393 Information law contracts
SEO Service Agreement by EasyLegalDocs
OpenLegalLibrary
This SEO Service Agreement template outlines the terms and conditions under which a Company provides Search Engine Optimization (SEO) services to a Client. It details the scope of services, payment terms, intellectual property rights, warranties, confidentiality obligations, and procedures for dispute resolution. This agreement helps formalize the relationship between an SEO service provider and their client.
Privacy Policy by EasyLegalDocs
OpenLegalLibrary
This Privacy Policy template outlines how a company collects, uses, and shares personal information from users of its website and services. It details various data collection methods, the purposes for which data is used, and the circumstances under which information may be disclosed to third parties. The policy also informs users about their rights regarding their personal data, including specific provisions for GDPR and US state privacy rights. It is designed to be consistent with principles of transparency and user understanding. This document is a template, not a specific executed document, so extract template-level information only. This is a template analysis - extract generic metadata about the template type and structure, not specific party names or details. JSON Output Requirements: { "summary": "string (2-3 sentences, minimal markdown)", "description": "string (brief one-line description)", "categories": ["string array (max 5 items)"], "jurisdictions": ["string array"], "parties": ["string array (template roles only)"], "complexity": "beginner | intermediate | advanced", "confidence": { "summary": "number (0-1 float)", "description": "number (0-1 float)", "categories": "number (0-1 float)", "jurisdictions": "number (0-1 float)", "parties": "number (0-1 float)", "complexity": "number (0-1 float)", "overall": "number (0-1 float)" } } Detailed Instructions for Each Field: 1. **summary** (2-3 sentences, minimal markdown): - Write a brief, user-facing summary that explains what the document is and its main purpose - Use plain, accessible language that non-lawyers can understand - Include only essential information that helps users identify if this document meets their needs - Use minimal markdown formatting (e.g. **bold** for emphasis where necessary) - Keep it concise and conversational 2. **description** (one-line): - Provide a concise, descriptive title for the template - Include the document type and key context - Example: "Mutual non-disclosure agreement for business partnerships" 3. **categories** (max 5 items): - Select ONLY from this allowed list (use exact IDs, lowercase): accounting, administrative law and judicial review, arbitration, banking and finance, acquisition, asset finance, construction & development finance, crowdfunding, debt finance, pre-seed & seed funding, charities, subcontractor agreements, service agreements, sale & distribution agreements, confidentiality & non-disclosure agreements, terms of business, supply of goods agreements, joint venture agreements, franchise law, commercial contracts, agency agreements, competition, conflict of laws, construction & development finance, construction & engineering contracts, construction & engineering disputes, consumer law, b corp conversion, corporate governance, corporate restructuring, enterprise investment schemes (eis) & seed enterprise investment scheme (seis), employee share schemes and equity incentives solicitors, exits and disposals, limited liability partnership agreements, mergers & acquisitions (m&a), private equity, share capital, corporate, corporate crime, crime, dispute resolution, cybersecurity, data breaches & incident management, data governance, policies, employment contracts, exits & reorganisations, settlement agreements, transactions and tupe, environment, share options, family, financial services, health and safety, health law, human rights and civil liberties, immigration, information law, insurance, copyright, intellectual property disputes, intellectual property licensing, trade marks, local government, pensions, personal injury and clinical negligence, planning, practice management, private client, professions and ethics, property, property disputes, public law, restructuring and insolvency, securities, share incentives, tax, cloud service agreements, cybersecurity, saas agreements, software licence agreements, service level agreements - Choose the most relevant categories that describe the document's purpose - Order by relevance (most relevant first) 4. **jurisdictions**: - Select ONLY from this allowed list (use exact IDs, lowercase): andorra, united arab emirates, ajman (united arab emirates), abu dhabi (united arab emirates), dubai (united arab emirates), fujairah (united arab emirates), ras al khaimah (united arab emirates), sharjah (united arab emirates), umm al quwain (united arab emirates), afghanistan, antigua and barbuda, anguilla, albania, armenia, angola, antarctica, argentina, american samoa, austria, australia, new south wales (australia), queensland (australia), south australia (australia), west australia (australia), tasmania (australia), victoria (australia), aruba, aland islands, azerbaijan, bosnia and herzegovina, barbados, bangladesh, belgium, flemish region (belgium), burkina faso, bulgaria, bahrain, burundi, benin, bermuda, brunei darussalam, bolivia (plurinational state of), bonaire, sint eustatius and saba, brazil, bahamas, bhutan, bouvet island, botswana, belarus, belize, canada, alberta (canada), british columbia (canada), manitoba (canada), new brunswick (canada), newfoundland and labrador (canada), nova scotia (canada), northwest territories (canada), nunavut (canada), ontario (canada), prince edward island (canada), quebec (canada), saskatchewan (canada), yukon (canada), cocos (keeling) islands, democratic republic of congo, central african republic, congo, switzerland, cote d'ivoire, cook islands, chile, cameroon, china, colombia, costa rica, cuba, cabo verde, curacao, christmas island, cyprus, czechia, germany, djibouti, denmark, dominica, dominican republic, algeria, ecuador, estonia, egypt, eritrea, spain, ethiopia, european union, finland, fiji, falkland islands [malvinas], micronesia (federated states of), faroe islands, france, gabon, united kingdom, northern ireland, scotland, grenada, georgia (country), guernsey, ghana, gibraltar, greenland, gambia, guinea, equatorial guinea, greece, south georgia and the south sandwich islands, guatemala, guam, guinea-bissau, guyana, hong kong, heard island and mcdonald islands, honduras, croatia, haiti, hungary, indonesia, ireland, israel, isle of man, india, british indian ocean territory, iraq, iran (islamic republic of), iceland, italy, jersey, jamaica, jordan, japan, kenya, kyrgyzstan, cambodia, kiribati, comoros, saint kitts and nevis, nevis (saint kitts and nevis), korea (the democratic people's republic of), south korea, kuwait, cayman islands, kazakhstan, lao people's democratic republic, lebanon, saint lucia, liechtenstein, sri lanka, liberia, lesotho, lithuania, luxembourg, latvia, libya, morocco, monaco, moldova (the republic of), montenegro, madagascar, marshall islands, north macedonia, mali, myanmar, mongolia, macao, northern mariana islands, mauritania, montserrat, malta, mauritius, maldives, malawi, mexico, malaysia, labuan (malaysia), mozambique, namibia, new caledonia, niger, norfolk island, nigeria, nicaragua, netherlands, norway, nepal, nauru, niue, new zealand, oman, panama, peru, french polynesia, papua new guinea, philippines, pakistan, poland, saint pierre and miquelon, pitcairn, puerto rico, palestine, state of, portugal, regiao autonoma dos acores (portugal), madeira (portugal), palau, paraguay, qatar, romania, serbia, russia, rwanda, saudi arabia, solomon islands, seychelles, sudan, sweden, singapore, saint helena, ascension and tristan da cunha, slovenia, svalbard and jan mayen, slovakia, sierra leone, san marino, senegal, somalia, suriname, south sudan, sao tome and principe, el salvador, sint maarten, syrian arab republic, eswatini, turks and caicos islands, chad, french southern territories, togo, thailand, tajikistan, tokelau, timor-leste, turkmenistan, tunisia, tonga, turkiye, trinidad and tobago, tuvalu, taiwan (province of china), tanzania, ukraine, uganda, united states minor outlying islands, united nations, usa jurisdiction, alaska (usa), alabama (usa), arkansas (usa), arizona (usa), california, colorado (usa), connecticut (usa), district of columbia (usa), delaware, florida, georgia, hawaii (usa), iowa (usa), idaho (usa), illinois, indiana (usa), kansas (usa), kentucky (usa), louisiana (usa), massachusetts, maryland (usa), maine (usa), michigan, minnesota (usa), missouri (usa), mississippi (usa), montana (usa), north carolina, north dakota (usa), nebraska (usa), new hampshire (usa), new jersey, new mexico (usa), nevada (usa), new york, ohio, oklahoma (usa), oregon (usa), pennsylvania, rhode island (usa), south carolina (usa), south dakota (usa), tennessee (usa), texas, utah (usa), virginia, vermont (usa), washington, wisconsin (usa), west virginia (usa), wyoming (usa), uruguay, uzbekistan, holy see, saint vincent and the grenadines, venezuela (bolivarian republic of), virgin islands (british), virgin islands (u.s.), vietnam, vanuatu, wallis and futuna, samoa, kosovo, general, yemen, south africa, zambia, zimbabwe - Include all jurisdictions explicitly mentioned or referenced in the document - Leave empty if no specific jurisdiction is mentioned 5. **parties** (template roles only): - List the TYPES/ROLES of parties in the template - Examples: "employer", "employee", "contractor", "client", "licensor", "licensee", "landlord", "tenant" - DO NOT include specific names or organizations - Focus on the relationship structure 6. **complexity**: - **beginner**: Simple structure, standard clauses, plain language, typically < 5 pages - **intermediate**: Moderate complexity, some specialized terms, optional clauses, 5-20 pages - **advanced**: Complex provisions, extensive cross-references, specialized legal language, > 20 pages - Must be EXACTLY one of: "beginner", "intermediate", "advanced" 7. **confidence** (0-1 float scores indicating model certainty): - Return confidence values (0-1 float) indicating your certainty for each field - **summary**: How confident you are in the summary quality and completeness - **description**: How confident you are in the description accuracy - **categories**: How confident you are in category selection and relevance - **jurisdictions**: How confident you are in jurisdiction identification - **parties**: How confident you are in party type identification - **complexity**: How confident you are in complexity assessment - **overall**: Overall confidence in the entire analysis (average or weighted score) - Use higher scores (0.8-1.0) when information is clear and unambiguous - Use lower scores (0.3-0.7) when information is unclear or requires inference - Use very low scores (0.0-0.3) when information is missing or highly uncertain Analysis Guidelines: - Pay attention to document structure and organization - Identify the primary legal relationship being established - Note any industry-specific terminology - Consider the level of legal sophistication required - Extract party roles from template placeholders and context - Look for jurisdiction references in governing law clauses Important Notes: - If the document doesn't appear to be a legal template (e.g., contains only metadata, JSON structures, or non-legal content), return empty values for all fields: - Use empty string ("") for summary, description, and complexity - Use empty array ([]) for categories, jurisdictions, and parties - Use 0.0 for all confidence scores - If a field cannot be determined with confidence, use empty string for text fields or empty array for lists - Never include explanatory text about why the document is invalid - just return empty values - Never include specific party names, only template roles - Ensure all category and jurisdiction IDs are from the allowed lists - The summary should be user-friendly and help someone quickly understand what the document is for ---- Legal Document Template Content ---- <h1>PRIVACY POLICY</h1> <p>Last Updated: 2025-10-06.</p> <p>This Privacy Policy (“Policy”) explains the information collection, use, and sharing practices of <span data-field="Company Name"></span> (“we,” “us,” and “our”).</p> <p>Unless otherwise stated, this Policy describes and governs the information collection, use, and sharing practices of <span data-field="Company Name"></span> with respect to your use of our website (<span data-field="Company Name"></span>) and the services (“Services”) we provide and/or host on our servers.</p> <p>Before you use or submit any information through or in connection with the Services, please carefully review this Privacy Policy. By using any part of the Services, you understand that your information will be collected, used, and disclosed as outlined in this Privacy Policy.</p> <p>If you do not agree to this privacy policy, please do not use our Services.</p> <h2>Our Principles</h2> <p><span data-field="Company Name"></span> has designed this policy to be consistent with the following principles:</p> <ul> <li>Privacy policies should be human readable and easy to find.</li> <li>Data collection, storage, and processing should be simplified as much as possible to enhance security, ensure consistency, and make the practices easy for users to understand.</li> <li>Data practices should meet the reasonable expectations of users.</li> </ul> <h2>Information We Collect</h2> <p>We collect information in multiple ways, including when you provide information directly to us; when we passively collect information from you, such as from your browser or device; and from third parties.</p> <h3>Information You Provide Directly to Us</h3> <p>We will collect any information you provide to us. We may collect information from you in a variety of ways, such as when you: (a) create an online account, (b) place an order or make a purchase, (c) contact us or provide feedback, (d) subscribe to our newsletter or marketing communications, or (e) participate in promotions or surveys. This information may include, but is not limited to, your name, email address, phone number, shipping address, billing address, payment information (processed by our payment processors), account credentials, your geographic location, and details related to your orders and customer service interactions.</p> <h3>Information that Is Automatically Collected</h3> <p><em>Device/Usage Information</em></p> <p>We may automatically collect certain information about the computer or devices (including mobile devices or tablets) you use to access the Services. As described further below, we may collect and analyze (a) device information such as IP addresses, location information (by country and city), unique device identifiers, IMEI and TCP/IP address, browser types, browser language, operating system, and mobile device carrier information, and (b) information related to the ways in which you interact with the Services, such as referring and exit web pages and URLs, platform type, the number of clicks, domain names, landing pages, pages and content viewed and the order of those pages, statistical information about the use of the Services, the amount of time spent on particular pages, the date and time you used the Services, the frequency of your use of the Services, error logs, and other similar information. As described further below, we may use third-party analytics providers and technologies, including cookies and similar tools, to assist in collecting this information.</p> <p><em>Cookies and Other Tracking Technologies</em></p> <p>We also collect data about your use of the Services through the use of Internet server logs and online tracking technologies, like cookies and/or tracking pixels. A web server log is a file where website activity is stored. A cookie is a small text file that is placed on your computer when you visit a website, that enables us to: (a) recognize your computer; (b) store your preferences and settings; (c) understand the web pages of the Services you have visited and the referral sites that have led you to our Services; (d) enhance your user experience by delivering content specific to your inferred interests; (e) perform searches and analytics; and (f) assist with security and administrative functions. Tracking pixels (sometimes referred to as web beacons or clear GIFs) are tiny electronic tags with a unique identifier embedded in websites, online ads and/or email, and that are designed to provide usage information like ad impressions or clicks, measure popularity of the Services and associated advertising, and to access user cookies. If you receive email from us (such as newsletters, order updates, or other ongoing email communications), we may use certain analytics tools, such as clear GIFs, to capture data such as whether you open our message, click on any links or banners our email contains, or otherwise interact with what we send. This data allows us to gauge the effectiveness of our communications and marketing campaigns. As we adopt additional technologies, we may also gather additional information through other methods.</p> <p>Please note that you can change your settings to notify you when a cookie is being set or updated, or to block cookies altogether. Please consult the “Help” section of your browser for more information. Please note that by blocking any or all cookies, you may not have access to certain features or offerings of the Services.</p> <p>For more information about how we use cookies, please read our Cookie Policy.</p> <h3>Information from Third Parties</h3> <p>To the extent permitted by law, we may also collect information from third parties, including public sources, social media platforms, and marketing and market research firms. Depending on the source, this information collected from third parties could include name, contact information, demographic information, information about an individual’s employer, information to verify identity or trustworthiness, and information for other fraud or safety protection purposes.</p> <p>We may use the information we collect from and about you to:</p> <p>We may use the information we collect from and about you to:</p> <ul> <li>Fulfil the purposes for which you provided it, including to process and deliver orders, provide customer service, and communicate with you about your purchases.</li> <li>Provide, operate, maintain, and improve the Services, including to develop new features or services, take steps to secure the Services, and for technical and customer support.</li> <li>Process payments and transactions, facilitate shipping and returns, verify your identity, and prevent fraud.</li> <li>Send you information about your interactions or transactions with us (such as order confirmations, shipping updates, and account alerts) and, where permitted, marketing communications such as newsletters and special offers.</li> <li>Process and respond to your inquiries, requests, or feedback.</li> <li>Conduct analytics, research, and reporting, including to better understand users, personalize your experience, and synthesize and derive insights from your use of our Services.</li> <li>Comply with the law and protect the safety, rights, property, or security of <span data-field="Company Name"></span>, the Services, our users, and the general public.</li> <li>Enforce our Terms of Use and other policies, including to investigate potential violations thereof.</li> </ul> <p>Please note that we may combine information that we collect from you and about you (including automatically collected information) with information we obtain about you from our affiliates and/or non-affiliated third parties, and use such combined information in accordance with this Privacy Policy.</p> <p>We may aggregate and/or de-identify information collected through the Services. We may use de-identified and/or aggregated data for any purpose, including without limitation for research and marketing purposes.</p> <h2>When We Disclose Your Information</h2> <p>We may disclose and/or share your information under the following circumstances:</p> <p>Service Providers.</p> <p>We may disclose your information with third parties who perform services on our behalf, including without limitation, payment processing, order fulfilment and shipping, fraud detection and prevention, marketing and advertising, customer support, data storage, data analysis and processing, analytics, and legal or accounting services.</p> <p>Legal Compliance and Protection of <span data-field="Company Name"></span> and Others.</p> <p>We may disclose your information if required to do so by law or on a good faith belief that such disclosure is permitted by this Privacy Policy or reasonably necessary or appropriate for any of the following reasons: (a) to comply with legal process; (b) to enforce or apply our Terms of Use and this Privacy Policy, or other contracts with you, including investigation of potential violations thereof; (c) to respond to your requests for customer service; and/or (d) to protect the rights, property, or personal safety of <span data-field="Company Name"></span>, our agents and affiliates, our users, and the public. This includes exchanging information with other companies and organizations for fraud protection, and spam/malware prevention, and similar purposes.</p> <h3>Business Transfers.</h3> <p>As we continue to develop our business, we may engage in certain business transactions, such as the transfer or sale of our assets. In such transactions, (including in contemplation of such transactions, e.g., due diligence) your information may be disclosed. If any of our assets are sold or transferred to a third party, customer information (including your email address) would likely be one of the transferred business assets.</p> <h3>Affiliated Companies.</h3> <p>We may disclose your information with current or future affiliated companies.</p> <h3>Consent.</h3> <p>We may disclose your information to any third parties based on your consent to do so.</p> <h3>Aggregate/De-identified Information.</h3> <p>We may disclose de-identified and/or aggregated data for any purpose to third parties, including advertisers, promotional partners, and/or others.</p> <h2>Legal Basis for Processing Personal Data</h2> <p>The laws in some jurisdictions require companies to tell you about the legal ground they rely on to use or disclose information that can be directly linked to or used to identify you. To the extent those laws apply, our legal grounds for processing such information are as follows:</p> <h3>To Honor Our Contractual Commitments to You.</h3> <p>Much of our processing of information is to meet our contractual obligations to provide services to our users.</p> <h3>Legitimate Interests.</h3> <p>In many cases, we handle information on the ground that it furthers our legitimate interests in ways that are not overridden by the interests or fundamental rights and freedoms of the affected individuals, these include:</p> <ul> <li>Customer service.</li> <li>Marketing, advertising, and fundraising.</li> <li>Protecting our users, personnel, and property.</li> <li>Managing user accounts.</li> <li>Organizing and running events and programs.</li> <li>Analyzing and improving our business.</li> <li>Managing legal issues.</li> </ul> <p>We may also process information for the same legitimate interests of our users and business partners.</p> <h3>Legal Compliance.</h3> <p>We may need to use and disclose information in certain ways to comply with our legal obligations.</p> <h3>Consent.</h3> <p>Where required by law, and in some other cases where legally permissible, we handle information on the basis of consent. Where we handle your information on the basis of consent, you have the right to withdraw your consent; in accordance with applicable law.</p> <h2>Online Analytics</h2> <p>We may use third-party web analytics services (such as Google Analytics) on our Services to collect and analyze the information discussed above, and to engage in auditing, research, or reporting. The information (including your IP address) collected by various analytics technologies described in the “Cookies and Other Tracking Technologies” section above will be disclosed to or collected directly by these service providers, who use the information to evaluate your use of the Services, including by noting the third-party website from which you arrive to our Site, analyzing usage trends, assisting with fraud prevention, and providing certain features to you. To prevent Google Analytics from using your information for analytics, you may install the official Google Analytics Opt-out Browser Add-on.</p> <h2>Your Choices and Data Subject Rights</h2> <p>You have various rights with respect to the collection and use of your information through the Services. Those choices are as follows:</p> <h3>Email Unsubscribe</h3> <p>You may unsubscribe from our marketing emails at any time by clicking on the “unsubscribe” link at the bottom of each newsletter or by emailing <span data-field="Contact Email"></span> with your request.</p> <h3>Account Preferences</h3> <p>If you have registered for an account with us through our Services, you can update your account information or adjust your email communications preferences by logging into your account and updating your settings.</p> <h3>US State Privacy Rights</h3> <p>If you are a California resident, please see our California Privacy Rights section below for additional information.</p> <h3>GDPR and EU Data Subject Rights</h3> <p>Individuals in the European Economic Area (“EEA”) and other jurisdictions have certain legal rights with respect to the collection and use of their information through the Services. These rights include:</p> <ul> <li><strong>Right of Access:</strong> You have the right to obtain confirmation of whether we hold certain information about you and to request a copy of that information.</li> <li><strong>Right to Rectify:</strong> You can request the correction or updating of any inaccurate or incomplete personal information we hold about you.</li> <li><strong>Right to Object:</strong> You have the right to object to the processing of your personal data on specific grounds, such as for marketing purposes or where we rely on legitimate interests.</li> <li><strong>Right to Withdraw Consent:</strong> Where we process your information based on your consent, you have the right to withdraw that consent at any time.</li> <li><strong>Right to Complain:</strong> If you believe that your data protection rights have been violated, you have the right to lodge a complaint with the relevant supervisory or legal authority.</li> </ul> <p>To exercise any of these rights or if you have any questions about how we handle your data, please email us at <span data-field="Contact Email"></span>. We are committed to responding to your requests promptly and within the timeframes required by GDPR. If necessary, this response time may be extended in certain circumstances.</p> <h2>International Transfers</h2> <p>As described above in the “When We Disclose Your Information” section, we may share your information with trusted service providers or business partners in countries other than your country of residence in accordance with applicable law. This means that some of your information may be processed in countries that may not offer the same level of protection as the privacy laws of your jurisdiction. By providing us with your information, you acknowledge any such transfer, storage or use.</p> <p>If we provide any information about you to any third parties information processors located outside of the EEA, we will take appropriate measures to ensure such companies protect your information adequately in accordance with this Privacy Policy and other data protection laws to govern the transfers of such data.</p> <p>We have implemented technical, physical, and organizational security measures to protect against the loss, misuse, and/or alteration of your information. These safeguards vary based on the sensitivity of the information that we collect and store and may include encryption in transit, access controls, network monitoring, and vendor due diligence. However, we cannot and do not guarantee that these measures will prevent every unauthorized attempt to access, use, or disclose your information since despite our efforts, no Internet and/or other electronic transmissions can be completely secure.</p> <p>We have implemented technical, physical, and organizational security measures to protect against the loss, misuse, and/or alteration of your information. These safeguards vary based on the sensitivity of the information that we collect and store. However, we cannot and do not guarantee that these measures will prevent every unauthorized attempt to access, use, or disclose your information since despite our efforts, no Internet and/or other electronic transmissions can be completely secure.</p> <p>The Services are intended for users over the age of 18 and are not directed at children under the age of 13. If we become aware that we have collected personal information (as defined by the Children’s Online Privacy Protection Act) from children under the age of 13, or personal data (as defined by the EU GDPR) from children under the age of 16, we will take reasonable steps to delete it as soon as practicable.</p> <p>The Services are intended for users over the age of 18 and are not directed at children under the age of 13. If we become aware that we have collected personal information (as defined by the Children’s Online Privacy Protection Act) from children under the age of 13, or personal data (as defined by the EU GDPR) from children under the age of 16, we will take reasonable steps to delete it as soon as practicable.</p> <h2>Data Retention</h2> <p>We retain the information we collect for as long as necessary to fulfill the purposes set forth in this Privacy Policy or as long as we are legally required or permitted to do so. Information may persist in copies made for backup and business continuity purposes for additional time.</p> <p>The Services may contain links to third-party websites (e.g., social media sites like Facebook and Twitter), third-party plug-ins (e.g., the Facebook “like” button and Twitter “follow” button), and other services. If you choose to use these sites or features, you may disclose your information not just to those third-parties, but also to their users and the public more generally depending on how their services function. <span data-field="Company Name"></span> is not responsible for the content or privacy practices of such third party websites or services. The collection, use and disclosure of your information will be subject to the privacy policies of the third party websites or services, and not this Privacy Policy. We encourage you to read the privacy statements of each and every site you visit.</p> <p>The Services may contain links to third-party websites (e.g., social media sites like Facebook and Twitter), third-party plug-ins (e.g., the Facebook “like” button and Twitter “follow” button), and other services. If you choose to use these sites or features, you may disclose your information not just to those third-parties, but also to their users and the public more generally depending on how their services function. Creative Commons is not responsible for the content or privacy practices of such third party websites or services. The collection, use and disclosure of your information will be subject to the privacy policies of the third party websites or services, and not this Privacy Policy. We encourage you to read the privacy statements of each and every site you visit.</p> <h2>Governing Law</h2> <p>This Policy and any disputes arising from or relating to it or your use of the Services are governed by the laws of the United States, without regard to its conflict of laws principles. State-specific rights and obligations may also apply as described in any applicable state privacy notices.</p> <h2>Changes to this Privacy Policy</h2> <p>We will continue to evaluate this Privacy Policy as we update and expand our Services, and we may make changes to the Privacy Policy accordingly. We will post any changes here and revise the date last updated above. We encourage you to check this page periodically for updates to stay informed on how we collect, use and share your information. If we make material changes to this Privacy Policy, we will provide you with notice as required by law.</p> <h2>Questions About this Privacy Policy</h2> <p>If you have any questions about this Privacy Policy or our privacy practices, you can contact us at: <span data-field="Contact Email"></span>, or by mail at <span data-field="Company Address"></span>, or by phone at <span data-field="Company Phone"></span>.</p> <script type="application/ld+json" id="doc-meta">{"ver":5,"title":"PRIVACY POLICY","fields":{"Company Name":{"placeholder":"Your E-commerce Website Name"},"Contact Email":{"placeholder":"[email protected]"},"Company Address":{"placeholder":"Your Company Address"},"Company Phone":{"placeholder":"Your Phone Number"}}}</script>
Github Terms Github Community Code Of Conduct (GitHub)
OpenLegalLibrary
This document outlines the GitHub Community Code of Conduct, establishing guidelines for respectful and productive interaction within the platform. It details best practices for community members, specifies actions that are not allowed, and explains the enforcement procedures by GitHub staff and moderators. The purpose is to foster a welcoming and safe environment for all developers.
Content Removal Policies Guide To Submitting A DMCA Takedown Notice (GitHub)
OpenLegalLibrary
This document serves as a comprehensive guide for submitting a Digital Millennium Copyright Act (DMCA) Takedown Notice, particularly for content involving software code. It details the specific information required for a valid notice, emphasizes legal obligations like swearing under penalty of perjury, and advises on investigating claims thoroughly. The guide also addresses unique considerations for code-related copyright infringement and the process for submitting a complaint to the hosting platform. It is not legal advice and encourages consultation with a legal professional before taking action, especially given the complexities of copyright law and code-based content. The guide also mentions the possibility of counter notices and the publication of takedown complaints after redaction of personal information. It also provides guidance on complaints about anti-circumvention technology, which is a specific type of copyright violation. Finally, it outlines the various methods for submitting a complaint, including an online form, email, or physical mail, with a preference for electronic submissions for faster processing. The guide is designed to make the process of submitting alleged infringement notices as straightforward as possible, while also ensuring that the notices meet the minimum requirements of the DMCA. It also highlights the importance of being specific in identifying the copyrighted work and the infringing material, as well as explaining how the affected user can remedy the infringement. The guide also mentions that the hosting company will not automatically disable forks when disabling a parent repository, and that each allegedly infringing fork must be explicitly identified. It also provides guidance on how to handle large networks of repositories that are alleged to be infringing. The guide also emphasizes that the hosting company is not the judge, and that it is up to the parties to evaluate the merit of their claims. The guide also mentions that facts, words, short phrases, URLs, and domain names are generally not copyrightable, and that users should speak with a lawyer if they have questions about whether or not their content is protectable. The guide also mentions that users may receive a counter notice, and that the hosting company will re-enable their content within 10-14 days unless the copyright owner notifies them that they have initiated a legal action seeking to restrain the user from engaging in infringing activity. The guide also mentions that the complaint will be published after redacting personal information. The guide also mentions that the hosting company exercises little discretion in the process other than determining whether the notices meet the minimum requirements of the DMCA. The guide also mentions that it is a federal crime to intentionally lie in a sworn declaration, and that submitting false information could also result in civil liability. The guide also mentions that the DMCA itself provides for damages against any person who knowingly materially misrepresents that material or activity is infringing. The guide also mentions that users should conduct a thorough investigation and consult with an attorney before submitting a takedown to make sure that the use isn't actually permissible. The guide also mentions that a great first step before sending a takedown notice is to try contacting the user directly. The guide also mentions that the hosting company can only accept DMCA takedown notices for works that are protected by copyright, and that identify a specific copyrightable work. The guide also mentions that if users have a complaint about trademark abuse, they should see the trademark policy. The guide also mentions that if users wish to remove sensitive data such as passwords, they should see the policy on sensitive data. The guide also mentions that if users are dealing with defamation or other abusive behavior, they should see the Community Guidelines. The guide also mentions that code is different from other creative content, and that this makes identifying a valid copyright infringement more complicated than it might otherwise be for, say, photos, music, or videos. The guide also mentions that a repository may include bits and pieces of code from many different people, but only one file or even a sub-routine within a file infringes copyrights. The guide also mentions that code mixes functionality with creative expression, but copyright only protects the expressive elements, not the parts that are functional. The guide also mentions that there are often licenses to consider, and that just because a piece of code has a copyright notice does not necessarily mean that it is infringing. The guide also mentions that it is possible that the code is being used in accordance with an open-source license. The guide also mentions that a particular use may be fair-use if it only uses a small amount of copyrighted content, uses that content in a transformative way, uses it for educational purposes, or some combination of the above. The guide also mentions that because code naturally lends itself to such uses, each use case is different and must be considered separately. The guide also mentions that code may be alleged to infringe in many different ways, requiring detailed explanations and identifications of works. The guide also mentions that users should have a trained professional evaluate the facts of every takedown notice they send. The guide also mentions that if users are outsourcing their efforts to a third party, they should make sure they know how they operate, and make sure they are not using automated bots to submit complaints in bulk. The guide also mentions that these complaints are often invalid and processing them results in needlessly taking down projects. The guide also mentions that it can be very difficult to determine whether or not a particular work is protected by copyright. The guide also mentions that facts (including data) are generally not copyrightable. The guide also mentions that words and short phrases are generally not copyrightable. The guide also mentions that URLs and domain names are generally not copyrightable. The guide also mentions that since users can only use the DMCA process to target content that is protected by copyright, they should speak with a lawyer if they have questions about whether or not their content is protectable. The guide also mentions that any user affected by a takedown notice may decide to submit a counter notice. The guide also mentions that if they do, the hosting company will re-enable their content within 10-14 days unless the copyright owner notifies them that they have initiated a legal action seeking to restrain the user from engaging in infringing activity relating to the content on the hosting company's platform. The guide also mentions that after redacting personal information, the hosting company publishes all complete and actionable takedown notices. The guide also mentions that the hosting company exercises little discretion in the process other than determining whether the notices meet the minimum requirements of the DMCA. The guide also mentions that it is up to the parties (and their lawyers) to evaluate the merit of their claims, bearing in mind that notices must be made under penalty of perjury. The guide also mentions that the complaint must include a statement that the user has read and understands the hosting company's Guide to Filing a DMCA Notice. The guide also mentions that the complaint must identify the copyrighted work that the user believes has been infringed. The guide also mentions that the complaint must identify the material that the user alleges is infringing the copyrighted work. The guide also mentions that the complaint must explain what the affected user would need to do in order to remedy the infringement. The guide also mentions that the complaint must provide the user's contact information. The guide also mentions that the complaint must provide contact information, if known, for the alleged infringer. The guide also mentions that the complaint must include a statement that the user has a good faith belief that use of the copyrighted materials described above on the infringing web pages is not authorized by the copyright owner, or its agent, or the law, and that the user has taken fair use into consideration. The guide also mentions that the complaint must include a statement that the user swears, under penalty of perjury, that the information in the notification is accurate and that the user is the copyright owner, or is authorized to act on behalf of the owner, of an exclusive right that is allegedly infringed. The guide also mentions that the complaint must include the user's physical or electronic signature. The guide also mentions that if users believe that content hosted on the hosting company's platform violates the prohibition against the circumvention of technological measures that effectively control access to works protected by copyright, they should send a report through the Copyright claims form. The guide also mentions that a circumvention claim must include detailed statements that describe what the technical measures are, how they effectively control access to the copyrighted material, and how the accused project is designed to circumvent their previously described technological protection measures. The guide also mentions that the fastest way to get a response is to enter information and answer all the questions on the Copyright claims form. The guide also mentions that users can also send an email notification, and that they may include an attachment if they like, but that they should also include a plain-text version of their letter in the body of their message. The guide also mentions that if users must send their notice by physical mail, they can do that too, but that it will take substantially longer for the hosting company to receive and respond to it. The guide also mentions that notices received via plain-text email have a much faster turnaround than PDF attachments or physical mail. The guide also mentions that if users still wish to mail their notice, the physical address is provided. The guide also mentions that the document is a template, not a specific executed document, so it extracts template-level information only. The guide also mentions that it is a critical template analysis, and that it extracts generic metadata about the template type and structure, not specific party names or details. The guide also mentions that the JSON output requirements include a summary, description, categories, jurisdictions, parties, complexity, and confidence scores for each field. The guide also mentions that the summary should be 2-3 sentences, minimal markdown, user-facing, and explain what the document is and its main purpose. The guide also mentions that the description should be a brief one-line description. The guide also mentions that the categories should be an array of category IDs from the allowed list, with a maximum of 5 items, ordered by relevance. The guide also mentions that the jurisdictions should be an array of jurisdiction IDs from the allowed list, and that it should include all jurisdictions explicitly mentioned or referenced in the document, or be empty if no specific jurisdiction is mentioned. The guide also mentions that the parties should be an array of template party types/roles only, and that it should not include specific names or organizations. The guide also mentions that the complexity should be one of
Content Removal Policies Github Private Information Removal Policy (GitHub)
OpenLegalLibrary
This document outlines a company's policy and process for requesting the removal of private information from its platform. It specifically addresses high-risk content that poses a security threat, such as exposed access credentials. The policy details what constitutes private information for removal, appropriate request types, and the steps involved for both the requesting party and the content poster.
Content Removal Policies Guide To Submitting A DMCA Counter Notice (GitHub)
OpenLegalLibrary
This guide explains how to submit a DMCA counter notice if you believe your content was mistakenly removed due to a takedown request. It details the legal requirements, potential consequences like perjury and lawsuits, and the specific information needed for a valid submission. The document emphasizes the importance of understanding the legal implications and seeking professional advice.
Privacy Policies Github General Privacy Statement (GitHub)
OpenLegalLibrary
This Privacy Statement outlines how a company handles personal data collected from users interacting with its services. It details the types of data collected, the purposes for processing, and how data may be shared with affiliates, service providers, and other third parties. The document also explains user privacy rights, international data transfer mechanisms like the DPF, and specific provisions for US state residents regarding their data protection rights and choices, including cookie management options. It clarifies the roles of Data Controller and Data Processor, especially when an organization provides a user's account, and emphasizes the company's commitment to data security and compliance with relevant privacy laws like GDPR and US state regulations. Users can exercise their rights, manage cookie preferences, and contact the Data Protection Officer for concerns, ensuring transparency and control over their personal information. The statement also addresses data retention, security measures, and provides information for minors, along with details on how changes to the statement will be communicated. It includes translations into other languages for broader accessibility. This comprehensive document serves as a guide for users to understand their privacy in relation to the company's services, covering everything from data collection to dispute resolution processes. It also highlights the company's adherence to various data privacy frameworks and its commitment to protecting user data. The document also provides specific disclosures for California residents, including categories of personal information collected and shared, and their rights under California privacy laws. It also includes information for residents of Colorado, Connecticut, Virginia, and Nevada, detailing their additional rights and the company's practices regarding their personal information. This ensures that users from different jurisdictions are aware of their specific rights and how the company handles their data in compliance with local regulations. The document also explains the use of cookies and tracking technologies, providing users with choices and controls over non-essential cookies. It details the types of cookies used, their purposes, and how users can manage their cookie preferences, including browser settings and industry opt-out programs. This section aims to give users a clear understanding of how their online activity is tracked and how they can control it. Overall, the Privacy Statement is designed to be a transparent and informative resource for users to understand their data privacy rights and the company's practices. It covers a wide range of topics from data collection to dispute resolution, ensuring that users are well-informed about how their personal information is handled. The document also emphasizes the company's commitment to security and compliance with various data protection laws and frameworks. It also provides contact information for users to address any questions or concerns regarding their privacy. This comprehensive approach ensures that users have all the necessary information to make informed decisions about their data. The document also includes information about international data transfers and the mechanisms used to protect personal data when it is transferred across borders. This is particularly important for users in the EEA, UK, and Switzerland, as it addresses their concerns about data protection in other countries. The document also explains the company's participation in the Data Privacy Framework (DPF) program, which provides a mechanism for transferring personal data from the EU, UK, and Switzerland to the US. This demonstrates the company's commitment to complying with international data transfer regulations. Finally, the document includes a section on information for minors, stating that the services are not intended for individuals under the age of 13 and outlining the steps to take if a minor's personal data is inadvertently collected. This shows the company's commitment to protecting the privacy of children. The document also provides information on how changes to the Privacy Statement will be communicated to users, ensuring that they are always aware of any updates to the company's privacy practices. This ensures transparency and allows users to stay informed about how their data is handled. The document also includes translations into other languages, making it accessible to a wider audience. This demonstrates the company's commitment to providing clear and understandable privacy information to all its users, regardless of their language. The document also explains the company's use of web beacons and pixel tags in email marketing, providing users with information on how their email interactions are tracked. This transparency helps users understand how their engagement with email communications is monitored. The document also details the use of mobile identifiers for analytics on mobile devices, explaining how these are used for sales and marketing purposes on enterprise marketing pages. This provides users with a comprehensive understanding of tracking technologies across different platforms. The document also explains the use of flash cookies, also known as Local Shared Objects (LSOs), for collecting and storing information about service usage, particularly for advertisements and videos. This ensures users are aware of all types of tracking technologies employed. The document also clarifies that the company and its partners share collected or inferred information with third parties for various purposes, including targeted advertising. This transparency helps users understand the extent of data sharing. The document also provides a table detailing different types of cookies, such as required, analytics, social media, and advertising cookies, along with their descriptions and purposes. This structured information makes it easier for users to understand the specific functions of each cookie type. The document also offers various options for users to disable non-essential cookies, including specific settings on enterprise marketing pages, browser controls, tracking blockers, and industry opt-out programs. This empowers users to manage their cookie preferences effectively. The document also explains that these cookie choices are browser-specific, advising users to apply their preferences across all devices and browsers they use to access the services. This ensures consistent privacy settings across different platforms. The document also reiterates that the company does not sell or share the personal information of known minors under 16 years of age, reinforcing its commitment to child privacy. This provides reassurance to users about the protection of minors' data. The document also clarifies that the company does not engage in profiling in furtherance of decisions that produce legal or similarly significant effects concerning the consumer, as defined by Colorado law. This addresses specific concerns for Colorado residents. The document also states that the company does not sell covered information as defined under Nevada Revised Statutes, providing specific assurance to Nevada residents. This ensures compliance with state-specific regulations. The document also provides a dedicated email address for California Customers to request information about the disclosure of personal information to third parties for direct marketing purposes under the
Other Site Policies Github Government Takedown Policy (GitHub)
OpenLegalLibrary
This policy outlines how a company responds to official government requests to remove content deemed unlawful in specific jurisdictions. It details the process for handling such requests, including notifying affected users, allowing appeals, and publicly posting takedown notices to promote transparency regarding internet censorship.
Security Policies Github Bug Bounty Program Legal Safe Harbor (GitHub)
OpenLegalLibrary
This document outlines the legal safe harbor provided by GitHub for security researchers participating in its bug bounty program. It protects researchers from civil or criminal action for good faith violations of the policy, aligning their authorized conduct with laws like the CFAA and DMCA. The policy also details how GitHub handles sharing vulnerability reports with affected third parties, ensuring researcher anonymity and protection from legal action.
Content Removal Policies Github Trademark Policy (GitHub)
OpenLegalLibrary
This document outlines a company's trademark policy, defining what constitutes a trademark policy violation and what does not. It details the procedure for registered trademark holders to report alleged infringements and specifies the information required for such reports. The policy also describes the company's actions in response to reported violations.