Privacy Policy

We are committed to maintain your confidence and trust, and strictly comply with this Privacy Policy in our business practices.


What information we collect


Information collected by FastSpring
The FastSpring online store collects personally identifiable information when you purchase our products from them. Every FastSpring order asks for personally identifiable information such as your name, contact information, and payment information. The use of the personally identifiable information collected by FastSpring is subject to FastSpring's Privacy Policy, which can be found at http://www.fastspring.com/privacy.php. FastSpring only shares the personally identifiable information that is required to complete the order.

The FastSpring Online Store uses Secure Sockets Layer (SSL) encryption on all web pages where personally identifiable information is required. To make purchases from the FastSpring Online Store, you must use an SSL-enabled browser such as Safari or Firefox. Doing so protects the confidentiality of your personal and credit card information while it's transmitted over the Internet.

Information collected by Apple
The iTunes App Store collects personally identifiable information when you purchase our products from them. Every iTunes order asks for personally identifiable information such as your name, contact information, and payment information. The use of the personally identifiable information collected by Apple is subject to Apple's Privacy Policy, which can be found at http://www.apple.com/legal/privacy. Apple does not share personally identifiable information with app developers.

Information collected during recovery (Undercover)
The main purpose of our products is to track, recover and retrieve the stolen computer or iPhone. The recovery process implies the gathering of information about the stolen device. This information includes the internal and external IPs of the stolen computer, screenshots and snapshots if an iSight is available on the stolen device. The information collected is relayed to our Monitoring Center and is intended to be used with a high level of care and confidentiality. Only third parties who are directly involved in the recovery of the stolen Mac have access to this collected information.


How we may use collected information

We use personally identifiable information collected by FastSpring to provide you with the license key information in case of accidental loss or deletion. In addition, this personally identifiable information is used to keep you posted on the latest releases or updates of our products. We will disclose theft-related information such as the snapshots, screenshots and other relevant information collected during the recovery period:

  1. To the rightful owner of the stolen device;
  2. To the local authority such as the police officer who is investigating the case;
  3. To the internet provider of the supposedly unauthorized user.

The disclosure to the above mentioned parties is essential to the recovery of the stolen computer or iPhone.


When we begin and discontinue to collect information (Undercover)

We only begin to collect and screen information such as snapshots, screenshots, internal and external IPs when the customer files the theft claim and confirms the validity of his claim. Under no circumstances do we collect and screen our customers' data other than for the recovery purposes. If a Mac has not been stolen, no identifying information is being transferred from the computer to our server. As soon as the stolen computer returns to the rightful owner, we remove his Undercover ID from our Global Undercover Tracking System, disrupting any further collection and screening of data.


When we begin and discontinue to collect information (Witness)

Photos and videos obtained by the Witness software are stored for 2 months on our server, they are then deleted automatically. Photos and video that are removed manually by the user are also immediately removed from the server.


Release of Information to Third Parties

We will not rent, sell or share any of your personal information or information collected during recovery to third parties in the normal course of doing business and only share your information with third parties who are directly involved in the recovery of the stolen computer as described in this policy. We also establish and maintain reasonable physical, electronic and administrative safeguards to protect the confidentiality, security and integrity of data stored on our internal computer systems located in Belgium and our server. When the recovery of the stolen computer is completed, we remove this information from our server and archive it in our internal computer systems.


Integrity of your personal information

We encourage our customers to update their personally identifiable information at any time. This helps us ensure that the information is accurate and up to date. To correct or update personally identifiable information, please email us at privacy@orbicule.com.


Cookies

Cookies are small text files of information that are created by the Orbicule server and that are placed on your hard drive. Cookies make it possible for Orbicule to ease the browsing of our website http://www.orbicule.com, but they do not personally identify you. If you do not wish to receive cookies, you may set your browser to reject cookies or to alert you when a cookie is placed on your computer.


Privacy Contact Information

If you have any questions, concerns, or comments about our privacy policy you may contact us using our email address at privacy@orbicule.com.