Privacy Policy

INTRODUCTION

Culture Exploit AS, Gaustadalléen 21, 0349 Oslo, Norway, Org.no. 918 415 823, hereafter called “Culture Exploit”, and Culture Exploit’s affiliates recognise the importance of securing and protecting any data collected from people through our platform, and its related products, services and any other functionality found at www.cultureexploit.com and cultureexploit.app (collectively the “Platform”).

Culture Exploit takes reasonable measures to maintain the integrity, privacy and security of your data according to this Privacy Policy. Culture Exploit is the owner of cultureexploit.com which is a website and a product.

Your privacy is very important to us. Accordingly, we have developed this policy in order for you to understand how we collect, use, communicate and make use of personal information. The following outlines our privacy policy.

When accessing the https://www.cultureexploit.com website, Culture Exploit AS will learn certainin formation about you during your visit.

1. TO WHOM DOES THIS PRIVACY POLICY APPLY?

This Privacy Policy applies to any person or entity delivering, entering or in any other way registers or have registered data, through the Platform and its related products, services, and any other functionality. Thus, this Privacy Policy applies to you. If you are not of age, you must obtain the consent of your parent or guardian prior to submitting any data to the Platform.

2. END-USER’S, CULTURE EXPLOIT, CULTURE EXPLOIT’S PARTNERS AND THIRD PARTIES

End-Users (“End-Users”) are typically using the Platform to collect, and process data through the Platform. An End-User is for example a company inviting you to complete an assessment as part of their hiring process.

Partners of Culture Exploit are for example, but not limited to Culture Exploit’s distribution channel, business and/or alliance partners etc.

Third parties (“Third Parties”) are any other entity than End-Users.

4. YOUR DATA

Data (“Data”) means specific information regarding the personal or material circumstances related to you as a specific and/or identifiable individual. This includes information like (but not limited to) your real name, address, email address, phone number, date of birth, photo(s), video(s), assessment data, IP address, username and password, background information such as educational attainment, interests, any content you submit using a Platform service, payment information etc., and any other data you communicate, register, or deliver to the Platform.

When you enter the Platform, an account (“Account”) is created for you, or you may be required to create an Account. Culture Exploit strives to ensure that Data collected through the Platform is relevant, up-to-date and not excessive in relation to the intended purposes. Any information not being directly relatable to your real identity is not considered to be Data.

Culture Exploit may also collect Data automatically using its website technologies, its other websites or systems, or receive Data form for example analytics and search information providers, payment services etc., and from Culture Exploit Partners and Third Parties. Culture Exploit may use this to refine and/or combine Data.

You have the right to have your Account and the Data connected to it, archived or anonymised:

If your Account is archived, your Data is intact but no longer available to anyone but Culture Exploit. If you request to have your account unarchived, you at the same time automatically approve the at that time present Terms of Use.

If your Account is anonymised, your Data is anonymised and can no longer be connected to you or restored to your Account, and neither can your Account be restored.

You are entitled to inspect your personal Data (not including assessment data etc.), and if incorrect to correct such personal Data stored by the Platform. If you are not able to inspect and correct incorrect personal Data online, you may direct your request to datamanager@cultureexploit.com.

5. HANDLING YOUR DATA

The Data voluntarily communicated, registered, delivered or entered to the Platform, and other Data and information collected, is stored by the Platform.

Your Data may not be stored and/or processed in your own country, or it may be transferred and subsequently stored and/or processed outside your own country. The primary reasons for this is that Culture Exploit’s IT infrastructure provider may have servers in many different countries, and because servicing for example global End-Users may require your Data to be transferred, stored, and/or processed in other countries than your own. Please contact datamanager@cultureexploit.com if you want to know where your Data is physically stored and/or processed.

If your Data is archived, anonymised or deleted, such requests are in principle executed instantly in our database(s). However, your original Data may still exist on one or more backup systems, and depending on the backup cycle(s), it may take some time before all copies of your original Data are processed.

If your Data has not been used or accessed for a given period (typically 6 to 24 months), Culture Exploit has the right to archive, anonymise or delete your Account, and your Data without notification. If you want to archive or anonymise your Account and your Data, please direct your request to datamanager@cultureexploit.com

6. USING YOUR DATA

Your Data is primarily used By the End-User who invited you to provide Data. Data is typically presented to End-User in reports after being processed by the Platform. End-User may export Data from the Platform and process it (further) outside the Platform. In that case, it is End-User’s responsibility to protect your Data.

Your Data is also used by Culture Exploit for statistic and/or scientific purposes, and in the effort to keep the Platform safe and secure.

Your contact information, which is part of your Data, may be used by Culture Exploit and Culture Exploit Partners according to article 8.

Culture Exploit and its distribution channel may have direct or indirect access to all or some of your Data in its original and/or processed format when servicing and supporting End-Users.

Except for fully anonymised Data, Culture Exploit will not disclose your Data to Third Parties unless it is required by law enforcement institutions or to comply with the law; for Culture Exploit intermediaries to comply with this Privacy Policy; to protect Culture Exploit and its business, rights and assets; or if you voluntarily provide Data or information to an advert presented by Culture Exploit on behalf of a Third Party. In such case, Culture Exploit will inform you.

Finally, if Culture Exploit is substantially sold or otherwise handed over to any other entity, your Data may be transferred to that entity.

7. DATA PROTECTION AND SECURITY

The System complies with present EU data protection laws and regulations, and your Data is stored and processed in accordance with the legal regulations applicable within the European Union. In general, your Data is also protected by separation of personal Data and other Data, and partial database encryption.

The online transmission of your Data is performed through secured connections to protect your Data from manipulation and/or unauthorised access. Data protection and security is paramount to Culture Exploit, and we take reasonable measures to prevent unauthorised access or manipulation of your Data. However, unfortunately Culture Exploit cannot guarantee that communication carried by the Internet (for instance, but not limited to e-mail correspondence or entering Data into the Platform) is secure. Thus, any transmission is at your own risk. You contribute to Culture Exploit’s security and reliability efforts by following these Platform guidelines:

Do not reveal personal information in the Platform’s forums or chat rooms (if any).

Do not enter or deliver unauthorised or manipulated data, information or communication.

Do not (attempt to) collect any content or information related to other users, or violate other’s personal rights, or access other’s Accounts or Data.

Do not (attempt to) upload any viruses or malware.

Do not perform actions which will or can impact the functionality and/or appearance of the Platform

Do not overload the Platform (for instance, but not limited to Denial-of-service-attacks), or impact products, services or other functionality offered by the Platform.

Do not support and/or encourage violations against Culture Exploit policies, principles or guidelines.

Your Data, both in its original and in any processed form, is handled confidentially by Culture Exploit. Furthermore, we require other entities having access to your Data to handle it, no matter the format, confidentially.

Some countries require a local Data Protection Officer, and you can request to be contacted by a Data Protection Officer by sending a request to datamanager@cultureexploit.com

8. COMMUNICATION

Per default, Culture Exploit and/or Culture Exploit Partners may contact you by email. However, you can decline such contact by notifying datamanager@cultureexploit.com, or by opting out online where and when it is possible. If you continue to receive information from a Culture Exploit Partner after you declined it, it is likely that the Culture Exploit Partner did not register your change. In this case you must opt-out directly at the Culture Exploit Partner.

Culture Exploit may for example contact you

To notify you about changes or updates, and to respond to your requests, inquiries etc.

For internal operations like troubleshooting, data analytics, testing, statistics, surveys etc.

For business and research purposes, and to enhance/develop the Platform, products and services.

To provide you with information about Culture Exploit and Culture Exploit Partner’s events, products and services etc.

Please notice that if you decline contact by Culture Exploit, you will still receive information assumed relevant by Culture Exploit in relation to your Account, and your Data.

9. COOKIES

A cookie is a small piece of software/data sent from the Platform and stored in your browser/computer. Cookies are used for communicating, among other things, your browser activities. By entering and using the Platform, you also accept the use of cookies, and the gathering and usage of information collected by such cookies. At your own discretion, you can delete and/or disable cookies in your browser.

The appendix provides a complete overview of the cookies used by the Platform.

10. THIRD PARTY SYSTEMS AND PROVIDERS

The Platform may contain links to and/or provide products, services and/or functionality from other systems or providers controlled, owned and/or operated by third Parties. Culture Exploit has no liability whatsoever for matters regarding such a Third Party systems, products, services and/or functionality. You acknowledge that the Terms of Use, Privacy Policy etc. of such Third Parties govern the use of such a Third Party systems, or providers. Links or referrals to any Third Party does not constitute an endorsement from Culture Exploit of such systems, and their content or providers. You access any Third Party web site or provider entirely at your own risk.

11. CHANGE OF PRIVACY POLICY

Culture Exploit reserves the right to amend or change this Privacy Policy at any time without notice, and therefore we urge you to visit the Privacy Policy frequently.

12. LIABILITY

All and any direct or indirect liability resulting directly or indirectly from the use of the Platform, and its results and deliveries based on your Data, are waivered.

13. QUESTIONS AND COMPLAINTS

If you have any comments, complaints, concerns or questions to this Privacy Policy, please direct your enquiry to post@cultureexploit.com

APPENDIX - COOKIES

ORIGIN

NAME

TYPE

LIFESPAN

DETAILS

Culture Exploit

SESSSION

First-party

Session

End of browser session

Created by Culture Exploit's web server when you visit the login page and is used solely for authentication and authorization purposes within the System. It contains a unique but random value that is assigned to the browser session and is terminated as soon as you close the browser.

Google Analytics

_ga

Third-party

Persistent

2 years

Used to distinguish users.

Google Analytics

_utma

Third-party

Persistent

2 years from set/update

Used to distinguish users and sessions. The cookie is created when the javascript library executes, and no __utma cookies already exists. The cookie is updated every time data is sent to Google Analytics.

Google Analytics

_utmt

Third-party

Persistent

10 minutes

Used to throttle request rate.

Google Analytics

_utmb

Third-party

Persistent

30 minutes from set/update

Used to determine new sessions/visits. The cookie is created when the javascript library executes and no __utmb cookies already exists. The cookie is updated every time data is sent to Google Analytics.

Google Analytics

_utmc

Third-party

Persistent

End of browser session

Used to determine whether you are in a new session/visit.

Google Analytics

_utmz

Third-party

Persistent

6 months from set/update

Stores the traffic source or campaign that explains how you reached our site. The cookie is created when the javascript library executes and is updated every time data is sent to Google Analytics.

Google Analytics

_utmv

Third-party

Persistent

2 years from set/update

Used to store visitor-level custom variable data. This cookie is created when a developer uses the _setCustomVar method with a visitor level custom variable. The cookie is updated every time data is sent to Google Analytics.

TrackJS

TrackJS

Third-Party

Session

End of browser session

Used by the TrackJS service to track application errors and provide a context for correcting the bugs in the XIENTIA application.


CAN-SPAM Compliance

In compliance with the CAN-SPAM Act, all e-mail sent from our organization will clearly state who the e-mail is from and provide clear information on how to contact the sender. In addition, all e-mail messages will also contain concise information on how to remove yourself from our mailing list so that you receive no further e-mail communication from us.

Choice/Opt-Out

Our site provides users the opportunity to opt-out of receiving communications from us and our partners by reading the unsubscribe instructions located at the bottom of any e-mail they receive from us at anytime.

Users who no longer wish to receive our newsletter or promotional materials may opt-out of receiving these communications by clicking on the unsubscribe link in the e-mail.

Intellectual Property Rights

All copyrights, trademarks, patents and other intellectual property rights in and on our website and all content and software located on the site shall remain the sole property of Culture Exploit AS or its licensors. The use of our trademarks, content and intellectual property is forbidden without the express written consent from Culture Exploit AS.

You must not:

  • Republish material from our website without prior written consent.
  • Sell or rent material from our website.
  • Reproduce, duplicate, create derivative, copy or otherwise exploit material on our website for any purpose.
  • Redistribute any content from our website, including onto another website.


Restricted Access

We may in the future need to restrict access to parts (or all) of our website and reserve full rights to do so. If, at any point, we provide you with a username and password for you to access restricted areas of our website, you must ensure that both your username and password are kept confidential.

Use of Testimonials

In accordance to with the FTC guidelines concerning the use of endorsements and testimonials in advertising, please be aware of the following:

Testimonials that appear on this site are actually received via text, audio or video submission. They are individual experiences, reflecting real life experiences of those who have used our products and/or services in some way. They are individual results and results do vary. We do not claim that they are typical results. The testimonials are not necessarily representative of all of those who will use our products and/or services.

The testimonials displayed in any form on this site (text, audio, video or other) are reproduced verbatim, except for correction of grammatical or typing errors. Some may have been shortened. In other words, not the whole message received by the testimonial writer is displayed when it seems too lengthy or not the whole statement seems relevantfor the general public.

Culture Exploit AS is not responsible for any of the opinions or comments posted on http://www.cultureexploit.com. Culture Exploit AS is not a forum for testimonials, however provides testimonials as a means for customers to share their experiences with one another. To protect against abuse, all testimonials appear after they have been reviewed by management of Culture Exploit AS. Culture Exploit AS does not share the opinions, views or commentary of any testimonials on http://www.cultureexploit.com - the opinions are strictly the views of the testimonial source.

The testimonials are never intended to make claims that our products and/or services can be used to diagnose, treat, cure, mitigate or prevent any disease. Any such claims, implicit or explicit, in any shape or form, have not been clinically tested or evaluated.

How Do We Protect Your Information and Secure Information Transmissions?

Email is not recognized as a secure medium of communication. For this reason, we request that you do not send private information to us by email. However, doing so is allowed, but at your own risk. Some of the information you may enter on our website may be transmitted securely via a secure medium known as Secure Sockets Layer, or SSL. CreditCard information and other sensitive information is never transmitted via email.

Culture Exploit AS may use software programs to create summary statistics, which are used for such purposes as assessing the number of visitors to the different sections of our site, what information is of most and least interest, determining technical design specifications, and identifying system performance or problem areas.

For site security purposes and to ensure that this service remains available to all users, Culture Exploit AS uses software programs to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.

Disclaimer and Limitation of Liability

Culture Exploit AS makes no representations, warranties, or assurances as to the accuracy, currency or completeness of the content contain on this website or any sites linked to this site.

All the materials on this site are provided "as is" without any express or implied warranty of any kind, including warranties of merchantability, non infringement of intellectual property or fitness for any particular purpose. In no event shall Culture Exploit AS or its agents or associates be liable for any damages what so ever(including,without limitation, damages for loss of profits, business interruption, loss of information, injury or death)arising out of the use of or inability to use the materials, even if Culture Exploit AS has been advised of the possibility of such loss or damages.

Policy Changes

We reserve the right to amend this privacy policy at any time with or without notice. However, please be assured that if the privacy policy changes in the future, we will not use the personal information you have submitted to us under this privacy policy in a manner that is materially inconsistent with this privacy policy, without your prior consent.

We are committed to conducting our business in accordance with these principles in order to ensure that the confidentiality of personal information is protected and maintained.

Contact

If you have any questions regarding this policy, or your dealings with our website, please contact us here:


Culture Exploit AS Gaustadalléen 21, Startup Lab - 0349 Oslo - Norway

>