{"id":3,"date":"2020-10-17T05:42:47","date_gmt":"2020-10-17T05:42:47","guid":{"rendered":"https:\/\/kerisys.com\/?page_id=3"},"modified":"2022-10-18T11:02:12","modified_gmt":"2022-10-18T11:02:12","slug":"privacy-policy","status":"publish","type":"page","link":"https:\/\/kerisys.com\/privacy-policy\/","title":{"rendered":"Privacy Policy"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.18.0&#8243; background_color=&#8221;#ffffff&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.18.0&#8243; background_color=&#8221;#ffffff&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;80%&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; custom_padding=&#8221;75px||75px||false|false&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1><b>Privacy &amp; Cookie Policy<br \/><\/b><\/h1>\n<p><b><br \/>Why does Keri Systems have a Privacy Policy?<br \/><\/b>At a time when businesses face an almost daily barrage of junk mail, junk faxes, spam, and unsolicited calls, Keri does not want to become more noise in the system. If you are not interested in our products at this time, we do not want to bother you. However, if you find you are interested in Keri&#8217;s products, we look forward to working with you.<b><\/b><\/p>\n<p><strong>Who are we?<\/strong><br \/><span style=\"font-weight: 400;\">This website is run and maintained by Keri Systems (<\/span><a href=\"https:\/\/kerisys.com\"><span style=\"font-weight: 400;\">www.kerisys.com<\/span><\/a><span style=\"font-weight: 400;\">) whose registered address is [302 Enzo Dr Suite 190, San Jose, CA 95138, United States].\u00a0 <\/span><span style=\"font-weight: 400;\">We are committed to protecting and preserving the privacy of our visitors when visiting our site or communicating electronically with us. <\/span><span style=\"font-weight: 400;\">The policy below indicates and sets out how we process any personal data that we collect from you through our website. We can confirm that we will always keep your personal information and data secure and that we comply with all data protection legislation from your local governing authority. <\/span><span style=\"font-weight: 400;\">Please read the following carefully to understand what happens to the personal data that we collect from you when you visit and use our website. <\/span><span style=\"font-weight: 400;\">By visiting <\/span><a href=\"https:\/\/kerisys.com\"><span style=\"font-weight: 400;\">www.kerisys.com<\/span><\/a><span style=\"font-weight: 400;\"> you are accepting and consenting to all practices described in this document.\u00a0<\/span><\/p>\n<p><b>What personal data do we collect and why do we collect it?<br \/><\/b><span style=\"font-weight: 400;\">We may collect, store, and use the following information and data about individuals who visit and use our website:<\/span><\/p>\n<p><b>Information you supply to us<\/b><span style=\"font-weight: 400;\"><br \/>You may supply us with information about yourself, your company, or your clients by filling out various forms throughout our website. This includes information you provide to us when you submit an inquiry, sign up for membership login, request an RMA, become an installer form, database conversion\/upload form, etc. These forms may contain information including your name, address (personal or company), your phone number, and email address, as well as information on your client site that mimics the outlined above.\u00a0<\/span><\/p>\n<p><b>The information our website automatically collects about you<br \/><\/b><span style=\"font-weight: 400;\">With regards to each of our visitors to our website we automatically collect data on the following metrics:<\/span><\/p>\n<p><b>Technical information<br \/><\/b><span style=\"font-weight: 400;\">Including your IP address, browser type, operating system, and platform.\u00a0\u00a0<\/span><\/p>\n<p><b>Information about your visit<br \/><\/b><span style=\"font-weight: 400;\">Standard data will be collected, including the web pages you visit, how long you are on the site, how you were directed to the site, page response times, the length of your visit, the links that you clicked on (only on kerisys.com and domains relating to it), and the documents\/software downloaded. Kerisys.com also uses Hotjar, which allows us to collect further data on users, including mouse movement, website heatmaps, and usage recordings to better enhance our customer&#8217;s user experience and understand the flow of traffic through our website.\u00a0\u00a0<\/span><\/p>\n<p><strong>User Experience &amp; Security<\/strong><br \/>IP Address: For blocking malicious requests.<br \/>Device Identifier: Such as mobile, desktop, tablet. Allows the website to scale for your device.<br \/>Location: Country the visitor is visiting from. Used to serve geoinformation, such as phone numbers.<br \/>Operating System: Operating system in use; this is for UX Monitoring.<br \/>Browser: Browser visiting for User Experience, and bug tracking.<br \/>Resolution: To see what the average user&#8217;s resolution is and what is displayed on the page for their resolution size.<\/p>\n<p><b>How does Keri Systems get my contact information?<\/b><br \/>Links at various points throughout the website connect you with forms that allow you to enter the contact information you wish to give us. These forms allow you to send us your comments, request a call, report problems, or sign-up for our marketing or technical bulletins.<\/p>\n<p><b>What information does Keri Systems collect?<\/b><br \/>We only collect basic contact information: name, company, street address, telephone number, and email address.<\/p>\n<p><strong>Data collected when registering on downloads.kerisys.com<br \/><\/strong>We store information on name, company, street address, and email address. These are used to create your individual user profile so that Keri Systems can verify your business information and affiliation to a legitimate access control company before being granted access to our download portal.<br \/>If you create an account to access our downloads center, the fields you complete when registering will be kept within a database and will associate them to your specific account and email registered address.<\/p>\n<p><strong>Specific to downloads.kerisys.com registrations<\/strong><br \/>An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https:\/\/automattic.com\/privacy\/. After approval of your comment, if you add a profile picture this may be visible to the public in the context of your profile.<\/p>\n<p><b>Use by children<br \/><\/b><span style=\"font-weight: 400;\">Our services are not intended to be used by individuals under the age of 16 and we do not<\/span> <span style=\"font-weight: 400;\">knowingly collect personal information from children under 16. If we become aware that a child under 16 has provided us with personal information, we will take steps to delete such information. If you become aware that a child has provided us with personal information, please contact us at privacy@kerisys.com.<\/span><\/p>\n<p><b>Cookies<br \/><\/b><span style=\"font-weight: 400;\">Our website uses cookies to distinguish you from other users on our website. This helps us provide you with the best user experience possible while you browse our website.<\/span><\/p>\n<p>\u201cCookies\u201d are small pieces of information that your browser stores on your computer on behalf of a website that you have visited. Cookies may be used in order to complete transactions on our site. You can always choose not to accept cookies with the settings of your web browser, however, you may not be able to complete these transactions if you do not accept cookies.<\/p>\n<p>Most browsers allow you to reject all cookies, whilst some browsers allow you to reject only third-party cookies. You can find out more about how cookies work and how to manage them at allaboutcookies.org.<\/p>\n<p>The cookies used on our website are grouped into the following categories:<\/p>\n<p>[cookie_category]<\/p>\n<p>The list below details the cookies used on our website.<\/p>\n<p>[cookie_audit_category columns=&#8221;cookie,description&#8221;]<\/p>\n<p><b>Contact forms<br \/><\/b><span style=\"font-weight: 400;\">Kerisys.com uses forms generated by Zoho through a web plugin. When you submit a form through our website you consent and agree to the use and storage of information by Zoho and its suite of applications. When submitting a form on our website, the data that we collect from you is stored indefinitely on our Zoho platform. These forms contain all information outlined in the \u201cinformation you supply to us\u201d section.<\/span>\u00a0<span style=\"font-weight: 400;\">The information that we collect is used to ensure an enhanced customer experience and may be used for marketing materials to keep you up to date on the latest products and services that we feel would be of interest to you or your clients. <\/span><span style=\"font-weight: 400;\">If you leave a comment on our site you may opt-in to saving your name, email address, and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. <\/span><span style=\"font-weight: 400;\">If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. <\/span><span style=\"font-weight: 400;\">When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days and screen options cookies last for a year. If you select &#8220;Remember Me&#8221;, your login will persist for two weeks. If you log out of your account, the login cookies will be removed. <\/span><span style=\"font-weight: 400;\">If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.<\/span><\/p>\n<p><strong>Using our contact forms<br \/><\/strong>If you use our contact forms, the content of the form is sent via Zoho through a Keri Systems generic mailer address, which is then forwarded to the relevant department to answer your query. By using the contact form you are accepting the risks associated with passing on the information provided between email addresses and any liabilities that may occur during transmission. All emails on the Keri Systems website require acceptance of our TOS &amp; Privacy Policy before sending.<\/p>\n<p><b>Embedded content from other websites<br \/><\/b><span style=\"font-weight: 400;\">Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as on the other website. <\/span><span style=\"font-weight: 400;\">These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.<\/span><\/p>\n<p><b>Analytics<\/b><\/p>\n<p><strong>Google Analytics<br \/><\/strong><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> We use Google Analytics to analyze the use of our website. Google Analytics generates statistical and other information about website use by means of cookies, which are stored on users\u2019 computers. The information generated relating to our website is used to create reports about the use of the website. Google will store and use this information. Google\u2019s privacy policy is available at www.google.com\/privacypolicy.html.<\/span><\/p>\n<p>Please refer to the appropriate Google Analytics documentation for the specific type of data it collects. For more information on Google Analytics privacy policy please see <a href=\"https:\/\/policies.google.com\/privacy\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/policies.google.com\/privacy<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Activity Tracked:<\/strong> This feature sends page view events (and potentially video play events) over to Google Analytics for consumption. <\/span><span style=\"font-weight: 400;\">By default, WordPress does not share any personal data with anyone.<\/span><\/p>\n<p><strong>Hotjar: <\/strong><span style=\"font-weight: 400;\">As outlined above under \u201cWhat personal data do we collect and why do we collect it\u201d, it explains why Hotjar is used and how we use it. For more information on Hotjar&#8217;s privacy policy please visit: <a href=\"https:\/\/www.hotjar.com\/legal\/policies\/privacy\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.hotjar.com\/legal\/policies\/privacy\/\u00a0<\/a>\u00a0<\/span><\/p>\n<p><b>How long do we retain your data?<br \/><\/b><span style=\"font-weight: 400;\">As mentioned above in our \u201cContact forms\u201d section kerisys.com uses Zoho integration to display forms on our website, as well as store information regarding users who have submitted any form through this domain. All data submitted through Zoho forms on our website is stored indefinitely. <\/span><span style=\"font-weight: 400;\">For users that register on our website, we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (with the exception of changing their username). Website administrators can also see and edit that information. <\/span><span style=\"font-weight: 400;\">If you have an account on this site or have submitted any forms, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.<\/span> <span style=\"font-weight: 400;\">To contact us about your data please see the contact information in the below section titled \u201cOur contact information\u201d.<\/span><\/p>\n<p><b>Where do we send your data?<br \/><\/b><span style=\"font-weight: 400;\">As mentioned above we will always protect your data under any localized legislation or government law. Kerisys.com will only send your data to our Zoho Customer Relations platform for the use of storing your information securely. For more information on why we use Zoho forms please visit the above section \u201cContact forms\u201d. If you would like to learn more about Zoho and how they store data please visit: <\/span><a href=\"https:\/\/www.zoho.com\/privacy.html\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/www.zoho.com\/privacy.html<\/span><\/a><\/p>\n<p>If you create an account to access our downloads center, the fields you complete when registering will be kept within a database and will associate them to your specific account and email registered address.<\/p>\n<p><b>How does Keri Systems use this information?<\/b><br \/>The information that you choose to provide directs us in how to contact you. We will respond to your comments and questions and, if requested, we will sign you up for our newsletters.<\/p>\n<p><b>Does Keri Systems share information with any third parties?<\/b><br \/>Keri Systems only shares your contact information within the Keri family of dealers and distributors (the dealer or distributor that is best able to meet your needs). Keri does\u00a0<b>not<\/b>\u00a0share your contact information with any parties outside of the Keri family of dealers and distributors.<\/p>\n<p><b>Our contact information<br \/><\/b> <span style=\"font-weight: 400;\">If you have any questions or concerns pertaining to our privacy policy, you may contact us through the following methods:<\/span><br \/>By post:<span style=\"font-weight: 400;\">\u00a0302 Enzo Dr Suite 190, San Jose, CA 95138, United States<\/span><br \/><span style=\"font-weight: 400;\">By email: <\/span><a href=\"mailto:webmaster@kerisys.com\"><span style=\"font-weight: 400;\">webmaster@kerisys.com<\/span><\/a><br \/><span style=\"font-weight: 400;\">By phone: +18002605265<\/span><\/p>\n<p>To opt-out of email blasts, or to remove the information collected via submitting our webforms, please visit this page:<br \/><a href=\"https:\/\/kerisys.com\/unsubscribe\/\">https:\/\/kerisys.com\/unsubscribe\/<\/a><\/p>\n<p>We also offer the option to unsubscribe from any marketing\/promotional emails, within the footer on our marketing campaign emails. To unsubscribe, open an email from Keri Systems and press the &#8216;Unsubscribe&#8217; link located at the bottom of the email.<b><\/b><\/p>\n<p>We protect your data <span style=\"font-weight: 400;\">and the processing of your personal data at <\/span><a href=\"https:\/\/kerisys.com\"><span style=\"font-weight: 400;\">www.kerisys.com<\/span><\/a><span style=\"font-weight: 400;\"> in line with the applicable data protection legislation of your localization or governing body. With this Privacy Statement, we wish to inform you of how your personal data is processed when you visit our website.<\/span><\/p>\n<p><b>Data breach procedures<br \/><\/b>In the event of a data breach, Keri Systems will inform any affected persons or registered users of kerisys.com within a 48 hour period of the breach being discovered.<br \/><span style=\"font-weight: 400;\">In the event that the policy is changed at any time, the date and nature of the change will be clearly indicated in this document. In the event that the change has a material impact on the handling of your personal information, we will contact you to inform you of the changes where appropriate.<\/span><\/p>\n<p><strong>For questions regarding our data protection policy, please contact: Dave Miller<\/strong><br \/>You can use our contact form <a href=\"\/contact\/\">here.<\/a><\/p>\n<p><b>Source: Hotjar<\/b><b><br \/><\/b><span style=\"font-weight: 400;\">We use Hotjar in order to better understand our users\u2019 needs and to optimize service and experience. Hotjar is a technology service that helps us better understand our users\u2019 experience (e.g. how much time they spend on which pages, which links they choose to click, what users do and don\u2019t like, etc). This enables us to build and maintain our service with user feedback. Hotjar uses cookies and other technologies to collect data on our users\u2019 behavior and their devices. This includes a device&#8217;s IP address (processed during your session and stored in a de-identified form), device screen size, device type (unique device identifiers), browser information, geographic location (country only), and the preferred language used to display our website. Hotjar stores this information on our behalf in a pseudonymized user profile. Hotjar is contractually forbidden to sell any of the data collected on our behalf.<\/span> <span style=\"font-weight: 400;\">For further details, please see the \u2018About Hotjar\u2019 section of <\/span><a href=\"https:\/\/help.hotjar.com\/hc\/en-us\/categories\/115001323967-About-Hotjar\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Hotjar\u2019s support site<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>To see which cookies are used visit:<\/b><b> <\/b><a href=\"https:\/\/help.hotjar.com\/hc\/en-us\/articles\/115011789248-Hotjar-Cookies\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/help.hotjar.com\/hc\/en-us\/articles\/115011789248-Hotjar-Cookies<\/span><\/a><b> <\/b><\/p>\n<p><b>Source: Zoho Inc<\/b> <b>Source: LiteSpeed-cache<br \/><\/b><span style=\"font-weight: 400;\">This site utilizes caching in order to facilitate a faster response time and better user experience. Caching potentially stores a duplicate copy of every web page that is on display on this site. All cache files are temporary and are never accessed by any third party, except as necessary to obtain technical support from the cache plugin vendor. Cache files expire on a schedule set by the site administrator, but may easily be purged by the admin before their natural expiration, if necessary. <\/span><\/p>\n<p><b><\/b><b>Jetpack Integration<\/b><b> <\/b><b> <\/b><b>Activity<br \/><\/b><span style=\"font-weight: 400;\">This feature only records the activities of a site\u2019s registered users and the retention duration of activity data will depend on the site\u2019s plan and activity type.<\/span><br \/><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> To deliver this functionality and record activities around site management, the following information is captured: user email address, user role, user login, user display name, WordPress.com, and local user IDs, the activity to be recorded, the WordPress.com-connected site ID of the site on which the activity takes place, the site\u2019s Jetpack version, and the timestamp of the activity. Some activities may also include the actor\u2019s IP address (login attempts, for example) and user agent.<\/span><br \/><span style=\"font-weight: 400;\"><strong>Activity Tracked:<\/strong> Login attempts\/actions, post and page update and publish actions, comment\/pingback submission and management actions, plugin and theme management actions, widget updates, user management actions, and the modification of other various site settings and options. The retention duration of activity data depends on the site\u2019s plan and activity type. See the complete list of currently-recorded activities (along with retention information).<br \/><\/span><span style=\"font-weight: 400;\"><strong>Data Synced:<\/strong> Successful and failed login attempts, which will include the actor\u2019s IP address and user agent.<\/span><\/p>\n<p><b>Contact form<br \/><\/b><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> If Akismet is enabled on the site, the contact form submission data (IP address, user agent, name, email address, website, and message) is submitted to the Akismet service (also owned by Automattic) for the sole purpose of spam checking. The actual submission data is stored in the database of the site on which it was submitted and is emailed directly to the owner of the form (i.e. the site author who published the page on which the contact form resides). This email will include the submitter\u2019s IP address, timestamp, name, email address, website, and message.<\/span><br \/><span style=\"font-weight: 400;\"><strong>Data Synced:<\/strong> Post and post metadata associated with a user\u2019s contact form submission. If Akismet is enabled on the site, the IP address and user agent originally submitted with the comment are synced as well, as they are stored in post meta.<\/span><\/p>\n<p><b>Jetpack Comments<\/b> <b>Mobile Theme<br \/><\/b><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> A visitor\u2019s preference for viewing the mobile version of a site.<br \/><\/span> <span style=\"font-weight: 400;\"><strong>Activity Tracked:<\/strong> A cookie (akm_mobile) is stored for 3.5 days to remember whether or not a visitor of the site wishes to view its mobile version.\u00a0<\/span><\/p>\n<p><b>Protect<br \/><\/b><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> In order to check login activity and potentially block fraudulent attempts, the following information is used: attempting user\u2019s IP address, attempting user\u2019s email address\/username (i.e. according to the value they were attempting to use during the login process), and all IP-related HTTP headers attached to the attempting user.<\/span><br \/><span style=\"font-weight: 400;\"><strong>Activity Tracked:<\/strong> Failed login attempts (these include IP address and user agent). We also set a cookie (jpp_math_pass) for 1 day to remember if\/when a user has successfully completed a math captcha to prove that they\u2019re a real human.\u00a0<\/span><br \/><span style=\"font-weight: 400;\"><strong>Data Synced:<\/strong> Failed login attempts, which contain the user\u2019s IP address, attempted username or email address, and user agent information.<\/span><\/p>\n<p><b>Search<br \/><\/b><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> Any of the visitor-chosen search filters and query data in order to process a search request on the WordPress.com servers.<\/span><br \/><strong>Sharing <\/strong><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> When official sharing buttons are active on the site, each button loads content directly from its service in order to display the button as well as information and tools for the sharing party. As a result, each service can in turn collect information about the sharing party. When a non-official Facebook or a Pinterest sharing button is active on the site, information such as the sharing party\u2019s IP address as well as the page URL will be available for each service, so sharing counts can be displayed next to the button. When sharing content via email (this option is only available if Akismet is active on the site), the following information is used: sharing party\u2019s name and email address (if the user is logged in, this information will be pulled directly from their account), IP address (for spam checking), user agent (for spam checking), and email body\/content. This content will be sent to Akismet (also owned by Automattic) so that a spam check can be performed. Additionally, if reCAPTCHA (by Google) is enabled by the site owner, the sharing party\u2019s IP address will be shared with that service. You can find Google\u2019s privacy policy here.<\/span><br \/><strong>WhatsApp Button Block <\/strong><span style=\"font-weight: 400;\"><strong>Activity Tracked:<\/strong> We don\u2019t track any activity. For details of what WhatsApp tracks, refer to their Privacy Policy.<\/span><\/p>\n<p><b>WordPress.com Secure Sign On<br \/><\/b><span style=\"font-weight: 400;\">This feature is only accessible to registered users of the site with WordPress.com accounts.<\/span><br \/><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> User ID (local site and WordPress.com), role (e.g. administrator), email address, username and display name. Additionally, for activity tracking (see below): IP address, WordPress.com user ID, WordPress.com username, WordPress.com-connected site ID and URL, Jetpack version, user agent, visiting URL, referring URL, timestamp of event, browser language, country code.<\/span><br \/><span style=\"font-weight: 400;\"><strong>Activity Tracked:<\/strong> The following usage events are recorded: starting the login process, completing the login process, failing the login process, successfully being redirected after login, and failing to be redirected after login. Several functionality cookies are also set, and these are detailed explicitly in our Cookie documentation.<\/span><br \/><span style=\"font-weight: 400;\"><strong>Data Synced:<\/strong> The user ID and role of any user who successfully signed in via this feature.<\/span><\/p>\n<p><b>To see further information regarding Jetpacks Privacy Policy please visit:<\/b><b> <\/b><b><a href=\"https:\/\/jetpack.com\/support\/privacy\/\" target=\"_blank\" rel=\"noopener\">https:\/\/jetpack.com\/support\/privacy\/<\/a><a href=\"https:\/\/jetpack.com\/support\/privacy\/\" target=\"_blank\" rel=\"noopener\"><\/a><\/b><\/p>\n<p><b><\/b><\/p>\n<h1>Borealis<\/h1>\n<p>Borealis is our cloud based access control system.\u00a0 Keri Systems UK is the provider of the Borealis system to our clients in the UK and Europe:\u00a0 our clients are the Controllers for this processing and Keri Systems UK act as their Processor.<\/p>\n<p>This section provides some useful information about the processing of personal data by Borealis, however if you are an individual seeking to invoke your rights under GDPR\/UK GDPR then you should contact the Controller for this processing directly.<\/p>\n<h2>Subject Matter of Processing<\/h2>\n<p>Provision of the Borealis cloud based access control system, including hosting of all associated data, to enable our client, the Controller, to manage site security and access records.<\/p>\n<h2>Duration of the Processing<\/h2>\n<p>Until such time as the contract with our client for the provision of service ends.<\/p>\n<h2>Type of Personal Data<\/h2>\n<p>User account credentials and administrator permissions, classification of user (Owner, Operator User, Systems Operators), unique identifier of access control fobs and name of associated individual, site access records, customer created custom fields<\/p>\n<p>User credentials for the Controller\u2019s staff<\/p>\n<h2>Special Categories of Personal Data<\/h2>\n<p>No special categories of personal data are processed by default, however our client has the ability to create custom fields.<\/p>\n<h2>International Transfers<\/h2>\n<p>The transfers of data to and from the Processor, Keri Systems UK, \u00a0are enabled by the UK deemed to be an adequate nation for data protection by the EU<\/p>\n<h2>Technical and Organisational Measures<\/h2>\n<p>We implement the following appropriate measures by default to preserve the security of the data collected:<\/p>\n<ul>\n<li>No copies of data are to be held by us without the Controller\u2019s permission<\/li>\n<li>Any such copies data will be held in secure, password protected IT systems<\/li>\n<li>Multi factor authentication shall be enabled on any systems where it is available<\/li>\n<li>We ensure that our IT systems use modern software that is kept up-to-date<\/li>\n<li>When personal data is deleted this will be done safely such that the data is irrecoverable<\/li>\n<li>Appropriate back-up and disaster recovery solutions are in place<\/li>\n<li>All data will be encrypted in transit<\/li>\n<li>All UK\/EU customers are contracted to Keri Systems UK and an additional Data Processing Addendum applies to that processing to comply with GDPR\/UK GDPR.<\/li>\n<\/ul>\n<h2>Sub-Processors<\/h2>\n<p>List of Sub-Processors used by us to deliver the Borealis service<\/p>\n<table width=\"601\">\n<tbody>\n<tr>\n<td width=\"200\">Name of Sub-Processor<\/td>\n<td width=\"200\">Address<\/td>\n<td width=\"200\">Nature of processing activity<\/td>\n<\/tr>\n<tr>\n<td width=\"200\">Keri Systems Inc<\/td>\n<td width=\"200\">\n<p>302 Enzo Dr Suite 190, San Jose, California 95138, USA.<\/p>\n<p>&nbsp;<\/p>\n<p>International transfer facilitated by International Data Transfer Agreement in place with Sub-Processor<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Consent<br \/><\/strong>We ask for consent on our contact forms, however, if the box is unticked, and you continue to submit we will assume your acceptance.<br \/>By continuing to use this website, you signify you understand and agree with this Privacy Policy.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privacy &amp; Cookie Policy Why does Keri Systems have a Privacy Policy?At a time when businesses face an almost daily barrage of junk mail, junk faxes, spam, and unsolicited calls, [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"<b>Why does Keri Systems have a Privacy Policy?\r\n<\/b>At a time when businesses face an almost daily barrage of junk mail, junk faxes, spam, and unsolicited calls, Keri does not want to become more noise in the system. If you are not interested in our products at this time, we do not want to bother you. However, if you find you are interested in Keri's products, we look forward to working with you.<b><\/b>\r\n\r\n<strong>Who are we?<\/strong>\r\n<span style=\"font-weight: 400;\">This website is run and maintained by Keri Systems (<\/span><a href=\"https:\/\/kerisys.com\"><span style=\"font-weight: 400;\">www.kerisys.com<\/span><\/a><span style=\"font-weight: 400;\">) whose registered address is [302 Enzo Dr Suite 190, San Jose, CA 95138, United States].\u00a0 <\/span><span style=\"font-weight: 400;\">We are committed to protecting and preserving the privacy of our visitors when visiting our site or communicating electronically with us. <\/span><span style=\"font-weight: 400;\">The policy below indicates and sets out how we process any personal data that we collect from you through our website. We can confirm that we will always keep your personal information and data secure and that we comply with all data protection legislation from your local governing authority. <\/span><span style=\"font-weight: 400;\">Please read the following carefully to understand what happens to the personal data that we collect from you when you visit and use our website. <\/span><span style=\"font-weight: 400;\">By visiting <\/span><a href=\"https:\/\/kerisys.com\"><span style=\"font-weight: 400;\">www.kerisys.com<\/span><\/a><span style=\"font-weight: 400;\"> you are accepting and consenting to all practices described in this document.\u00a0<\/span>\r\n\r\n<b>What personal data do we collect and why do we collect it?\r\n<\/b><span style=\"font-weight: 400;\">We may collect, store, and use the following information and data about individuals who visit and use our website:<\/span>\r\n\r\n<b>Information you supply to us<\/b><span style=\"font-weight: 400;\">\r\nYou may supply us with information about yourself, your company, or your clients by filling out various forms throughout our website. This includes information you provide to us when you submit an inquiry, sign up for membership login, request an RMA, become an installer form, database conversion\/upload form, etc. These forms may contain information including your name, address (personal or company), your phone number, and email address, as well as information on your client site that mimics the outlined above.\u00a0<\/span>\r\n\r\n<b>The information our website automatically collects about you\r\n<\/b><span style=\"font-weight: 400;\">With regards to each of our visitors to our website we automatically collect data on the following metrics:<\/span>\r\n\r\n<b>Technical information\r\n<\/b><span style=\"font-weight: 400;\">Including your IP address, browser type, operating system, and platform.\u00a0\u00a0<\/span>\r\n\r\n<b>Information about your visit\r\n<\/b><span style=\"font-weight: 400;\">Standard data will be collected, including the web pages you visit, how long you are on the site, how you were directed to the site, page response times, the length of your visit, the links that you clicked on (only on kerisys.com and domains relating to it), and the documents\/software downloaded. Kerisys.com also uses Hotjar, which allows us to collect further data on users, including mouse movement, website heatmaps, and usage recordings to better enhance our customer's user experience and understand the flow of traffic through our website.\u00a0\u00a0<\/span>\r\n\r\n<strong>User Experience &amp; Security<\/strong>\r\nIP Address: For blocking malicious requests.\r\nDevice Identifier: Such as mobile, desktop, tablet. Allows the website to scale for your device.\r\nLocation: Country the visitor is visiting from. Used to serve geoinformation, such as phone numbers.\r\nOperating System: Operating system in use; this is for UX Monitoring.\r\nBrowser: Browser visiting for User Experience, and bug tracking.\r\nResolution: To see what the average user's resolution is and what is displayed on the page for their resolution size.\r\n\r\n<b>How does Keri Systems get my contact information?<\/b>\r\nLinks at various points throughout the website connect you with forms that allow you to enter the contact information you wish to give us. These forms allow you to send us your comments, request a call, report problems, or sign-up for our marketing or technical bulletins.\r\n\r\n<b>What information does Keri Systems collect?<\/b>\r\nWe only collect basic contact information: name, company, street address, telephone number, and email address.\r\n\r\n<strong>Data collected when registering on downloads.kerisys.com\r\n<\/strong>We store information on name, company, street address, and email address. These are used to create your individual user profile so that Keri Systems can verify your business information and affiliation to a legitimate access control company before being granted access to our download portal.\r\nIf you create an account to access our downloads center, the fields you complete when registering will be kept within a database and will associate them to your specific account and email registered address.\r\n\r\n<strong>Specific to downloads.kerisys.com registrations<\/strong>\r\nAn anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https:\/\/automattic.com\/privacy\/. After approval of your comment, if you add a profile picture this may be visible to the public in the context of your profile.\r\n\r\n<b>Use by children\r\n<\/b><span style=\"font-weight: 400;\">Our services are not intended to be used by individuals under the age of 16 and we do not<\/span> <span style=\"font-weight: 400;\">knowingly collect personal information from children under 16. If we become aware that a child under 16 has provided us with personal information, we will take steps to delete such information. If you become aware that a child has provided us with personal information, please contact us at privacy@kerisys.com.<\/span>\r\n\r\n<b>Cookies\r\n<\/b><span style=\"font-weight: 400;\">Our website uses cookies to distinguish you from other users on our website. This helps us provide you with the best user experience possible while you browse our website.<\/span>\r\n\r\n\u201cCookies\u201d are small pieces of information that your browser stores on your computer on behalf of a website that you have visited. Cookies may be used in order to complete transactions on our site. You can always choose not to accept cookies with the settings of your web browser, however, you may not be able to complete these transactions if you do not accept cookies.\r\n\r\nMost browsers allow you to reject all cookies, whilst some browsers allow you to reject only third-party cookies. You can find out more about how cookies work and how to manage them at allaboutcookies.org.\r\n\r\nThe cookies used on our website are grouped into the following categories:\r\n\r\n[cookie_category]\r\n\r\nThe list below details the cookies used on our website.\r\n\r\n[cookie_audit_category columns=\"cookie,description\"]\r\n\r\n<b>Contact forms\r\n<\/b><span style=\"font-weight: 400;\">Kerisys.com uses forms generated by Zoho through a web plugin. When you submit a form through our website you consent and agree to the use and storage of information by Zoho and its suite of applications. When submitting a form on our website, the data that we collect from you is stored indefinitely on our Zoho platform. These forms contain all information outlined in the \u201cinformation you supply to us\u201d section.<\/span>\u00a0<span style=\"font-weight: 400;\">The information that we collect is used to ensure an enhanced customer experience and may be used for marketing materials to keep you up to date on the latest products and services that we feel would be of interest to you or your clients. <\/span><span style=\"font-weight: 400;\">If you leave a comment on our site you may opt-in to saving your name, email address, and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. <\/span><span style=\"font-weight: 400;\">If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. <\/span><span style=\"font-weight: 400;\">When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days and screen options cookies last for a year. If you select \"Remember Me\", your login will persist for two weeks. If you log out of your account, the login cookies will be removed. <\/span><span style=\"font-weight: 400;\">If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.<\/span>\r\n\r\n<strong>Using our contact forms\r\n<\/strong>If you use our contact forms, the content of the form is sent via Zoho through a Keri Systems generic mailer address, which is then forwarded to the relevant department to answer your query. By using the contact form you are accepting the risks associated with passing on the information provided between email addresses and any liabilities that may occur during transmission. All emails on the Keri Systems website require acceptance of our TOS &amp; Privacy Policy before sending.\r\n\r\n<b>Embedded content from other websites\r\n<\/b><span style=\"font-weight: 400;\">Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as on the other website. <\/span><span style=\"font-weight: 400;\">These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.<\/span>\r\n\r\n<b>Analytics<\/b>\r\n\r\n<strong>Google Analytics\r\n<\/strong><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> We use Google Analytics to analyze the use of our website. Google Analytics generates statistical and other information about website use by means of cookies, which are stored on users\u2019 computers. The information generated relating to our website is used to create reports about the use of the website. Google will store and use this information. Google\u2019s privacy policy is available at www.google.com\/privacypolicy.html.<\/span>\r\n\r\nPlease refer to the appropriate Google Analytics documentation for the specific type of data it collects. For more information on Google Analytics privacy policy please see <a href=\"https:\/\/policies.google.com\/privacy\"><span style=\"font-weight: 400;\">https:\/\/policies.google.com\/privacy<\/span><\/a>\r\n\r\n<span style=\"font-weight: 400;\"><strong>Activity Tracked:<\/strong> This feature sends page view events (and potentially video play events) over to Google Analytics for consumption. <\/span><span style=\"font-weight: 400;\">By default, WordPress does not share any personal data with anyone.<\/span>\r\n\r\n<strong>Hotjar: <\/strong><span style=\"font-weight: 400;\">As outlined above under \u201cWhat personal data do we collect and why do we collect it\u201d, it explains why Hotjar is used and how we use it. For more information on Hotjar's privacy policy please visit: <a href=\"https:\/\/www.hotjar.com\/legal\/policies\/privacy\/\">https:\/\/www.hotjar.com\/legal\/policies\/privacy\/\u00a0<\/a>\u00a0<\/span>\r\n\r\n<b>How long do we retain your data?\r\n<\/b><span style=\"font-weight: 400;\">As mentioned above in our \u201cContact forms\u201d section kerisys.com uses Zoho integration to display forms on our website, as well as store information regarding users who have submitted any form through this domain. All data submitted through Zoho forms on our website is stored indefinitely. <\/span><span style=\"font-weight: 400;\">For users that register on our website, we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (with the exception of changing their username). Website administrators can also see and edit that information. <\/span><span style=\"font-weight: 400;\">If you have an account on this site or have submitted any forms, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.<\/span> <span style=\"font-weight: 400;\">To contact us about your data please see the contact information in the below section titled \u201cOur contact information\u201d.<\/span>\r\n\r\n<b>Where do we send your data?\r\n<\/b><span style=\"font-weight: 400;\">As mentioned above we will always protect your data under any localized legislation or government law. Kerisys.com will only send your data to our Zoho Customer Relations platform for the use of storing your information securely. For more information on why we use Zoho forms please visit the above section \u201cContact forms\u201d. If you would like to learn more about Zoho and how they store data please visit: <\/span><a href=\"https:\/\/www.zoho.com\/privacy.html\"><span style=\"font-weight: 400;\">https:\/\/www.zoho.com\/privacy.html<\/span><\/a>\r\n\r\nIf you create an account to access our downloads center, the fields you complete when registering will be kept within a database and will associate them to your specific account and email registered address.\r\n\r\n<b>How does Keri Systems use this information?<\/b>\r\nThe information that you choose to provide directs us in how to contact you. We will respond to your comments and questions and, if requested, we will sign you up for our newsletters.\r\n\r\n<b>Does Keri Systems share information with any third parties?<\/b>\r\nKeri Systems only shares your contact information within the Keri family of dealers and distributors (the dealer or distributor that is best able to meet your needs). Keri does\u00a0<b>not<\/b>\u00a0share your contact information with any parties outside of the Keri family of dealers and distributors.\r\n\r\n<b>Our contact information\r\n<\/b> <span style=\"font-weight: 400;\">If you have any questions or concerns pertaining to our privacy policy, you may contact us through the following methods:<\/span>\r\nBy post:<span style=\"font-weight: 400;\">\u00a0302 Enzo Dr Suite 190, San Jose, CA 95138, United States<\/span>\r\n<span style=\"font-weight: 400;\">By email: <\/span><a href=\"mailto:webmaster@kerisys.com\"><span style=\"font-weight: 400;\">webmaster@kerisys.com<\/span><\/a>\r\n<span style=\"font-weight: 400;\">By phone: +18002605265<\/span>\r\n\r\nTo opt-out of email blasts, or to remove the information collected via submitting our webforms, please visit this page:\r\n<a href=\"https:\/\/kerisys.com\/unsubscribe\/\">https:\/\/kerisys.com\/unsubscribe\/<\/a>\r\n\r\nWe also offer the option to unsubscribe from any marketing\/promotional emails, within the footer on our marketing campaign emails. To unsubscribe, open an email from Keri Systems and press the 'Unsubscribe' link located at the bottom of the email.<b><\/b>\r\n\r\nWe protect your data <span style=\"font-weight: 400;\">and the processing of your personal data at <\/span><a href=\"https:\/\/kerisys.com\"><span style=\"font-weight: 400;\">www.kerisys.com<\/span><\/a><span style=\"font-weight: 400;\"> in line with the applicable data protection legislation of your localization or governing body. With this Privacy Statement, we wish to inform you of how your personal data is processed when you visit our website.<\/span>\r\n\r\n<b>Data breach procedures\r\n<\/b>In the event of a data breach, Keri Systems will inform any affected persons or registered users of kerisys.com within a 48 hour period of the breach being discovered.\r\n<span style=\"font-weight: 400;\">In the event that the policy is changed at any time, the date and nature of the change will be clearly indicated in this document. In the event that the change has a material impact on the handling of your personal information, we will contact you to inform you of the changes where appropriate.<\/span>\r\n\r\n<strong>For questions regarding our data protection policy, please contact<\/strong>\u00a0<strong>Ken Geiszler<\/strong>\r\nYou can use our contact form <a href=\"\/contact\/\">here.<\/a>\r\n\r\n<b>Source: Hotjar<\/b><b>\r\n<\/b><span style=\"font-weight: 400;\">We use Hotjar in order to better understand our users\u2019 needs and to optimize service and experience. Hotjar is a technology service that helps us better understand our users\u2019 experience (e.g. how much time they spend on which pages, which links they choose to click, what users do and don\u2019t like, etc). This enables us to build and maintain our service with user feedback. Hotjar uses cookies and other technologies to collect data on our users\u2019 behavior and their devices. This includes a device's IP address (processed during your session and stored in a de-identified form), device screen size, device type (unique device identifiers), browser information, geographic location (country only), and the preferred language used to display our website. Hotjar stores this information on our behalf in a pseudonymized user profile. Hotjar is contractually forbidden to sell any of the data collected on our behalf.<\/span> <span style=\"font-weight: 400;\">For further details, please see the \u2018About Hotjar\u2019 section of <\/span><a href=\"https:\/\/help.hotjar.com\/hc\/en-us\/categories\/115001323967-About-Hotjar\"><span style=\"font-weight: 400;\">Hotjar\u2019s support site<\/span><\/a><span style=\"font-weight: 400;\">.<\/span>\r\n\r\n<b>To see which cookies are used visit:<\/b><b> <\/b><a href=\"https:\/\/help.hotjar.com\/hc\/en-us\/articles\/115011789248-Hotjar-Cookies\"><span style=\"font-weight: 400;\">https:\/\/help.hotjar.com\/hc\/en-us\/articles\/115011789248-Hotjar-Cookies<\/span><\/a><b> <\/b>\r\n\r\n<b>Source: Zoho Inc<\/b> <b>Source: LiteSpeed-cache\r\n<\/b><span style=\"font-weight: 400;\">This site utilizes caching in order to facilitate a faster response time and better user experience. Caching potentially stores a duplicate copy of every web page that is on display on this site. All cache files are temporary and are never accessed by any third party, except as necessary to obtain technical support from the cache plugin vendor. Cache files expire on a schedule set by the site administrator, but may easily be purged by the admin before their natural expiration, if necessary. <\/span>\r\n\r\n<b><\/b><b>Jetpack Integration<\/b><b> <\/b><b> <\/b><b>Activity\r\n<\/b><span style=\"font-weight: 400;\">This feature only records the activities of a site\u2019s registered users and the retention duration of activity data will depend on the site\u2019s plan and activity type.<\/span>\r\n<span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> To deliver this functionality and record activities around site management, the following information is captured: user email address, user role, user login, user display name, WordPress.com, and local user IDs, the activity to be recorded, the WordPress.com-connected site ID of the site on which the activity takes place, the site\u2019s Jetpack version, and the timestamp of the activity. Some activities may also include the actor\u2019s IP address (login attempts, for example) and user agent.<\/span>\r\n<span style=\"font-weight: 400;\"><strong>Activity Tracked:<\/strong> Login attempts\/actions, post and page update and publish actions, comment\/pingback submission and management actions, plugin and theme management actions, widget updates, user management actions, and the modification of other various site settings and options. The retention duration of activity data depends on the site\u2019s plan and activity type. See the complete list of currently-recorded activities (along with retention information).\r\n<\/span><span style=\"font-weight: 400;\"><strong>Data Synced:<\/strong> Successful and failed login attempts, which will include the actor\u2019s IP address and user agent.<\/span>\r\n\r\n<b>Contact form\r\n<\/b><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> If Akismet is enabled on the site, the contact form submission data (IP address, user agent, name, email address, website, and message) is submitted to the Akismet service (also owned by Automattic) for the sole purpose of spam checking. The actual submission data is stored in the database of the site on which it was submitted and is emailed directly to the owner of the form (i.e. the site author who published the page on which the contact form resides). This email will include the submitter\u2019s IP address, timestamp, name, email address, website, and message.<\/span>\r\n<span style=\"font-weight: 400;\"><strong>Data Synced:<\/strong> Post and post metadata associated with a user\u2019s contact form submission. If Akismet is enabled on the site, the IP address and user agent originally submitted with the comment are synced as well, as they are stored in post meta.<\/span>\r\n\r\n<b>Jetpack Comments<\/b> <b>Mobile Theme\r\n<\/b><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> A visitor\u2019s preference for viewing the mobile version of a site.\r\n<\/span> <span style=\"font-weight: 400;\"><strong>Activity Tracked:<\/strong> A cookie (akm_mobile) is stored for 3.5 days to remember whether or not a visitor of the site wishes to view its mobile version.\u00a0<\/span>\r\n\r\n<b>Protect\r\n<\/b><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> In order to check login activity and potentially block fraudulent attempts, the following information is used: attempting user\u2019s IP address, attempting user\u2019s email address\/username (i.e. according to the value they were attempting to use during the login process), and all IP-related HTTP headers attached to the attempting user.<\/span>\r\n<span style=\"font-weight: 400;\"><strong>Activity Tracked:<\/strong> Failed login attempts (these include IP address and user agent). We also set a cookie (jpp_math_pass) for 1 day to remember if\/when a user has successfully completed a math captcha to prove that they\u2019re a real human.\u00a0<\/span>\r\n<span style=\"font-weight: 400;\"><strong>Data Synced:<\/strong> Failed login attempts, which contain the user\u2019s IP address, attempted username or email address, and user agent information.<\/span>\r\n\r\n<b>Search\r\n<\/b><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> Any of the visitor-chosen search filters and query data in order to process a search request on the WordPress.com servers.<\/span>\r\n<strong>Sharing <\/strong><span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> When official sharing buttons are active on the site, each button loads content directly from its service in order to display the button as well as information and tools for the sharing party. As a result, each service can in turn collect information about the sharing party. When a non-official Facebook or a Pinterest sharing button is active on the site, information such as the sharing party\u2019s IP address as well as the page URL will be available for each service, so sharing counts can be displayed next to the button. When sharing content via email (this option is only available if Akismet is active on the site), the following information is used: sharing party\u2019s name and email address (if the user is logged in, this information will be pulled directly from their account), IP address (for spam checking), user agent (for spam checking), and email body\/content. This content will be sent to Akismet (also owned by Automattic) so that a spam check can be performed. Additionally, if reCAPTCHA (by Google) is enabled by the site owner, the sharing party\u2019s IP address will be shared with that service. You can find Google\u2019s privacy policy here.<\/span>\r\n<strong>WhatsApp Button Block <\/strong><span style=\"font-weight: 400;\"><strong>Activity Tracked:<\/strong> We don\u2019t track any activity. For details of what WhatsApp tracks, refer to their Privacy Policy.<\/span>\r\n\r\n<b>WordPress.com Secure Sign On\r\n<\/b><span style=\"font-weight: 400;\">This feature is only accessible to registered users of the site with WordPress.com accounts.<\/span>\r\n<span style=\"font-weight: 400;\"><strong>Data Used:<\/strong> User ID (local site and WordPress.com), role (e.g. administrator), email address, username and display name. Additionally, for activity tracking (see below): IP address, WordPress.com user ID, WordPress.com username, WordPress.com-connected site ID and URL, Jetpack version, user agent, visiting URL, referring URL, timestamp of event, browser language, country code.<\/span>\r\n<span style=\"font-weight: 400;\"><strong>Activity Tracked:<\/strong> The following usage events are recorded: starting the login process, completing the login process, failing the login process, successfully being redirected after login, and failing to be redirected after login. Several functionality cookies are also set, and these are detailed explicitly in our Cookie documentation.<\/span>\r\n<span style=\"font-weight: 400;\"><strong>Data Synced:<\/strong> The user ID and role of any user who successfully signed in via this feature.<\/span>\r\n\r\n<b>To see further information regarding Jetpacks Privacy Policy please visit:<\/b><b> <\/b><a href=\"https:\/\/jetpack.com\/support\/privacy\/\"><b>https:\/\/jetpack.com\/support\/privacy\/<\/b><\/a>\r\n\r\n<strong>Consent\r\n<\/strong>We ask for consent on our contact forms, however, if the box is unticked, and you continue to submit we will assume your acceptance.\r\nBy continuing to use this website, you signify you understand and agree with this Privacy Policy.","_et_gb_content_width":"","footnotes":""},"is_legacy":[],"page_category":[],"class_list":["post-3","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/pages\/3","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/comments?post=3"}],"version-history":[{"count":0,"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/pages\/3\/revisions"}],"wp:attachment":[{"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/media?parent=3"}],"wp:term":[{"taxonomy":"is_legacy","embeddable":true,"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/is_legacy?post=3"},{"taxonomy":"page_category","embeddable":true,"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/page_category?post=3"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}