Privacy

Collection of information
The person responsible for the processing of personal data is Wisibility Sagl from now on referred to as the Referent.
The Contact person collects different types of information for operational efficiency and to provide the customer with the best products and services and the best possible use experience. Some of this information is provided directly by the user. Others are generated by observing how the user interacts with products and services. Still others are available from other sources that could be combined with data collected directly. Regardless of their sources, the Referrer believes that the important thing is to treat the information carefully to ensure that the privacy of the user is respected. Information is collected that reveals the user's interaction with the services, including the browser used, the IP address, the location, cookies or other unique identifier, the pages visited and the functions used. When personal information is requested, it is possible to refuse. If this information is not provided, some features or services may not be usable. Method of collection: Different methods and technologies are adopted to collect information relating to the user's use of sites and services, such as: Web forms, such as when the user enters information in a form for registration or when inserting a search string in a special box. Technologies like cookies.

How to use personal information
The Contact Person uses the information collected to make the products and services offered work, improve and personalize. For example, the services of other companies may be used to help the Referrer to geographically locate the user starting from the IP address to customize certain services available in the user's area of residence. This information may also be used to communicate with the user, informing him, for example, of an expiring subscription, the availability of security updates or actions to be taken to maintain an active account.

Reasons for sharing personal information
Personal information is shared with permission. The Contact Person can share information with or disclose information to other subsidiaries and affiliates controlled by the Contact Person and with suppliers or agents working on behalf of the Referrer. For example, companies commissioned by the Contact to provide support to customer support or to help protect systems and services, may need to access personal information to offer certain features. In these cases, companies must comply with the privacy requests of the contact person's data and are not authorized to use the information for any other purpose. The disclosure of personal information may also be used in the case of commercial transactions such as the merger or sale of assets. Finally, the Contact Person can access, disclose and store personal information, including private content (such as e-mail content, other private communications or files in private folders) when he believes in good faith that it is necessary to: respect the law in force or to respond to valid legal proceedings by the competent authorities, including law enforcement and government agencies; protect customers, for example to prevent unwanted mail or attempts to fraud users of the services or to help prevent the loss of lives or serious injuries to people; apply and maintain the security of services, including preventing or blocking an attack on systems or networks; or protect the rights or property of the Referent, how to enforce the terms governing the use of the services; however, if the Referrer receives information indicating the use by third parties of his services to circulate stolen intellectual or physical property, he will not analyze the private contents of the customers independently, but could refer to the judicial authorities. Some of the sites or services include links to third-party sites or services that provide privacy notices other than those of the Referrer. If personal information is sent to one of these sites or services, the information is governed by the privacy policies of these third parties.

Communication preferences
If you receive unsolicited promotional e-mails, you can contact them via e-mail to avoid receiving them in the future.

Location based services
If the user uses a location-based service or function, data on the available cell, data on the Wi-Fi network and GPS data could be sent to the Contact Person. The Contact person uses the location information to provide the user with the services requested, customize the experience and improve the products and services. Some services may allow you to check when such location information is sent to the Referrer or made available to third parties. In some cases, the location information is essential for the service and may require the uninstallation of the function or the interruption of the service, should the user intend to interrupt the sending of localization information. Refer to the documentation provided with the device for information on how to disable the localization features.

Other important privacy information
Below you can find more privacy information that you might find important. In particular, common procedures are described for the sector, but the Contact Person believes that each user is aware of them. Keep in mind that this information does not represent a complete description of the procedures; it is just a supplement to the more specific information contained in another part of this privacy statement. The Contact person undertakes to protect the security of users' personal information. To protect personal information from unauthorized access, use or disclosure, various technologies and protection procedures are used. The transmission of extremely confidential data (such as the password or credit card number) on the Internet is protected by encryption, for example with the SSL (Secure Socket Layer) protocol. The password used to protect the user's accounts and personal information must be carefully stored by the user in order to ensure their secrecy. Do not share the password. If you share computer access, it is advisable to always log off, before leaving a site or service, in order to protect access to information by users who will later use the computer.

Where information is stored and processed
The personal information collected on the sites and services will be stored and processed in the countries where the Referrer, its affiliates, associates or service providers are located. The Contact person can keep personal information for various reasons, such as meeting legal obligations, resolving disputes, enforcing agreements and, when necessary, providing services.

Changes to privacy notices
The privacy policies may be periodically updated, in order to respond to customer requests and changes to our services. In the event of changes to a report, the date of the "last update" at the top of the document is changed. In the event of substantial changes to the information or if the Contact person decides to change the way in which personal information is used, such changes will be published visibly before they take effect, or they will be notified directly to the user. It is advisable to regularly review the privacy policy for the products and services used, in order to know how to protect the information adopted by the Contact Person.