What information we collect?
When you register to the Service, you are requested to provide name, e-mail and cell phone number, or log-in through your Google account, so that you can access the public profile of your Google+ account, the contact people (to enable sending call invitations) and Google Drive for backup purposes.
When a conference call organizer wishes to invite people to the call, he provides us with their names and phone number/email address. The call participants can join the voice conference call without registering to the Service. However, in order to enjoy additional features of the Service (such as - be exposed to the contents of the call, to the chat service, files exchanged during the call, and more), they are required to confirm the Terms of Service and register to the Service as well.
In addition, and subject to the Terms of Service, if the User wishes so, we record the conference calls taking place within the Service.
We also collect (ourselves or through external services such as Google Analytics) anonymous data on your computer and/or mobile device, including IP address, type of browser, operating system, mobile identifier (UDID), country, and more.
What we do with the information we collect?
All the information provided to us (except credit card details as set forth herein) is stored in a secured database in order to enable us to provide the Service.
We use the information provided to us only for the purpose of operating the Service, Website and the Application, in accordance with the Terms of Service appearing on the Website or during the download of the Application. In this regard, we shall occasionally send you notifications by email or to the cell phone number provided to us, in connection with your use of the Service and existing and new features relating to the Service. In addition, we may occasionally send you notifications concerning new improvements to the Service. In case a User requests to be removed from our mailing list, he may do so by pressing the link appearing in all our emails.
As to the payment details provided by paid Users, these details are provided in a secure manner to third parties involved in the credit card payment processing (such as the credit card company and payment processing intermediaries, such as Interspace Ltd. (Tranzila)), which operate according to their own policies. We do not keep your credit card details, and cannot recreate them. The manner of identifying a customer for purposes of money refunds is through the invoice issued at the time of paymnet, which can be accessed through the Service.
Your control of the information you provide to us
Under the Israeli Privacy Act, any person may inspect information kept on him by himself, or through anyone appointed by him, or through his custodian. A person who inspects such information and finds it inaccurate, incomplete, unclear or non-dated, may approach the Company and request it to amend or delete the information.
You may log in by using your Google account. When you choose this option, we enable you to do so by using the email address identifying you on Google. If you choose this option, you would be able to access and share files from your Google Drive account, to backup calls in your Google Drive account and to send messages directly by using your contacts list. Apart from that, there shall be no use of your Google account.
Information sharing practices
The Company may use anonymous data (which cannot identify you personally) pertaining to use of the Service and related statistics, as much as it deems fit.
In addition, we do not share with third parties any personal information about you or your use of the Service (as much as it may personally identify you) without your authorization, unless it is permitted under the Terms of Service or is intended to assist in enforcing them, or in one of the following instances:
In one of two occasions: (1) A judicial order is given ordering such disclosure; (2) In the course of legal proceedings to which the Company is a party such disclosure becomes necessary for the Company's management of its case or its defense;
When a User purchases subscription or other paid service - the payment details shall be transferred to entities involved in the credit card payment processing for the purpose of completing the purchase and payment process;
In case the Company is assisted by third parties in technical aspects of operating the Service, it is possible that during such cooperation these third parties may be exposed to information collected about your use of the Service;
In case you breach the Terms of Service, the Company shall be entitled to disclose the information about you as it deems fit;
In case of any possible dispute, claim, legal demand or legal proceedings between you and the Company;
In case the Company believes that disclosure of the information is necessary to prevent severe damage to your body or assets or to a third party's body or assets;
In case the conference call organizer decides to share the contents of the call (by sending a link) or the call voice transcription or other data about the identity of the call participants, with the other participants in the call, all such data shall be shared among all call participants. It is hereby clarified that the Company is very sensitive to the protection of privacy of its Users. Accordingly, the default options in the Service management system provide access to such information and data only to the call organizer, and he is the only one entitled to change the permissions to such data and information. In case the call organizer (or one of its participants) takes any action which prejudices another call participant, the Company is not responsible for it (as elaborated in greater detail in the Terms of Service), and the sole responsibility for such action shall lie on the offending party.
We store and process your information on our servers outside the European Community. We protect it by undertaking appropriate security measures and take best measures to prevent security breaches. While these measures narrow the risk of unauthorized security breach, they cannot serve as a complete guarantee. Therefore, we cannot undertake that the Service shall be completely immune from unauthorized access to the information stored within the Service.