Last Updated: [Date]
1. Introduction
This privacy policy explains how Reddio collect, use, disclose, and safeguard your information when you visit our website and use our services, including any media, software, tools, features, or functionality associated with our Layer 2 solutions and developer dashboard.
2. Information Collection
- Information You Provide:
- Personal Identification Information: Name, email address, mailing address, phone number, etc., when you register on our site or subscribe to our services.
- Payment Information: Credit card numbers or other payment details for transaction processing.
- Content Data: Any content you provide within our services, such as code snippets, project details, or feedback.
- Automated Information Collection:
- Log Data: Details of your visits to our website (e.g., traffic data, location data, weblogs, and other communication data).
- Device Information: Information about your computer or mobile device, such as your IP address, operating system, and browser type.
- Cookies and Tracking Technologies:
- We use cookies, beacons, tags, and scripts to analyze trends, administer the website, track users’ movements around the site, and gather demographic information about our user base.
3. Use of Information
- To provide, maintain, and improve our services.
- To personalize user experience.
- For internal research and development purposes.
- To process transactions and send periodic emails regarding your order or other products and services.
- For compliance with our legal obligations, resolution of disputes, and enforcement of our agreements.
4. Disclosure of Information
- To trusted third parties who assist us in operating our website, conducting our business, or serving our users.
- For legal purposes, such as to comply with a subpoena, or similar legal process.
- In case of a merger, acquisition, or sale of all or a portion of our assets, users will be notified via email and/or a prominent notice on our website of any change in ownership or uses of their personal information.
5. Data Security
- We use appropriate security measures to protect against unauthorized access, alteration, disclosure, or destruction of your personal information.
- However, no method of transmission over the Internet, or method of electronic storage, is 100% secure.