What information we collect
Information collected by FastSpring
The FastSpring Online Store uses Secure Sockets Layer (SSL) encryption on all web pages where personally identifiable information is required. To make purchases from the FastSpring Online Store, you must use an SSL-enabled browser such as Safari or Firefox. Doing so protects the confidentiality of your personal and credit card information while it's transmitted over the Internet.
Information collected by Apple
Information collected during recovery (Undercover)
The main purpose of our products is to track, recover and retrieve the stolen computer or iPhone. The recovery process implies the gathering of information about the stolen device. This information includes the internal and external IPs of the stolen computer, screenshots and snapshots if an iSight is available on the stolen device. The information collected is relayed to our Monitoring Center and is intended to be used with a high level of care and confidentiality. Only third parties who are directly involved in the recovery of the stolen Mac have access to this collected information.
How we may use collected information
We use personally identifiable information collected by FastSpring to provide you with the license key information in case of accidental loss or deletion. In addition, this personally identifiable information is used to keep you posted on the latest releases or updates of our products. We will disclose theft-related information such as the snapshots, screenshots and other relevant information collected during the recovery period:
- To the rightful owner of the stolen device;
- To the local authority such as the police officer who is investigating the case;
- To the internet provider of the supposedly unauthorized user.
The disclosure to the above mentioned parties is essential to the recovery of the stolen computer or iPhone.
When we begin and discontinue to collect information (Undercover)
We only begin to collect and screen information such as snapshots, screenshots, internal and external IPs when the customer files the theft claim and confirms the validity of his claim. Under no circumstances do we collect and screen our customers' data other than for the recovery purposes. If a Mac has not been stolen, no identifying information is being transferred from the computer to our server. As soon as the stolen computer returns to the rightful owner, we remove his Undercover ID from our Global Undercover Tracking System, disrupting any further collection and screening of data.
When we begin and discontinue to collect information (Witness)
Photos and videos obtained by the Witness software are stored for 2 months on our server, they are then deleted automatically. Photos and video that are removed manually by the user are also immediately removed from the server.
Release of Information to Third Parties
We will not rent, sell or share any of your personal information or information collected during recovery to third parties in the normal course of doing business and only share your information with third parties who are directly involved in the recovery of the stolen computer as described in this policy. We also establish and maintain reasonable physical, electronic and administrative safeguards to protect the confidentiality, security and integrity of data stored on our internal computer systems located in Belgium and our server. When the recovery of the stolen computer is completed, we remove this information from our server and archive it in our internal computer systems.
Integrity of your personal information
We encourage our customers to update their personally identifiable information at any time. This helps us ensure that the information is accurate and up to date. To correct or update personally identifiable information, please email us at firstname.lastname@example.org.
Cookies are small text files of information that are created by the Orbicule server and that are placed on your hard drive. Cookies make it possible for Orbicule to ease the browsing of our website http://www.orbicule.com, but they do not personally identify you. If you do not wish to receive cookies, you may set your browser to reject cookies or to alert you when a cookie is placed on your computer.
Privacy Contact Information