WHAT WE DO
IVIZONE provides businesses with an open Wi-Fi engagement platform that enhances Guest Wi-Fi access at venues.
We operate our Platform as online services. Only Ivizone developers have access to infrastruture, strong passwords enforce, password and credential rotation every 6 months.
WHAT WE COLLECT
Our Platform collects different types of information during your visit to a venue where our Customers are using our Platform:
- Mobile Location Detection Services
- Guest Wifi Services
HOW WE USE YOUR INFORMATION
We use your information in order to provide services to you and our Customers, to maintain operate our business, and to analyze our performance and business. Our Customers have access to most of the information we collect on their behalf. Their use of information is governed by their privacy policies and practices, and our Customers may direct us to share information we collect on their behalf with third parties. To understand what our Customers do with the information they receive from us or collect directly, please consult their privacy policies directly.
WHERE WE STORE YOUR INFORMATION
As of the date of this policy, we store information in Ireland. We may transfer your data from your own country to other countries in connection with storage and processing of data, fulfilling your requests and operating the services. Your data will not be transferred to a country or territory outside the EU.
HOW LONG WE RETAIN YOUR INFORMATION
To comply with the legislation, we retain the connexion logs on a syslog. We retain your information in its regular business records while you are a user of the services provided by our Customers. We also retain this information for 12 months after you are no longer a user or until it is no longer needed for the purposes for which it was collected.
SECURITY MEASURES WE USE
We take reasonable precautions to protect the safety and security of the information we collect and store. Once information is received by our online services, we generally encrypt it as it passes between our internal services, and to encrypt it when it is at rest. We also take steps, like employing firewalls and authentication, to safeguard your information and prevent unauthorized access to it.
HOW TO ACCESS THE INFORMATION
If you wish to access, correct, or delete the information about you, you may submit a request to email@example.com . If you provide us with sufficient information to identify you and verify your identity, we will use reasonable efforts to comply with your request.