laws and regulations. Below is a detailed explanation of how we utilize your information to provide, enhance, and secure our services.
- Regulating Access
- We use personal information to regulate and manage access to services. This includes, but is not limited to:
- Authentication:
- Verifying your identity when you log in to the Website or use our services.
- Access Control: Ensuring that only authorized users access specific services and features.
- Security Measures: Implementing security protocols to protect against unauthorized access, breaches, and other security threats.
- Personalization
- To enhance your experience, we use your information to provide customized content and recommendations:
- User Preferences: Tailoring content and service offerings based on your interests and previous interactions.
- Service Customization: Personalizing user interfaces and features to improve usability and satisfaction
- Promotions and Marketing
- Your information allows us to conduct marketing activities that inform you of relevant products, services, and promotions.
- Promotions– Direct Marketing: Sending you promotional materials related to ’s products and services through email, SMS, and other communication channels, subject to obtaining your prior consent where required by law.
- Marketing Analytics: Leveraging usage data and personal preferences to design and target effective marketing campaigns.
- Partner and Sponsor Promotions
- Customer Contact
- We utilize your contact information to communicate with you for various purposes, such as:
- Service Notifications: Informing you about important updates, changes, or issues related to our services.
- Customer Support: Addressing your inquiries, resolving issues, and providing assistance through our customer service channels.
- Surveys and Feedback: Collecting feedback to improve our services and customer satisfaction.
- Internal and Administrative Purposes
- Your information is critical for our internal operations and administration:
- Data Analysis: Conducting internal research and analysis to improve our products and services.
- Audits and Compliance: Ensuring adherence to internal policies, procedures, and regulatory requirements.
- Risk Management: Identifying and mitigating potential risks to our business operations and service delivery.
- Billing and Support
- We use billing and support information for financial and operational purposes:
- Transaction Processing: Handling payments, refunds, and billing inquiries.
- Account Management: Managing your account details, subscription plans, and service entitlements.
- Technical Support: Providing technical assistance and troubleshooting to ensure seamless service usage.
- Anonymous Information Uses
- Anonymous information is utilized in a manner that ensures your privacy while supporting business objectives:
- Aggregated Analytics: Combining anonymous data to analyze trends, usage patterns, and market demand without identifying individual users.
- Business Development: Using analytical insights derived from anonymous information to make informed business decisions and develop new products or services.
- Legal Compliance
- is committed to legal and regulatory compliance in all jurisdictions where we operate:
- Law Enforcement Requests: Disclosing information to comply with legal obligations, court orders, or official requests from law enforcement agencies.
- Regulatory Requirements: Using and disclosing information as necessary to comply with industry regulations, telecommunication laws, and data protection legislation.
- Enforcement of Terms: Ensuring compliance with our user agreements, terms of service, and other contractual obligations.This comprehensive approach to information use ensures that your data is employed responsibly, ethically, and in compliance with all applicable legal standards. Should you have any questions or require further clarification concerning how your information is used, please contact us through the methods provided in the “Contact Information” section.
4. SMS/MMS Messaging
- takes compliance with SMS/MMS regulations and guidelines seriously, ensuring that our messaging practices align with the highest legal standards and industry best practices. This section outlines the policies and procedures governing our use of SMS and MMS messaging, particularly in relation to RingCentral’s terms and requirements.
- Phone numbers provided for SMS opt-in will remain confidential and will not be shared with any third parties.
- Enhanced Business SMS Guidelines
- Compliance with RingCentral’s Terms of Service and Acceptable Use Policy: ’s use of Enhanced Business SMS services is strictly governed by RingCentral’s Terms of Service and Acceptable Use Policy. We ensure that our SMS/MMS activities comply with these policies, which aim to enhance service quality while preventing spam, phishing, and fraudulent messages.
- Message Limitations: To maintain the integrity of our messaging services and adhere to carrier policies, we limit the number of messages sent per originating number to: 50 messages per minute per originating number for regular use. Up to 60 messages per minute for long-code numbers and 180 messages per minute for toll-free numbers under our High Volume SMS solution.
- Written Consent Requirements: For any marketing, promotional, or informational messaging, we obtain explicit written consent from recipients before sending messages. This consent is documented and maintained to ensure compliance with regulatory standards such as the Telephone Consumer Protection Act (TCPA) and the Cellular Telecommunications Industry Association (CTIA) guidelines.
- Phone numbers provided for SMS opt-in will remain confidential and will not be shared with any third parties.
- Automated Messaging
- Express and Logged Consent: Automated SMS messaging via RingCentral’s platform requires express and logged consent from the recipient. This involves obtaining clear and documented approval to receive automated messages, in compliance with CTIA guidelines and other applicable laws.
- Opt-out Requirements: Every automated message includes clear opt-out instructions (e.g., “Reply STOP to end”). All opt-out requests are processed immediately to ensure recipients can easily discontinue receiving messages.
- Opt-in/User Consent
- Double Opt-In Recommendations: We highly recommend using a double opt-in process to confirm the recipient’s consent and validate their contact information. This involves sending a confirmation message to which the recipient must respond affirmatively, thereby reinforcing the opt-in process.
- Consent Tracking: Detailed records of consent are maintained, including timestamps and methods of opt-in, to provide proof of consent if requested by carriers or regulatory bodies.
- Proof of Consent: In instances where carriers request proof of consent, can provide comprehensive documentation detailing the opt-in process and recipient consent records.
- Opt-Out Procedures
- Required Keywords: Opt-out instructions are clearly communicated in all informational, marketing, or promotional messages. Recognized keywords such as STOP and UNSUBSCRIBE are honored immediately to ensure compliance with CTIA guidelines.
- Manual and Automated Opt-Out Management: While our High Volume SMS solution automatically manages opt-outs, messages sent from long-code and toll-free numbers outside this solution require manual management of opt-out requests. We ensure that opt-out requests received through any channel are processed to prevent further messaging to those recipients.
- Prohibited Campaigns and Content
- Prohibited Campaigns The following types of campaigns are strictly prohibited:
- Loan and mortgage advertisements
- Credit repair offers
- Debt relief offers
- Debt collection attempts
- Work from home advertisements
- Secret shopper advertisements
- Political advertisements and messages
- Alcohol, tobacco, or firearms advertisements
- Pharmaceutical, vitamin, or other drug advertisements. Our policies extend to similar campaigns which may fall under these categories.
- Illegal activities or terms of service violations
- Pornographic or adult entertainment
- Violence, hate speech, or abusive content
- References to controlled substances (e.g., marijuana)
- Fraudulent or deceptive behavior
- Links intended to mislead or violate carrier policies
- Prohibited Message Content Messages containing the following content are not permitted and may result in service suspension:
- Compliance and Enforcement
- Carrier Fees We remain vigilant about adhering to carrier-imposed regulations and fees to avoid additional financial liability for non-compliance.
- Account Restrictions Accounts found in violation of RingCentral or carrier rules may face reduced deliverability rates, additional campaign registration fees, temporary suspension of services, or termination of account access.
- Penalties and Fines Non-compliance with guidelines and regulations may attract penalties and fines passed through RingCentral by the carriers. It is our responsibility to stay informed and adhere to all relevant policies to mitigate these risks. By adhering to the detailed guidelines and requirements listed above, commits to maintaining the highest standards of compliance in our SMS/MMS messaging practices. If you have any questions or require additional information on our messaging policies, please contact us through the provided channels in the “Contact Information” section.
5. Information Storage and Security
- is committed to safeguarding the integrity, confidentiality, and availability of your personal information. We employ a comprehensive range of security measures and follow industry best practices to ensure that your data is stored and processed securely. This section outlines our methods of information storage, security measures, and data retention policies to ensure compliance with applicable laws and regulations.
- Storage Methods
- To ensure the security of your personal data, employs a multi-faceted approach, incorporating physical, electronic, and managerial safeguards.
- Physical Procedures
- Our data storage facilities are secured through advanced physical security measures:
- Controlled Access: Access to our physical storage locations is restricted to authorized personnel only. We employ secure locks, ID badge verification, biometric systems, and surveillance cameras to monitor and control access.
- Environmental Protections: Our facilities are equipped with state-of-the-art fire suppression systems, climate control, and redundant power supplies to protect against environmental risks.
- Electronic Procedures: Personal information collected by is stored on secure, encrypted servers. The following electronic measures are in place:
- Network Security: We use robust firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS) to protect our servers from unauthorized access and cyber threats.
- Data Redundancy and Backup: Regularly scheduled backups are performed to ensure data recovery in case of accidental loss or hardware failure. These backups are stored in secure, off-site locations with the same level of protection as our primary data centers.
- Managerial ProceduresWe maintain stringent managerial controls to ensure that the personnel handling your data adhere to our privacy and security policies:
- Access Control Policies: Authorized access is granted on a need-to-know basis, and access privileges are regularly reviewed and updated.
- Employee Training: All employees undergo regular training on data protection laws, privacy practices, and security measures, ensuring that they are aware of their responsibilities in maintaining data security.
- Security Measures
- To protect your data from unauthorized access, alteration, disclosure, or destruction, employs a range of advanced security measures.
- Encryption Encryption is a critical component of our data security strategy:
- Data at Rest: Personal information stored on our servers is encrypted using industry-standard encryption protocols, such as Advanced Encryption Standard (AES-256).
- Data in Transit: Information transmitted between your device and our servers is protected using Transport Layer Security (TLS) to ensure secure communications and prevent data interception.
- Secure Access Controls We implement robust access control mechanisms to protect sensitive data:
- Multi-Factor Authentication (MFA): MFA is required for accessing sensitive systems and data, adding an additional layer of security by requiring more than one form of verification.
- Regular Audits: We conduct regular security audits and vulnerability assessments to identify and rectify potential security risks, ensuring ongoing compliance with data protection standards.
- Data Retention
- is committed to retaining your personal data only for as long as necessary to fulfill the purposes for which it was collected, or as required by applicable laws and regulations.
- Retention PeriodsOur data retention policies are guided by the following principles:
- Business and Operational Needs: Data is retained for the duration necessary to provide ongoing services, support business operations, and fulfill contractual obligations.
- Legal and Regulatory Requirements: Retention periods are determined by legal requirements, which may vary depending on jurisdiction and the nature of the data.
- Deletion Policies: When personal information is no longer required for the purposes for which it was collected, follows strict deletion policies:
- Secure Deletion: Data is securely deleted from our systems using industry-standard methods such as data wiping and degaussing, which ensure that the information cannot be recovered or reconstructed.
- Anonymization: In cases where ongoing data analysis is required, personal data may be anonymized, rendering it non-identifiable and allowing us to retain it for statistical and analytical purposes without compromising individual privacy. By implementing these rigorous storage and security practices, aims to protect your personal information against unauthorized access, loss, or misuse. Our commitment to data security is ongoing, and we continually review and enhance our practices to adhere to evolving legal standards and technological advancements. If you have any questions or concerns regarding our information storage and security practices, please contact our Data Protection Officer using the details provided in the “Contact Information” section of this policy.
6. Data Sharing and Disclosure
- Phone numbers provided for SMS opt-in will remain confidential and will not be shared with any third parties.
- Legal Requirements
- may be required to disclose your personal information in response to lawful requests from public authorities or to comply with legal obligations. Such disclosures may include:
- Compliance with Laws: Disclosures necessary to comply with any applicable law, regulation, legal process, or governmental request.-
- Protection of Rights: Disclosures necessary to protect the rights, property, or safety of , our users, employees, or the public.
- Legal Proceedings: Disclosures necessary to enforce our terms of service, agreements, or policies, or to respond to claims or litigation involving .In these instances, we will take all reasonable steps to ensure that the scope of disclosure is strictly limited to the information required by law and that appropriate protections are in place to safeguard your privacy.
7. Cookies and Tracking Technologies
- is committed to providing a user-friendly and efficient browsing experience. To achieve this, we utilize various cookies and tracking technologies to collect information about your interactions with our services. This section details the types of cookies and tracking technologies we employ, their purposes, and the information they gather, in compliance with applicable privacy laws and industry standards.
- Cookies
- Types of Cookies Used: deploys several types of cookies to enhance your experience and ensure the efficient functioning of our services:
- Essential Cookies: These cookies are fundamental to the operation of our website and services. They enable essential functionalities such as security, network management, and accessibility. Without these cookies, certain features and services may not function correctly.
- Performance Cookies: Performance cookies collect anonymized information about how visitors interact with our website. This data helps us understand the pages visited, time spent on the site, and any error messages encountered. The aggregated information is used solely to improve the performance and usability of our website.
- Functionality Cookies: These cookies remember choices you make to provide a more personalized experience. They include remembering your login details, language preferences, and enabling live chat support. Functionality cookies do not track your browsing activity on other websites and the information collected may be anonymized.
- Targeting/Advertising Cookies: Targeting cookies are used to deliver relevant advertisements to you. They track your browsing habits and interactions with ads to make content more relevant to your interests. These cookies can also limit the number of times you see an advertisement and help assess the effectiveness of an advertising campaign.
- Purpose of CookiesThe primary purposes for which utilizes cookies include:
- Improving User Experience: By remembering your preferences and past actions, cookies enhance the usability and functionality of our services.
- Analytics and Performance: Cookies help us understand how users engage with our website, enabling us to optimize our content and design for better user satisfaction.
- Targeted Advertising: With your consent, cookies enable us to deliver personalized advertisements based on your browsing behavior and preferences.
- Web Beacons
- Web beacons, also known as pixel tags or clear GIFs, are small graphic images embedded in emails or web pages. employs web beacons for the following purposes:
- Email Tracking: To understand whether emails sent by us are opened and if recipients engage with the content, thereby optimizing our email communication strategies.
- Website Analytics: To track user behavior on our website, such as pages visited and actions taken. This information helps improve the overall user experience and assess the effectiveness of our website features. Web beacons work in conjunction with cookies to monitor the interaction between users and our digital properties, providing a comprehensive view of user engagement.
- Log Files
- Information Collected
- also uses log files to capture specific information automatically when users interact with our website and services. The data collected through log files includes:
- IP Addresses: Internet Protocol addresses of the devices used to access our website, which help determine the geographical location of users and assist in maintaining website security.
- Browser Type and Version: Information about the browser used (e.g., Chrome, Firefox) to access our site, aiding in compatibility and optimization efforts.
- Internet Service Provider (ISP): Details about the ISP providing internet access to the user, which can be useful for troubleshooting connectivity issues.
- Referring/Exit Pages: The URLs of the web pages that referred visitors to our site, as well as the pages they visit upon leaving. This data helps us understand traffic patterns and the effectiveness of referral sources.
- Date and Time Stamps: Precise timestamps indicating when users access our site, which assist in tracking user behavior and peak usage times.
- Clickstream Data: Information about the sequence of clicks and interactions on our website, enabling us to optimize the site layout and navigation.By leveraging these tracking technologies, aims to enhance user experience, ensure secure and efficient operation of our services, and provide personalized content. We are committed to complying with all relevant data protection laws and providing transparency about our data collection practices. Should you have any questions or concerns regarding our use of cookies and tracking technologies, please contact our Data Protection Officer using the information provided in the “Contact Information” section of this policy.