Black Tusk Privacy Policy

We value your privacy. At Black Tusk Software, we have a few fundamental principles:

  • We are thoughtful about the personal information we ask you to provide and the personal information that we collect about you through the operation of our services.
  • We store personal information for only as long as we have a reason to keep it.
  • We aim to make it as simple as possible for you to control what information is collected and shared with third parties.
  • We help protect you from overreaching government demands for your personal information.
  • We aim for full transparency on how we gather, use, and share your personal information.

Below is our Privacy Policy, which incorporates and clarifies these principles.

What This Policy Covers

This Privacy Policy applies to information that we collect about you when you use:

  • Our websites (including blacktusksoftware.com);
  • Our mobile applications (including DownCount, Enero, and Flannel);
  • Our other products and services that are available on or through our websites; and

Throughout this Privacy Policy we’ll refer to our website, mobile applications and other products and services collectively as “Services.” Please note that this Privacy Policy does not apply to any of our products or services that have a separate privacy policy. Below we explain how we collect, use, and share information about you, along with the choices that you have with respect to that information.

Creative Commons Sharealike License

This Privacy Policy is modified from the policy published by Automattic which is available at Github. This Privacy Policy is available under a Creative Commons Sharealike license. You’re more than welcome to copy it, adapt it, and repurpose it for your own use. Just make sure to revise the language so that your policy reflects your actual practices. Also, if you do use the policy we’d appreciate a credit and link to Black Tusk Software somewhere on your site.

Information We Collect

We only collect information about you if we have a reason to do so–for example, to provide our Services, to communicate with you, or to make our Services better. We collect information in three ways: if and when you provide information to us, automatically through operating our Services, and from outside sources. Let’s go over the information that we collect.

Information You Provide to Us

The amount and type of information depends on the context and how we use the information. Here are some examples:

  • Content Information: Depending on the Services you use, you may also provide us with information about you in the content you create (such as your countdowns in DownCount or your tasks in Flannel).
  • Credentials: Depending on the Services you use, you may provide us with login credentials for your account (like username and password).
  • Communications With Us: You may also provide us information when you respond to surveys, register to mailing lists or newsletters, communicate with us via our support services, or send emails to our team members.

Information We Collect Automatically

We also collect some information automatically:

  • Log Information: Like most online service providers, we collect information that web browsers, mobile devices, and servers typically make available, such as the browser type, IP address, unique device identifiers, language preference, referring site, the date and time of access, operating system, and mobile network information. We collect log information when you use our Services–for example, when a mobile application crashes or encounters other types of errors.
  • Usage Information: We collect information about your usage of our Services. For example, we collect information about the actions that you take while using our mobile applications. We use this information to, for example, provide our Services to you, as well as get insights on how people use our Services, so we can make our Services better.
  • Location Information: We may determine the approximate location of your device from your IP address. We collect and use this information to, for example, calculate how many people visit our Services from certain geographic regions. We may also collect information about your precise location via our mobile apps if you allow us to do so through your mobile device operating system’s permissions.
  • Stored Information: We may access information stored on your mobile device via our mobile app. We access this stored information through your device operating system’s permissions. For example, if you give us permission to access the photographs on your mobile device’s camera roll, our Services may access the photos stored on your device when you upload a photograph.
  • Information from Cookies & Other Technologies: A cookie is a string of information that a website stores on a visitor’s computer, and that the visitor’s browser provides to the website each time the visitor returns. Pixel tags (also called web beacons) are small blocks of code placed on websites and emails. Black Tusk Software may use cookies and other technologies like pixel tags to help us identify and track visitors, usage, and access preferences for our Services, as well as track and understand email campaign effectiveness and to deliver targeted ads.

Information We Collect from Other Sources

We do not collect information from other sources.

How And Why We Use Information

Purposes for Using Information

We use information about you as mentioned above and for the purposes listed below:

  • To provide our Services–for example, to set up and maintain your account, display your countdowns or tasks, or display ratings and reviews for applications you are tracking;
  • To further develop and improve our Services–for example by adding new features that we think our users will enjoy;
  • To monitor and analyze trends and better understand how users interact with our Services, which helps us improve our Services and make them easier to use;
  • To measure, gauge, and improve the effectiveness of our advertising, and better understand user retention and attrition.
  • To monitor and prevent any problems with our Services, protect the security of our Services, detect and prevent fraudulent transactions and other illegal activities, fight spam, and protect the rights and property of Black Tusk Software and others, which may result in us declining a transaction or the use of our Services;
  • To communicate with you, for example through an email, about offers and promotions offered by Black Tusk Software and others we think will be of interest to you, solicit your feedback, or keep you up to date on Black Tusk Software and our products; and
  • To personalize your experience using our Services, provide content recommendations (for example, suggesting recommended countdowns) target our marketing messages to groups of our users (for example, those who have a particular plan with us or have been our user for a certain length of time), and serve relevant advertisements.

A note here for those in the European Union about our legal grounds for processing information about you under EU data protection laws, which is that our use of your information is based on the grounds that: (1) The use is necessary in order to fulfill our commitments to you under our Terms of Service or other agreements with you or is necessary to administer your account; or (2) The use is necessary for compliance with a legal obligation; or (3) The use is necessary in order to protect your vital interests or those of another person; or (4) We have a legitimate interest in using your information--for example, to provide and update our Services, to improve our Services so that we can offer you an even better user experience, to safeguard our Services, to communicate with you, to measure, gauge, and improve the effectiveness of our advertising, and better understand user retention and attrition, to monitor and prevent any problems with our Services, and to personalize your experience; or (5) You have given us your consent.

Sharing Information

How We Share Information

We do not sell our users’ private personal information. We share information about you in the limited circumstances spelled out below and with appropriate safeguards on your privacy:

  • Subsidiaries, Employees, and Independent Contractors: We may disclose information about you to our subsidiaries, our employees, and individuals who are our independent contractors that need to know the information in order to help us provide our Services or to process the information on our behalf. We require our subsidiaries, employees, and independent contractors to follow this Privacy Policy for personal information that we share with them.
  • Third Party Vendors: We may share information about you with third party vendors who need to know information about you in order to provide their services to us, or to provide their services to you or your site. This group includes vendors that help us provide our Services to you (like postal and email delivery services that help us stay in touch with you, customer chat and email support services that help us communicate with you), those that assist us with our marketing efforts (e.g. by providing tools for identifying a specific marketing target group or improving our marketing campaigns), and those that help us understand and enhance our Services (like analytics providers). We require vendors to agree to privacy commitments in order to share information with them.
  • Legal Requests: We may disclose information about you in response to a subpoena, court order, or other governmental request.
  • To Protect Rights, Property, and Others: We may disclose information about you when we believe in good faith that disclosure is reasonably necessary to protect the property or rights of Black Tusk Software, third parties, or the public at large. For example, if we have a good faith belief that there is an imminent danger of death or serious physical injury, we may disclose information related to the emergency without delay.
  • Business Transfers: In connection with any merger, sale of company assets, or acquisition of all or a portion of our business by another company, or in the unlikely event that Black Tusk Software goes out of business or enters bankruptcy, user information would likely be one of the assets that is transferred or acquired by a third party. If any of these events were to happen, this Privacy Policy would continue to apply to your information and the party receiving your information may continue to use your information, but only consistent with this Privacy Policy.
  • With Your Consent: We may share and disclose information with your consent or at your direction. For example, we may share your information with third parties with which you authorize us to do so, such as the social media services you share to using our mobile applications.
  • Aggregated or De-Identified Information: We may share information that has been aggregated or reasonably de-identified, so that the information could not reasonably be used to identify you. For instance, we may publish aggregate statistics about the use of our Services and we may share a hashed version of your email address to facilitate customized ad campaigns on other platforms.
  • Published Support Requests: And if you send us a request (for example, via a support email or one of our feedback mechanisms), we reserve the right to publish that request in order to help us clarify or respond to your request or to help us support other users.

Information Shared Publicly

Information that you choose to make public is disclosed publicly. Public information may also be indexed by search engines or used by third parties. Please keep all of this in mind when deciding what you would like to share.

How Long We Keep Information

We generally discard information about you when we no longer need the information for the purposes for which we collect and use it--which are described in the section above on How and Why We Use Information--and we are not legally required to continue to keep it. For example, we keep the web server logs that record information about a visitor to one of Black Tusk Software’s websites, such as the visitor’s IP address, browser type, and operating system, for approximately 30 days. We retain the logs for this period of time in order to, among other things, analyze traffic to Black Tusk Software’s websites and investigate issues if something goes wrong on one of our websites.

Security

While no online service is 100% secure, we work very hard to protect information about you against unauthorized access, use, alteration, or destruction, and take reasonable measures to do so, such as monitoring our Services for potential vulnerabilities and attacks.

Choices

You have several choices available when it comes to information about you:

  • Limit the Information that You Provide: Please keep in mind that if you do not provide some information, certain features of our Services may not be accessible.
  • Limit Access to Information On Your Mobile Device: Your mobile device operating system should provide you with the ability to discontinue our ability to collect stored information or location information via our mobile apps. If you do so, you may not be able to use certain features.
  • Opt-Out of Electronic Communications: You may opt out of receiving promotional messages from us. Just follow the instructions in those messages. If you opt out of promotional messages, we may still send you other messages, like those about your account and legal notices.
  • Set Your Browser to Reject Cookies: At this time, Black Tusk Software does not respond to “do not track” signals across all of our Services. However, you can usually choose to set your browser to remove or reject browser cookies before using Black Tusk Software’s websites, with the drawback that certain features of Black Tusk Software’s websites may not function properly without the aid of cookies.
  • Close Your Account: While we’d be very sad to see you go, if you no longer want to use our Services you can contact our support team for instructions on how to close any accounts you have with Black Tusk Software. Please keep in mind that we may continue to retain your information after closing your account, as described in How Long We Keep Information above--for example, when that information is reasonably needed to comply with (or demonstrate our compliance with) legal obligations such as law enforcement requests, or reasonably needed for our legitimate business interests.

Your Rights

If you are located in certain countries, including those that fall under the scope of the European General Data Protection Regulation (AKA the “GDPR”), data protection laws give you rights with respect to your personal data, subject to any exemptions provided by the law, including the rights to:

  • Request access to your personal data;
  • Request correction or deletion of your personal data;
  • Object to our use and processing of your personal data;
  • Request that we limit our use and processing of your personal data; and
  • Request portability of your personal data.

You can usually access, correct, or delete your personal data using your account settings and tools that we offer, but if you aren’t able to do that, or you would like to contact us about one of the other rights, scroll down to How to Reach Us to, well, find out how to reach us. EU individuals also have the right to make a complaint to a government supervisory authority.

Controllers and Responsible Companies

Black Tusk Software Inc. 545 60th Ave West Vancouver, BC V6P 1Z8

How to Reach Us

If you have a question about this Privacy Policy, or you would like to contact us about any of the rights mentioned in the Your Rights section above, please contact us.

Other Things You Should Know (Keep Reading!)

Transferring Information

Because Black Tusk Software’s Services are offered worldwide, the information about you that we process when you use the Services in the EU may be used, stored, and/or accessed by individuals operating outside the European Economic Area (EEA) who work for us, other members of our group of companies, or third party data processors. This is required for the purposes listed in the How and Why We Use Information section above. When providing information about you to entities outside the EEA, we will take appropriate measures to ensure that the recipient protects your personal information adequately in accordance with this Privacy Policy as required by applicable law.

Ads and Analytics Services Provided by Others

Ads appearing on any of our Services may be delivered by advertising networks. Other parties may also provide analytics services via our Services. These ad networks and analytics providers may set tracking technologies (like cookies) to collect information about your use of our Services and across other websites and online services. These technologies allow these third parties to recognize your device to compile information about you or others who use your device. This information allows us and other companies to, among other things, analyze and track usage, determine the popularity of certain content, and deliver advertisements that may be more targeted to your interests. Please note this Privacy Policy only covers the collection of information by Black Tusk Software and does not cover the collection of information by any third party advertisers or analytics providers.

Visitors to Our Users’ Websites

We also process information about visitors to our users’ websites, on behalf of our users and in accordance with our user agreements. Please note that our processing of that information on behalf of our users for their websites isn’t covered by this Privacy Policy. We encourage our users to post a privacy policy that accurately describes their practices on data collection, use, and sharing of personal information.

Privacy Policy Changes

Although most changes are likely to be minor, Black Tusk Software may change its Privacy Policy from time to time. Black Tusk Software encourages visitors to frequently check this page for any changes to its Privacy Policy. If we make changes, we will notify you by revising the change log below, and, in some cases, we may provide additional notice (such as sending you a notification through email). Your further use of the Services after a change to our Privacy Policy will be subject to the updated policy. That’s it! Thanks for reading.