WHO WE ARE AND WHAT THIS IS
Demyst Data Limited and its affiliated companies (together, “Demyst Data” or “we” and sometimes “us”) is the producer and owner of the Demyst Data software and libraries (collectively referred to here as the/our "Software" or the/our "Services"), a toolkit that allows organizations to unlock financial services through the use of better data, smarter decisions and best in class infrastructure.
We take the private nature of your (and your customers’) Personally Identifiable Information (defined below) very seriously, and are committed to protecting it. To do that, we've set up procedures to ensure that such information is handled responsibly and in accordance with applicable data protection and privacy laws. Your trust is paramount to us, and we act accordingly.
"Personally Identifiable Information" is any information that we could use to identify an individual, including, for example, their name, address, geographic location of their computer or mobile device, telephone number, credit card number, email address and bank account information. It does not include Personally Identifiable Information that is encoded or anonymized (such as through encryption or hashing), or publicly available information that has not been combined with non-public information.
IF YOU’RE OUTSIDE OF THE UNITED STATES
If you are outside the United States, any Personally Identifiable Information you enter into the Software or otherwise share with us may be transferred out of your country and into the United States, and possibly to other countries (unless expressly otherwise agreed to in writing by you and us). By using the Services, you consent to such transfer and are representing that you and we have the right to transfer such information outside your country.
IF YOU’RE IN THE EUROPEAN ECONOMIC AREA (EEA)
Demyst Data complies with the EU Data Protection Directive (Directive 95/46/EC) on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Demyst Data makes our Model Clause Addendum available to all customers looking to or currently transferring personal data out of the EEA, so that they may transfer personal data outside of the EEA, including to the US, in compliance with EU law. Please contact email@example.com for more information.
A NOTE ABOUT CHILDREN
We do not collect any Personally Identifiable Information from children under the age of 13. If you know or believe that such information has been provided to us without the consent of the child’s parent or guardian, please contact us at firstname.lastname@example.org. If we become aware that we have collected Personally Identifiable Information about a child under the age of 13, we’ll delete it.
HOW WE COLLECT INFORMATION
We collect information in three different ways: Information we get from and in connection with your use of our Software and/or Services, information you provide to us directly, and information we receive about you from third parties.
Personally Identifiable Information You Provide To Us.
We collect Personally Identifiable Information from you when you register to use the Software and Services. If you provide us feedback or contact us regarding your use of the Software and/or Services, we will collect your name and email address, as well as other content included in the email, in order to address your outreach and send you a reply. In connection with your use of our Software and Services, you may also opt to share private customer information, including Personally Identifiable Information, with us, and we will retain this information on your behalf.
Personally Identifiable Information Collected By Third Parties.
We may also collect information about you and/or your customers from companies that provide services in connection with our Software and Services, including but not limited to third-party verification services, credit bureaus, mailing list providers, and publicly available sources. Such companies may supply us with Personally Identifiable Information such as an individual’s name and email, mailing address, or phone number. We may add this information to the information we already have collected from you via our Software in order to perform and improve our Services.
Personally Identifiable Information Collected Via Technology.
When you visit our website, and use our Software, our goal is to make the experience simple and useful. To that end, we use industry standard identifiers, such as cookies, to track information about your use of the website. A cookie is a small piece of data that a website stores on a visitor's computer, and that the visitor's browser provides to the website each time the visitor returns. As you navigate through and interact with our website, we may automatically collect certain information about your equipment, browsing actions and patterns using common internet technologies. This may include details of your visits to our website, including information about your connectivity, such as your IP address and browser information, location data, logs and other communication data, and the resources that you access and use on the website. The information we collect automatically helps us to improve our website and to deliver better and more personalized content and services enabling us to estimate our audience size and usage patterns and recognize when you return to our website.
Most web browsers automatically accept cookies, but, if you prefer, you can change your browser settings to prevent that or to notify you each time a cookie is set. Please note however that by blocking or deleting cookies, you may not be able to take full advantage of our website or Software.
HOW WE USE INFORMATION WE COLLECT
Choice. Choice is all about making sure you have the ability to control how we use your Personally Identifiable Information, and when and with whom we can share it.
We won't share your Personally Identifiable Information with third parties (other than vendors or contractors who process such information pursuant to our agreement with you and at our discretion) unless we are required to do so by law, or if we believe in good faith that disclosure is reasonably necessary to protect our property, rights or those of third parties or the public at large.
It is possible that we may, on occasion, buy or sell assets from or to other companies. If that should occur, user information is likely to be one of the assets transferred and we reserve our right to do so.
Other than in these rare circumstances, we will not rent or sell Personally Identifiable Information to anyone.
If you are a registered user of our Software and Services and have supplied your email address, we may occasionally send you an email to tell you about new features, solicit your feedback, or keep you up to date with other developments at Demyst Data. We expect to keep this type of communication to a minimum. If we do send you information that you did not expressly request, we will provide you with a way to request that you don't get any similar notices.
Onward Transfer. Onward transfer refers to us sharing your Personally Identifiable Information with third party vendors or contractors.
Security and Data Integrity. Security of your Personally Identifiable Information is a cornerstone of our business and we are the utmost dedicated to defending that information from unauthorized access, use, disclosure, disruption, modification, or destruction. In addition to assuring you that we will protect your Personally Identifiable Information, we also take reasonable precautions to make sure that any such information in our possession is reliable for its intended use, accurate, complete and up-to-date.
All records containing Personally Identifiable Information are afforded confidential treatment at all times. All such electronic information is stored on restricted database servers, and is generally kept until such time as you may ask us to edit or delete it, as described below. We only disclose such information to our employees, contractors or affiliates that (i) need to know that information in order to process it for us or to provide our Software or Services, and (ii) have agreed in writing to afford it the requisite confidential treatment. We have a separate policy for the purpose of explicitly outlining our commitment to information security. For more information, please email email@example.com for a copy of our Information Security Policy.
Access. We do not store and retain personally identifiable information to which we might have access during your use of the Software or Services within a contributory database without your explicit written consent; instead, any Personally Identifiable Information that we collect typically resides on servers maintained with our hosting provider, Amazon Web Services (“AWS”) unless otherwise agreed to by you and us. Any Personally Identifiable Information hosted in our cloud solution is segregated on a client-by-client basis, and encrypted at rest. We retain such information with AWS as long as your account with us is active, but will comply with all reasonable instructions from you to correct, amend or delete your information, or to provide you access to your information. Please note that some information may remain in our records even after you request deletion of your information as permitted by applicable privacy laws and any separate contractual agreements in place between you and us. Additionally, there may be limits to the amount of information we can practically provide. For example, we may limit an individual's access to Personally Identifiable Information where the burden or expense of providing access would be disproportionate to the risks to the individual's privacy or where doing so would violate others' rights.
Questions? If you have any concerns or complaints about how you think we've handled your Personally Identifiable Information, please contact firstname.lastname@example.org or our legal department at the address below. We will work hard to investigate and resolve any complaints.
HOW TO CONTACT US
Written Inquiries can be sent to:
Demyst Data Ltd.
1261 Broadway, Suite 408
New York, NY 10001
EMPLOYEES' & PROSPECTIVE EMPLOYEES' INFORMATION
This section covers any ways in which Personally Identifiable Information we collect from employees or applicants might be treated differently than user information. If you are not an employee or interested in applying for a job with DemystData, no need to read on. Then again, who wouldn't want to work with an amazingly talented team dedicated to unlocking the next tier of financial services for customers by leveraging the world’s best data and most innovative tools at the intersection of big data, technology and banking. Want to know more? Check out our careers page. And if you do, be sure to review the following non-exclusive list of ways that we may use information provided to us by employees or applicants:
E-mail us at email@example.com for any inquiries. We will contact you as soon as we can.
Right now, there are a few powerful attributes living across dozens of data sources, internal and external, structured and unstructured, that can instantly increase your ability to find and accept more consumer/small business customers, vastly reduce manual verifications and operating costs, reduce risk/fraud, and drive new top-line revenue. Working across the world's Tier 1 banks, online lenders, telcos, and insurance companies, our platform and leading libraries deliver attributes as a service in real-time.
DemystData's proprietary Attribute Platform works with more data sources than anyone else, including telco, social, ID, fraud, websites, text, news, logs, and much much more, and allows for the creation, hosting and delivery of actionable attributes that are unavailable anywhere else.
We have helped the world’s largest banks, telecommunications providers, insurers, and lenders optimize their workflows and more accurately screen over 400m customers. And we’re just getting started.
Validate address, phone, and email address individually and in combination across numerous sources.
Compare self-reported income to estimates based on jobtitle, life status, industry, and purchase behavior.
Verify an individual's self-reported employment by checking sources including business registration data, company web pages, and self-reported information.
Use email history, demographics, social profiles and more to identify customers likely to qualify and be approved for your products
Optimize marketing efforts with data useful in segmenting customers and determining suitability for various products.