We respect your privacy and information security, just as we value our own.
In this policy, we lay out: what data we collect and why; how your data is handled; and your rights to your data. We promise we never sell your data: never have, never will.
This policy applies to all products (the "Services") created and maintained by New Sloth (the "Company", "we", "our", "us"), delivered within a web browser, desktop application, mobile application, or another format.
We may update this policy as needed to comply with relevant regulations and reflect any new practices.
Our guiding principle is to collect only what we need. Here's what that means in practice:
When you sign up for our Services, we typically ask for identifying information such as your email address, personal and/or business name. That's just so you can personalize your new account, and we can send you invoices, updates, or other essential information. We sometimes also give you the option to add a profile picture that displays in our products, but we do not normally look at or access that picture. We'll never sell your personal info to third parties, and we won't use your name or company in marketing statements without your permission either.
When you pay for our Services, we ask for your credit card, and some times your billing country and/or address. That's so we can charge you for service, calculate taxes due, and send you invoices. Your credit card is passed directly to our payment processor, and it doesn't ever go through our servers. We store a record of the payment transaction, including the last 4 digits of the credit card number and as-of billing address, for account history, invoicing, and billing support. We store your billing country and/or address to calculate any sales tax due in Australia, to detect fraudulent credit card transactions, and to print on your invoices.
We log all access to all accounts by full IP address so that we can always verify no unauthorized access has happened. We keep this login data for as long as your product account is active.
We also log full IP addresses used to sign up a product account. We keep this record forever because they are used to mitigate spammy signups.
Web analytics data — described further in the Website Interactions section — are also tied temporarily to IP addresses to assist with troubleshooting cases. We blind all web analytics data after 30 days.
We do not use any third party web analytics software from our Services or their marketing webpages.
When you browse our marketing pages or applications, your browser automatically shares certain information such as which operating system and browser version you are using. We track that information, along with the pages you are visiting, page load timing, and which website referred you for statistical purposes like conversion rates and to test new designs. We sometimes track specific link clicks to help inform some design decisions. These web analytics data are tied to your IP address and user account if applicable and you are signed into our Services. We blind all of these individual identifiers after 30 days.
We do use persistent first-party cookies to store certain preferences, make it easier for you to use our applications, and support some in-house analytics. A cookie is a piece of text stored by your browser to help it remember your login information, site preferences, and more. You can adjust cookie retention settings in your own browser. To learn more about cookies, including how to view which cookies have been set and how to manage and delete them, please visit: www.allaboutcookies.org.
At this time, our sites and applications do not respond to Do Not Track beacons sent by browser plugins.
When you write us with a question or to ask for help, we keep that correspondence, including the email address, so that we have a history of past correspondences to reference if you reach out in the future.
We also store any information you volunteer like surveys. Sometimes when we do customer interviews, we may ask for your permission to record the conversation for future reference or use. We only do so if you give your express consent.
We don't collect any characteristics of protected classifications including age, race, gender, religion, sexual orientation, gender identity, gender expression, or physical and mental abilities or disabilities. You may provide these data voluntarily, such as if you include a pronoun preference in your email signature when writing into our Support team.
We also do not collect any biometric data. You are given the option to add a picture to your user profile, which could be a real picture of you or a picture of something else that represents you best. We do not extract any information from profile pictures: they are for your use alone.
Our default practice is to not access your information. The only times we'll ever access or share your info are:
To provide products or services you've requested. We do use some third-party services to run our applications and only to the extent necessary process some or all of your personal information via these third parties. These third party vendors act as subprocessors. Having subprocessors means we are using technology to access your data. We establish GDPR-compliant data processing agreements with each subprocessor, extending GDPR safeguards everywhere personal data is processed.
The following is a list of personal data subprocessors we use:
As a company, we also host a blog, and run occasional events virtually. If you voluntarily engage with us through those media, your personal information may also be collected by the following processors:
To help you troubleshoot or squash a software bug, with your permission. If at any point we need to access your account to help you with a Support case, we will ask for your consent before proceeding.
To investigate, prevent, or take action regarding restricted uses. Accessing a customer's account when investigating potential abuse is a measure of last resort. We have an obligation to protect the privacy and safety of both our customers and the people reporting issues to us. We do our best to balance those responsibilities throughout the process. If we do discover you are using our products for a restricted purpose, we will report the incident to the appropriate authorities.
When required under applicable law.
We are an Australian company and all data infrastructure are located in the U.S.
If Australian or U.S. law enforcement authorities have the necessary warrant, criminal subpoena, or court order requiring we share data, we have to comply. Otherwise, we flat-out reject requests from local and federal law enforcement when they seek data. And unless we're legally prevented from it, we'll always inform you when such requests are made. In the event a government authority outside Australia and U.S. approaches us with a request, our default stance is to refuse unless the Australian or U.S. government compels us to comply through procedures outlined in a mutual legal assistance treaty or agreement.
Similarly, if we receive a request to preserve data, we refuse unless compelled by the Australian or U.S. government. In these situations, we have to comply, and we will notify affected customers as soon as possible unless we are legally prohibited from doing so. We do not share preserved data unless absolutely required under a government law or compelled by a court order that we choose not to appeal. Furthermore, unless we receive a proper warrant, court order, or subpoena before the required preservation period expires, we destroy any preserved copies we made of customer data once the preservation period lapses.
If we get an informal request from any person, organization, or entity, we do not assist. If you are an account owner who wants to export data from their accounts, you can do so directly by following data export instructions from within the Services.
Our Services and other web properties are operated in the U.S. If you are located in the E.U. or elsewhere outside of the U.S., please be aware that any information you provide to us will be transferred to the U.S. By using our Site, participating in any of our services and/or providing us with your information, you consent to this transfer.
All data is encrypted via SSL/TLS when transmitted from our servers to your browser.
Data are not encrypted while they live in our database (since it needs to be ready to send to you when you need it), but we go to great lengths to secure your data at rest. For more information about how we keep your information secure, please see the 'Uptime, Security, and Privacy' section of our Terms of Service.
In many of our Services, we give you the option to delete data. Once you delete some data from your account, it's purged from the database, so it cannot be recovered in most cases. Retrieving data for a single account from a backup is cost-prohibitive and unduly burdensome.
We also delete your data after an account is cancelled. This applies both for cases when an account owner directly cancels and for auto-cancelled accounts. All of your content will be inaccessible from the Services immediately upon cancellation. To make account reactivation easier for you, your content will not be deleted unless specifically requested by you, in which case all content will be permanently deleted from active systems and logs. Within 90 days, all content will be permanently deleted from our backups. We cannot recover this information once it has been permanently deleted. Our Services may include instructions to export any data before your account is cancelled.
We apply the same data rights to all customers, regardless of their location. Currently some of the most privacy-forward regulations in place are the European Union's General Data Protection Regulation ("GDPR") and California Consumer Privacy Act ("CCPA") in the US. We recognize all of the rights granted in these regulations, except as limited by applicable law. These rights include:
Many of these rights can be exercised by signing in and directly updating your account information.
If you have questions about exercising these rights or need assistance, please contact us at email@example.com. For requests to delete personal information or know what personal information has been collected, we will first verify your identity using a combination of at least two pieces of information already collected including your user email address. If an authorized agent is corresponding on your behalf, we will first need written consent with a signature from the account holder before proceeding.