In accordance with Section 222 of the Communications Act and the Federal Communications
Commission’s (“FCC”) Protecting Customer Information Rules (47 C.F.R. § 64.2001, et seq.), Audian has established the policies and procedures outlined below for collecting, accessing, using, and storing Customer Proprietary Information (“Customer PI”).
Customer PI is certain customer information obtained by a telecommunications provider during the course of providing telecommunications services to a customer. Customer PI includes (i) individually identifiable customer proprietary network information (“CPNI”); (ii) personally identifiable information (“PII”); and (iii) the content of communications.
i. CPNI refers to information relating to the quantity, technical configuration, type, destination, location, and amount of use of a telecommunications service subscribed to by any customer of a telecommunications carrier. Examples of CPNI include information typically available from telephone-related details on a monthly bill such as the types of services purchased by a customer, numbers called, duration of calls, directory-assistance charges, calling patterns, call detail information, web browsing history, application usage history, and the functional equivalents, geo-location information, IP addresses and domain name information, MAC addresses and other device identifiers, traffic statistics, port information, customer premises equipment and other customer-device information.
ii. PII refers to any information that is linked or reasonably linkable to an individual or device. Examples of PII include name, physical address, e-mail address, telephone number, other physical or online contact information, date of birth, Social Security Number, government-issued identifiers, financial information, unique device identifiers, IP addresses, and persistent or unique advertising identifiers.
iii. Content of communications refers to any part of the substance, purport or meaning of a communication. Examples of content of communications include the text of an email or instant message, streaming video content, audiovisual content from a video chat, maps from a ride-share app, application header, communications on social media, search terms, website comments, items in shopping carts, application payload of an IP packet, and voice recordings.
Audian may collect all the types of Costumer PI described above in connection with the contracting and provision of the telecommunications services it provides to its customers, as well as when its customers communicate with Audian. The collection may occur either directly from you or from your use of the Audian services.
It is the policy of Audian not to use Customer PI for any activity other than that permitted by applicable law and in accordance with your choice. The Customer PI collected by Audian is disclosed, accessed and used exclusively for the following purposes:
We also use this Customer PI to better understand your needs and interests, to improve our service, and to personalize communications.
Audian may share Customer PI to other parties, such as affiliates, vendors and agents, when necessary to conduct a legitimate business activity related to the services provided by Audian to you and in connection with the purposes indicated in this Notice. Audian may disclose your personal information to third-parties under any of the following circumstances:
Audian does not market or sell Customer PI information to any third party.
Audian will not use, disclose, or permit access to Customer PI without the approval of a customer to the extent required by applicable law. By contracting with Audian and using the telecommunications services provided by it, Customer agrees that Audian may use Customer PI indicated as provided for in this Privacy Notice and for the purposes detailed herein.
If the Customer does not agree or at any time desires to withdraw or limit the approval for Audian to use Customer PI pursuant to this Privacy Notice, Customer may opt-out at any time to the extent allowed by law by contacting us at:
A Customer’s denial or withdrawal of approval to use, disclose, or permit access to Customer PI will not affect the provision of any telecommunications services of which he or she is a customer.
Any grant, denial or withdrawal of approval for the use, disclosure, or permission of access to Customer PI is valid and will remain in effect until the customer affirmatively revokes such grant, denial, or withdrawal, and Audian hereby informs the customer of their right to deny or withdraw access to such Customer PI at any time.
Audian does not and will not collect or use any sensitive Customer PI for which it requires customer approval without first obtaining opt-in approval to the extent such approval is required by law.
Audian follows reasonable data security practices to prevent unauthorized use, disclosure or access to Customer PI. However, Audian cannot guarantee that these practices will prevent every unauthorized attempt to access, use, or disclose Customer PI.
Audian will notify affected customers of any breach without unreasonable delay and in any event no later than 30 calendar days after it reasonably determines that a breach has occurred, subject to law enforcement needs, unless Audian can reasonably determine that no harm to customers is reasonably likely to occur as a result of the breach.
Audian will notify the FCC of any breach affecting 5,000 or more customers no later than 7 business days after reasonably determining that a breach has occurred and at least 3 business days before notification to the affected customers, unless Audian can reasonably determine that no harm to customers is reasonably likely to occur as a result of the breach. Audian will notify the FCC of any breach affecting fewer than 5,000 customers without unreasonable delay and no later than 30 calendar days after it reasonably determines that a breach has occurred, unless Audian can reasonably determine that no harm to customers is reasonably likely to occur as a result of the breach.
Audian will notify the Federal Bureau of Investigation (FBI) and the U.S. Secret Service (Secret Service) of a breach that affects 5,000 or more customers no later than 7 business days after Audian reasonably determines that such a breach has occurred and at least 3 business days before notification to the affected customers, unless Audian can reasonably determine that no harm to customers is reasonably likely to occur as a result of the breach.
Audian shall maintain records of discovered breaches for a period of at least two years.
Clear GIFs are tiny graphics with a unique identifier, similar in function to cookies. In contrast to cookies, which are stored on your computer’s hard drive, clear GIFs are embedded invisibly on web pages. We, or our service providers, may use clear GIFs (a.k.a. web beacons, web bugs or pixel tags), in connection with our websites to, among other things, track the activities of website visitors, help us manage content, and compile statistics about website usage.
We, and our service providers, also use clear GIFs in HTML e-mails to our customers, to help us track e-mail response rates, identify when our e-mails are viewed, and track whether our e-mails are forwarded.
TYPES OF DATA COLLECTED AND DEVICE PERMISSIONS
Among the types of Personal Data that the Audian UC app collects, by itself or through third parties, there are: Usage Data; Contacts permission; Camera permission; Precise location permission (non-continuous); Microphone permission; Phone permission; Storage permission; geographic position; Data communicated while using the service; app information; device logs; device information.
Personal Data may be freely provided by the User, or, in the case of Usage Data, collected automatically when using the Audian UC app.
Unless specified otherwise, all Data requested by Audian UC app is mandatory and failure to provide this Data may make it impossible for Audian, Inc to provide its services. Users who are uncertain about which Personal Data is mandatory are welcome to contact us at any time.
Depending on the User's specific device, the Audian UC app may request certain permissions that allow it to access the User's device Data as described below.
Used for accessing the camera or capturing images and video from the device.
Used for accessing contacts and profiles on the User's device, including the changing of entries.
Used for accessing and recording microphone audio from the User's device.
Used for accessing a host of typical features associated with telephony. This enables, for instance, read-only access to the “phone state”, which means it enables access to the phone number of the device, current mobile network information, or the status of any ongoing calls.
Precise location permission (non-continuous)
Used for accessing the User's precise device location to allow users to share their location with other users.
The geographic location of the User is determined in a manner that isn't continuous. This means that it is impossible for the Audian UC app to derive the exact position of the User on a continuous basis.
Used for accessing shared external storage, including the reading and adding of any items.