Spike Telecom Privacy Policy
This Privacy Policy describes how we collect and use your personal information in relation to Spike websites, applications, products, services, events, and experiences that reference this Privacy Policy (together, “Spike Offerings”).
Personal Information We Collect
We collect your personal information in the course of providing Spike Offerings to you.
Here are the types of information we gather:
- Information You Give Us: We collect any information you provide in relation to Spike Offerings.
- Automatic Information: We automatically collect certain types of information when you interact with Spike Offerings.
- Information from Other Sources: We might collect information about you from other sources, including service providers, partners, and publicly available sources.
How We Use Personal Information
We use your personal information to operate, provide, and improve Spike Offerings. Our purposes for using personal information include:
- Provide Spike Offerings: We use your personal information to provide and deliver Spike Offerings and process transactions related to Spike Offerings, including registrations, subscriptions, purchases, and payments.
- Measure, Support, and Improve Spike Offerings: We use your personal information to measure use of, analyze performance of, fix errors in, provide support for, improve, and develop Spike Offerings.
- Recommendations and Personalization: We use your personal information to recommend Spike Offerings that might be of interest to you, identify your preferences, and personalize your experience with Spike Offerings.
- Comply with Legal Obligations: In certain cases, we have a legal obligation to collect, use, or retain your personal information.
- Communicate with You: We use your personal information to communicate with you in relation to Spike Offerings via different channels (e.g., by phone, email, chat) and to respond to your requests.
- Marketing: We use your personal information to market and promote Spike Offerings.
- Fraud and Abuse Prevention and Credit Risks: We use your personal information to prevent and detect fraud and abuse in order to protect the security of our customers, Spike, and others. We may also use scoring methods to assess and manage credit risks.
- Purposes for Which We Seek Your Consent: We may also ask for your consent to use your personal information for a specific purpose that we communicate to you.
How We Share Personal Information
Information about our customers is an important part of our business and we are not in the business of selling our customers’ personal information to others. We share personal information only as described below and with Spike Telecom LLC. and the affiliates that Spike Telecom LLC. controls that are either subject to this Privacy Policy or follow practices at least as protective as those described in this Privacy Policy.
- Transactions Involving Third Parties:We make available to you services, software, and content provided by third parties for use on or through Spike Offerings. You can tell when a third party is involved in your transactions, and we share information related to those transactions with that third party. For example, you can order services, software, and content from sellers using the Spike Marketplace and we provide those sellers information to facilitate your subscription, purchases, or support.
- Third-Party Service Providers: We employ other companies and individuals to perform functions on our behalf. Examples include: delivering Spike hardware, sending communications, processing payments, assessing credit and compliance risks, analyzing data, providing marketing and sales assistance (including advertising and event management), conducting customer relationship management, and providing training. These third-party service providers have access to personal information needed to perform their functions, but may not use it for other purposes. Further, they must process that information in accordance with this Privacy Policy and as permitted by applicable data protection law.
- Business Transfers: As we continue to develop our business, we might sell or buy businesses or services. In such transactions, personal information generally is one of the transferred business assets but remains subject to the promises made in any pre-existing Privacy Policy (unless, of course, the individual consents otherwise). Also, in the unlikely event that Spike or substantially all of its assets are acquired, your information will of course be one of the transferred assets.
- Protection of Us and Others: We release account and other personal information when we believe release is appropriate to comply with the law, enforce or apply our terms and other agreements, or protect the rights, property, or security of Spike, our customers, or others. This includes exchanging information with other companies and organizations for fraud prevention and detection and credit risk reduction.
- At Your Option: Other than as set out above, you will receive notice when personal information about you might be shared with third parties, and you will have an opportunity to choose not to share the information.
How We Secure Information
At Spike, security is our highest priority. We design our systems with your security and privacy in mind.
- We maintain a wide variety of compliance programs that validate our security controls.
- We protect the security of your information during transmission to or from Spike websites, applications, products, or services by using encryption protocols and software.
- We follow the Payment Card Industry Data Security Standard (PCI DSS) when handling credit card data.
We maintain physical, electronic, and procedural safeguards in connection with the collection, storage, and disclosure of personal information. Our security procedures mean that we may request proof of identity before we disclose personal information to you.
Cookies
To enable our systems to recognize your browser or device and to provide, market, and improve Spike Offerings, we and approved third parties use cookies and other identifiers.
Children’s Personal Information
We don’t provide Spike Offerings for purchase by children. If you’re under 18, you may use Spike Offerings only with the involvement of a parent or guardian.
Third Party Sites and Services
Spike Offerings may embed content provided by others or include links to other websites and applications. These companies may collect information about you when you interact with their content or services. We are not responsible for the practices of these companies. Please consult their privacy policies to learn about their data practices.
Retention of Personal Information
We keep your personal information to enable your continued use of Spike Offerings, for as long as it is required in order to fulfill the relevant purposes described in this Privacy Policy, as may be required by law (including for tax and accounting purposes), or as otherwise communicated to you. How long we retain specific personal information varies depending on the purpose for its use, and we will delete your personal information in accordance with applicable law.
How to contact us
If you have any questions about Our Company’s privacy policy, the data we hold on you, or you would like to exercise one of your data protection rights, please do not hesitate to contact us.
Email: [email protected]
Website: Contact Us
Address: 30 N Gould St, STE 4000, Sheridan, WY 82801
Last updated: Aug 28, 2023