COOKIES AND DATA PRIVACY FAQ
How Does TagCommander Collect Data?
We use online techniques such as “cookies” and “pixel tags” to collect data. Cookies are small bits of information that identify a browser. You may be able to set your browser to reject all third-party cookies (including those set by TagCommander) or to alert you when a third-party cookie is sent. For more information, please look at your browser’s specific instructions for managing cookies. Pixel tags are small strings of code that provide a method for delivering an image online. An entity that serves a pixel tag can set, read, and modify cookies on, and transfer other data to, the browser that receives the online image. Pixel tags can also obtain information about the computer being used to view that online image. Examples of the types of data we collect through cookies and pixel tags include the following: IP address of the computer, the time it was sent, the user’s operating system and browser type, the visitor’s browsing and purchasing behavior such as the date and time the visitor visited the website that set the cookie or delivered the pixel tag, the areas of the website visited, the types of products purchased, the information submitted on order forms and website registrations, and other clickstream data, none of which is personally identifiable.
How Does TagCommander Use the Data?
We provide the data we collect to the members of our service. These members may use the data for various purposes, such as targeting advertisements or other content to website visitors. Our members have confirmed to us that the collection and use of the data complies with their own privacy policies. We also may use the data we collect to create industry reports, analyses, and similar materials that we may use for sales, marketing or other business purposes.
How long do we keep the data for?
We retain data for no more than one year unless we have a business need to retain it for a longer time period.
Is the Data Secure?
We take appropriate measures to protect the data in our control from unauthorized access, disclosure, alteration, or destruction. While we work very hard to protect the data, no data security measure can guarantee that the data will always remain secure.